Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eovQPjY5wz.exe

Overview

General Information

Sample name:eovQPjY5wz.exe
renamed because original name is a hash value
Original sample name:84263ab03b0a0f2b51cc11b93ec49c9f.exe
Analysis ID:1519285
MD5:84263ab03b0a0f2b51cc11b93ec49c9f
SHA1:e6457eb0e0131bec70a2fd4d4a943314f0bd28d4
SHA256:7d6e4e01c452dd502361640ee095e2bee35e3f55fd11edc9e94c3580d2c132b5
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected RedLine Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • eovQPjY5wz.exe (PID: 1060 cmdline: "C:\Users\user\Desktop\eovQPjY5wz.exe" MD5: 84263AB03B0A0F2B51CC11B93EC49C9F)
    • conhost.exe (PID: 5332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 6688 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • saLBqUuaxl.exe (PID: 732 cmdline: "C:\Users\user\AppData\Roaming\saLBqUuaxl.exe" MD5: A3EF9920A91B891837705E46BB26DE17)
      • aqYlLZ8hwJ.exe (PID: 6904 cmdline: "C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe" MD5: 4E60F3FD76D9EAB244F9DC00F7765B0B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["offensivedzvju.shop", "reinforcenh.shop", "ghostreedmnu.shop", "lootebarrkeyn.shop", "gutterydhowi.shop", "drawzhotdog.shop", "stogeneratmns.shop", "vozmeatillu.shop", "fragnantbui.shop"], "Build id": "FATE99--Mix"}
{"C2 url": "65.21.18.51:45580", "Bot Id": "@LOGSCLOUDYT_BOT", "Authorization Header": "3b888690d495b9792a58ef1c36d35d19"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Process Memory Space: RegAsm.exe PID: 6688JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  Click to see the 3 entries
                  SourceRuleDescriptionAuthorStrings
                  2.2.RegAsm.exe.436080.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    4.0.aqYlLZ8hwJ.exe.250000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      2.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        2.2.RegAsm.exe.436080.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                          2.2.RegAsm.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                            No Sigma rule has matched
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-09-26T09:58:25.615211+020020432341A Network Trojan was detected65.21.18.5145580192.168.2.449730TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-09-26T09:58:25.407694+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:30.721331+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:31.062539+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:31.334152+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:31.658118+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:31.867486+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:32.081416+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:32.353299+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:32.737429+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:33.066743+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:33.273704+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:33.483573+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:33.749163+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:33.958138+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:35.187403+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:35.488246+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:35.696227+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:35.903268+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:36.123951+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:36.374287+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:36.586135+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:36.791735+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            2024-09-26T09:58:37.235137+020020432311A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-09-26T09:58:31.067627+020020460561A Network Trojan was detected65.21.18.5145580192.168.2.449730TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-09-26T09:58:25.407694+020020460451A Network Trojan was detected192.168.2.44973065.21.18.5145580TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: lootebarrkeyn.shopAvira URL Cloud: Label: malware
                            Source: reinforcenh.shopAvira URL Cloud: Label: malware
                            Source: stogeneratmns.shopAvira URL Cloud: Label: malware
                            Source: ghostreedmnu.shopAvira URL Cloud: Label: malware
                            Source: fragnantbui.shopAvira URL Cloud: Label: malware
                            Source: offensivedzvju.shopAvira URL Cloud: Label: malware
                            Source: drawzhotdog.shopAvira URL Cloud: Label: malware
                            Source: vozmeatillu.shopAvira URL Cloud: Label: malware
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeAvira: detection malicious, Label: HEUR/AGEN.1318482
                            Source: 00000003.00000002.2945554718.0000000000D87000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["offensivedzvju.shop", "reinforcenh.shop", "ghostreedmnu.shop", "lootebarrkeyn.shop", "gutterydhowi.shop", "drawzhotdog.shop", "stogeneratmns.shop", "vozmeatillu.shop", "fragnantbui.shop"], "Build id": "FATE99--Mix"}
                            Source: 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "65.21.18.51:45580", "Bot Id": "@LOGSCLOUDYT_BOT", "Authorization Header": "3b888690d495b9792a58ef1c36d35d19"}
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeReversingLabs: Detection: 73%
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeReversingLabs: Detection: 47%
                            Source: eovQPjY5wz.exeReversingLabs: Detection: 55%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: reinforcenh.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: stogeneratmns.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: fragnantbui.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: drawzhotdog.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: vozmeatillu.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: offensivedzvju.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: ghostreedmnu.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: gutterydhowi.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: lootebarrkeyn.shop
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: TeslaBrowser/5.5
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: - Screen Resoluton:
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: - Physical Installed Memory:
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: Workgroup: -
                            Source: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpString decryptor: FATE99--Mix
                            Source: eovQPjY5wz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: eovQPjY5wz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004FD2C0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then jmp eax3_2_00537600
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0053A7E0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0053AC00
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then push ebx3_2_00505078
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005240F5
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005240F5
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh3_2_005350E0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx edi, byte ptr [eax+esi]3_2_004F7120
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0051A274
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [edx], ax3_2_0051A274
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0051A2F9
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [edx], ax3_2_0051A2F9
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]3_2_00532280
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0051A345
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [edx], ax3_2_0051A345
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0051A345
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_00521370
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ebx, eax3_2_004FA3C0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ebp, eax3_2_004FA3C0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh3_2_0051C390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh3_2_0051C390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh3_2_00539390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00539390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00514490
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h3_2_005104A0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], dx3_2_005104A0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ecx, esi3_2_0051D56C
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0052B510
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esi+000006A8h]3_2_0050E52C
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ecx, esi3_2_0051D58E
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0051F5B7
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esi]3_2_005046B5
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]3_2_004FF7E0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [edi], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [edi], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp al, 2Eh3_2_0051C891
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then xor eax, eax3_2_0051C891
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov dword ptr [esp], 00000000h3_2_0050A880
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh3_2_00534970
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh3_2_005389F0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00524A2F
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh3_2_00535AD0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esi]3_2_00503AE6
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ebx, ecx3_2_00503AE6
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp byte ptr [edi], 00000000h3_2_00503AE6
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]3_2_0051BB00
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then jmp edx3_2_00517B0F
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00520BD0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]3_2_00538BE0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]3_2_004F4C10
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_00516CA0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then add edi, 02h3_2_0050DD64
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [ebx]3_2_0050DD64
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]3_2_004F5D20
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00524DF6
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0053AD90
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]3_2_00535D80
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00539E60
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h3_2_00504E26
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then xor eax, eax3_2_00504E26
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_00537EDE
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esi+1Ch]3_2_004FFEBC
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0053AF10
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah3_2_0053AF10
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00516F20
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h3_2_0050CFF0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then xor eax, eax3_2_004FEFFC
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 4x nop then mov eax, dword ptr [esp+00000120h]3_2_004FEFFC
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4x nop then jmp 073C0538h4_2_073C0040

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2043231 - Severity 1 - ET MALWARE Redline Stealer TCP CnC Activity : 192.168.2.4:49730 -> 65.21.18.51:45580
                            Source: Network trafficSuricata IDS: 2046045 - Severity 1 - ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) : 192.168.2.4:49730 -> 65.21.18.51:45580
                            Source: Network trafficSuricata IDS: 2043234 - Severity 1 - ET MALWARE Redline Stealer TCP CnC - Id1Response : 65.21.18.51:45580 -> 192.168.2.4:49730
                            Source: Network trafficSuricata IDS: 2046056 - Severity 1 - ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) : 65.21.18.51:45580 -> 192.168.2.4:49730
                            Source: Malware configuration extractorURLs: offensivedzvju.shop
                            Source: Malware configuration extractorURLs: reinforcenh.shop
                            Source: Malware configuration extractorURLs: ghostreedmnu.shop
                            Source: Malware configuration extractorURLs: lootebarrkeyn.shop
                            Source: Malware configuration extractorURLs: gutterydhowi.shop
                            Source: Malware configuration extractorURLs: drawzhotdog.shop
                            Source: Malware configuration extractorURLs: stogeneratmns.shop
                            Source: Malware configuration extractorURLs: vozmeatillu.shop
                            Source: Malware configuration extractorURLs: fragnantbui.shop
                            Source: Malware configuration extractorURLs: 65.21.18.51:45580
                            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 65.21.18.51:45580
                            Source: Joe Sandbox ViewIP Address: 65.21.18.51 65.21.18.51
                            Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
                            Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownTCP traffic detected without corresponding DNS query: 65.21.18.51
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9;
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002C6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002C6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002C6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                            Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmp, aqYlLZ8hwJ.exe.2.drString found in binary or memory: https://api.ip.sb/ip
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00529000 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00529000
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00529000 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00529000
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp9FD.tmpJump to dropped file
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile created: C:\Users\user\AppData\Local\Temp\TmpA0E.tmpJump to dropped file

                            System Summary

                            barindex
                            Source: eovQPjY5wz.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 892928
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004023202_2_00402320
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004050C02_2_004050C0
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004204702_2_00420470
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040FCF02_2_0040FCF0
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00419D192_2_00419D19
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041951B2_2_0041951B
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004156352_2_00415635
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00404F002_2_00404F00
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040CF8F2_2_0040CF8F
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005376003_2_00537600
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0053004B3_2_0053004B
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F10003_2_004F1000
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0053B0203_2_0053B020
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005240F53_2_005240F5
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005350E03_2_005350E0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F91F03_2_004F91F0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F12A73_2_004F12A7
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051A3453_2_0051A345
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0053B3003_2_0053B300
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FA3C03_2_004FA3C0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051C3903_2_0051C390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005393903_2_00539390
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F74703_2_004F7470
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FB4703_2_004FB470
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FE4703_2_004FE470
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F54003_2_004F5400
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005014203_2_00501420
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005004803_2_00500480
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051D56C3_2_0051D56C
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0050E52C3_2_0050E52C
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051D58E3_2_0051D58E
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005276203_2_00527620
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F97373_2_004F9737
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F37903_2_004F3790
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005227B03_2_005227B0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051C8913_2_0051C891
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005399703_2_00539970
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F9A023_2_004F9A02
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00535AD03_2_00535AD0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00539B603_2_00539B60
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051BB003_2_0051BB00
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00517B0F3_2_00517B0F
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00528C003_2_00528C00
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0052FD0E3_2_0052FD0E
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00539E603_2_00539E60
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004F7E703_2_004F7E70
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00537EDE3_2_00537EDE
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051DEF83_2_0051DEF8
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FFEBC3_2_004FFEBC
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0052EF503_2_0052EF50
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FAFD03_2_004FAFD0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_0051DFE03_2_0051DFE0
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_004FBF803_2_004FBF80
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00538F803_2_00538F80
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_009BDC744_2_009BDC74
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E967D84_2_05E967D8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E9A3D84_2_05E9A3D8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E96FE84_2_05E96FE8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E96FF84_2_05E96FF8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073CF3584_2_073CF358
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073C21104_2_073C2110
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073C00404_2_073C0040
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073C2D184_2_073C2D18
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073C7CB84_2_073C7CB8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073CBBA84_2_073CBBA8
                            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe D6945846CC23C01B9C9AD2B97D35B5A14C01F1A4CC2EC651A596F06777BA4FEC
                            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\saLBqUuaxl.exe 171CEF885F6C285E995CE3EC5960C5EA4E4ED049CEC362745058FEE39E4136CC
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00407D30 appears 55 times
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: String function: 004FCAD0 appears 53 times
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: String function: 004FED80 appears 194 times
                            Source: eovQPjY5wz.exe, 00000000.00000002.1713699229.0000000000EEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs eovQPjY5wz.exe
                            Source: eovQPjY5wz.exeBinary or memory string: OriginalFilenameVQP.exe< vs eovQPjY5wz.exe
                            Source: eovQPjY5wz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: eovQPjY5wz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/9@1/1
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_005281AA CoCreateInstance,3_2_005281AA
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eovQPjY5wz.exe.logJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeMutant created: NULL
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5332:120:WilError_03
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp9FD.tmpJump to behavior
                            Source: eovQPjY5wz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: eovQPjY5wz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: eovQPjY5wz.exeReversingLabs: Detection: 55%
                            Source: unknownProcess created: C:\Users\user\Desktop\eovQPjY5wz.exe "C:\Users\user\Desktop\eovQPjY5wz.exe"
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\saLBqUuaxl.exe "C:\Users\user\AppData\Roaming\saLBqUuaxl.exe"
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe "C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe"
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\saLBqUuaxl.exe "C:\Users\user\AppData\Roaming\saLBqUuaxl.exe" Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe "C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe" Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: dwrite.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: esdsip.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: scrrun.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: linkinfo.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                            Source: Google Chrome.lnk.4.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                            Source: eovQPjY5wz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: eovQPjY5wz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Source: eovQPjY5wz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                            Source: aqYlLZ8hwJ.exe.2.drStatic PE information: 0xAD9C209F [Wed Apr 19 16:38:55 2062 UTC]
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00428E7D push esi; ret 2_2_00428E86
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004076E0 push ecx; ret 2_2_004076F3
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00527333 push 04EC839Eh; mov dword ptr [esp], edi3_2_0052733A
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E81015 push FFFFFF8Bh; ret 4_2_05E8101A
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E84A48 pushad ; ret 4_2_05E84A49
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E9D413 push es; ret 4_2_05E9D420
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E9C711 push es; ret 4_2_05E9C720
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E9ECF2 push eax; ret 4_2_05E9ED01
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E949AB push FFFFFF8Bh; retf 4_2_05E949AD
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_05E93B4F push dword ptr [esp+ecx*2-75h]; ret 4_2_05E93B53
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073CB924 push FFFFFF8Bh; iretd 4_2_073CB92E
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073CB89B push FFFFFF8Bh; iretd 4_2_073CB89E
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeCode function: 4_2_073CB8E0 push FFFFFF8Bh; iretd 4_2_073CB8E3
                            Source: eovQPjY5wz.exeStatic PE information: section name: .text entropy: 7.999068736163035

                            Persistence and Installation Behavior

                            barindex
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeJump to dropped file
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeJump to dropped file
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeMemory allocated: 910000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeMemory allocated: 910000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWindow / User API: threadDelayed 1433Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWindow / User API: threadDelayed 6970Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeAPI coverage: 6.3 %
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exe TID: 2596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe TID: 3624Thread sleep count: 31 > 30Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe TID: 3624Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe TID: 3236Thread sleep count: 1433 > 30Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe TID: 3236Thread sleep count: 6970 > 30Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe TID: 980Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1870551549.0000000006272000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeAPI call chain: ExitProcess graph end nodegraph_3-16677
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess information queried: ProcessInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\saLBqUuaxl.exeCode function: 3_2_00537560 LdrInitializeThunk,3_2_00537560
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407B01 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00407B01
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041914C mov eax, dword ptr fs:[00000030h]2_2_0041914C
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004114A6 mov ecx, dword ptr fs:[00000030h]2_2_004114A6
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041EFD8 GetProcessHeap,2_2_0041EFD8
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407B01 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00407B01
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407C63 SetUnhandledExceptionFilter,2_2_00407C63
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407D75 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00407D75
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040DD78 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0040DD78
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory allocated: page read and write | page guardJump to behavior

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeCode function: 0_2_02C92145 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02C92145
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
                            Source: RegAsm.exe, 00000002.00000002.1718315778.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: lootebarrkeyn.shop
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 426000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 434000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 436000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 4DC000Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: AE8008Jump to behavior
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\saLBqUuaxl.exe "C:\Users\user\AppData\Roaming\saLBqUuaxl.exe" Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe "C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe" Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004077E0 cpuid 2_2_004077E0
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_0041E825
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,2_2_00414138
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_0041EA78
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0041EBA1
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,2_2_0041E412
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_0041ECA7
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_0041ED76
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_0041465E
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_0041E60D
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,2_2_0041E6FF
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,2_2_0041E6B4
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,2_2_0041E79A
                            Source: C:\Users\user\Desktop\eovQPjY5wz.exeQueries volume information: C:\Users\user\Desktop\eovQPjY5wz.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004079F4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_004079F4
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1860186223.0000000000A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r\MsMpeng.exe
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1870551549.00000000062F1000.00000004.00000020.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1860186223.0000000000A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                            Source: Yara matchFile source: dump.pcap, type: PCAP
                            Source: Yara matchFile source: 2.2.RegAsm.exe.436080.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.0.aqYlLZ8hwJ.exe.250000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.436080.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6688, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: aqYlLZ8hwJ.exe PID: 6904, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe, type: DROPPED
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxE#
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR^q
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR^qt\
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q%appdata%`,^qdC:\Users\user\AppData\Roaming`,^qdC:\Users\user\AppData\Roaming\Binance
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q&%localappdata%\Coinomi\Coinomi\walletsLR^q
                            Source: aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                            Source: Yara matchFile source: 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: aqYlLZ8hwJ.exe PID: 6904, type: MEMORYSTR

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                            Source: Yara matchFile source: dump.pcap, type: PCAP
                            Source: Yara matchFile source: 2.2.RegAsm.exe.436080.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.0.aqYlLZ8hwJ.exe.250000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.436080.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6688, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: aqYlLZ8hwJ.exe PID: 6904, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe, type: DROPPED
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                            Windows Management Instrumentation
                            1
                            DLL Side-Loading
                            1
                            DLL Side-Loading
                            1
                            Disable or Modify Tools
                            1
                            OS Credential Dumping
                            1
                            System Time Discovery
                            Remote Services1
                            Archive Collected Data
                            1
                            Encrypted Channel
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            PowerShell
                            Boot or Logon Initialization Scripts411
                            Process Injection
                            11
                            Deobfuscate/Decode Files or Information
                            LSASS Memory1
                            File and Directory Discovery
                            Remote Desktop Protocol3
                            Data from Local System
                            1
                            Non-Standard Port
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)4
                            Obfuscated Files or Information
                            Security Account Manager134
                            System Information Discovery
                            SMB/Windows Admin Shares2
                            Clipboard Data
                            1
                            Non-Application Layer Protocol
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                            Install Root Certificate
                            NTDS1
                            Query Registry
                            Distributed Component Object ModelInput Capture11
                            Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                            Software Packing
                            LSA Secrets351
                            Security Software Discovery
                            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                            Timestomp
                            Cached Domain Credentials1
                            Process Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                            DLL Side-Loading
                            DCSync241
                            Virtualization/Sandbox Evasion
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                            Masquerading
                            Proc Filesystem1
                            Application Window Discovery
                            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt241
                            Virtualization/Sandbox Evasion
                            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron411
                            Process Injection
                            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519285 Sample: eovQPjY5wz.exe Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 30 18.31.95.13.in-addr.arpa 2->30 34 Suricata IDS alerts for network traffic 2->34 36 Found malware configuration 2->36 38 Antivirus detection for URL or domain 2->38 40 7 other signatures 2->40 8 eovQPjY5wz.exe 2 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\...\eovQPjY5wz.exe.log, CSV 8->24 dropped 52 Contains functionality to inject code into remote processes 8->52 54 Writes to foreign memory regions 8->54 56 Allocates memory in foreign processes 8->56 58 Injects a PE file into a foreign processes 8->58 12 RegAsm.exe 3 8->12         started        16 conhost.exe 8->16         started        signatures6 process7 file8 26 C:\Users\user\AppData\...\saLBqUuaxl.exe, PE32 12->26 dropped 28 C:\Users\user\AppData\...\aqYlLZ8hwJ.exe, PE32 12->28 dropped 60 LummaC encrypted strings found 12->60 18 aqYlLZ8hwJ.exe 6 24 12->18         started        22 saLBqUuaxl.exe 12->22         started        signatures9 process10 dnsIp11 32 65.21.18.51, 45580, 49730 CP-ASDE United States 18->32 42 Multi AV Scanner detection for dropped file 18->42 44 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->44 46 Installs new ROOT certificates 18->46 50 4 other signatures 18->50 48 Antivirus detection for dropped file 22->48 signatures12

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            eovQPjY5wz.exe55%ReversingLabsByteCode-MSIL.Trojan.Amadey
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Roaming\saLBqUuaxl.exe100%AviraHEUR/AGEN.1318482
                            C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe74%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                            C:\Users\user\AppData\Roaming\saLBqUuaxl.exe47%ReversingLabsWin32.Trojan.MintZard
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                            https://api.ip.sb/ip0%URL Reputationsafe
                            http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id14ResponseD0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                            lootebarrkeyn.shop100%Avira URL Cloudmalware
                            http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                            http://tempuri.org/0%Avira URL Cloudsafe
                            reinforcenh.shop100%Avira URL Cloudmalware
                            http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                            stogeneratmns.shop100%Avira URL Cloudmalware
                            http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id6ResponseD0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                            ghostreedmnu.shop100%Avira URL Cloudmalware
                            http://tempuri.org/Entity/Id13ResponseD0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id21ResponseD0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                            fragnantbui.shop100%Avira URL Cloudmalware
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                            offensivedzvju.shop100%Avira URL Cloudmalware
                            drawzhotdog.shop100%Avira URL Cloudmalware
                            http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id10ResponseD0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                            vozmeatillu.shop100%Avira URL Cloudmalware
                            http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id15ResponseD0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                            http://tempuri.org/Entity/Id11ResponseD0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9;0%Avira URL Cloudsafe
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            18.31.95.13.in-addr.arpa
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              lootebarrkeyn.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              reinforcenh.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              stogeneratmns.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              ghostreedmnu.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              fragnantbui.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              offensivedzvju.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              drawzhotdog.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              vozmeatillu.shoptrue
                              • Avira URL Cloud: malware
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/sc/sctaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id14ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id23ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002C6E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id12ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id2ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id21ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id9aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id8aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id6ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id5aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id4aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id7aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id6aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id19ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id13ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/faultaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsataqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id15ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002800000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisteraqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id6ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ip.sb/ipRegAsm.exe, RegAsm.exe, 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmp, aqYlLZ8hwJ.exe.2.drfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/scaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id1ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id9ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id20aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id21aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id22aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id23aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id24aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id24ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id1ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id21ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/08/addressingaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/trustaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id10aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id11aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027F7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id10ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002C6E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id12aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id16ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id13aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id14aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id15aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id16aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/NonceaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id17aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id18aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id5ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id19aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id15ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id10ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/trust/RenewaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id11ResponseDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000029FB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://tempuri.org/Entity/Id8ResponseaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTaqYlLZ8hwJ.exe, 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9;aqYlLZ8hwJ.exe, 00000004.00000002.1864748963.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              65.21.18.51
                              unknownUnited States
                              199592CP-ASDEtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1519285
                              Start date and time:2024-09-26 09:57:27 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 20s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:9
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:eovQPjY5wz.exe
                              renamed because original name is a hash value
                              Original Sample Name:84263ab03b0a0f2b51cc11b93ec49c9f.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@8/9@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 103
                              • Number of non-executed functions: 125
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • VT rate limit hit for: eovQPjY5wz.exe
                              TimeTypeDescription
                              03:58:31API Interceptor43x Sleep call for process: aqYlLZ8hwJ.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              65.21.18.51file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                                  jD6b7MZOhT.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                    file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                      SecuriteInfo.com.Win32.TrojanX-gen.1325.25139.exeGet hashmaliciousAmadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                          file.exeGet hashmaliciousAmadey, Cryptbot, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                            VMRhiAFJtl.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, PureLog Stealer, RedLine, StealcBrowse
                                              XpCyBwDzEt.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, DanaBot, PureLog Stealer, RedLineBrowse
                                                g082Q9DajU.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, PureLog StealerBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CP-ASDEfile.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                                  • 65.21.18.51
                                                  Audio playback00_05-30-00000.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 65.21.45.74
                                                  file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                                                  • 65.21.18.51
                                                  http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                  • 65.21.119.50
                                                  jD6b7MZOhT.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                  • 65.21.18.51
                                                  file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                                  • 65.21.18.51
                                                  SecuriteInfo.com.Win32.TrojanX-gen.1325.25139.exeGet hashmaliciousAmadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
                                                  • 65.21.18.51
                                                  LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                                  • 65.21.196.90
                                                  ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                                  • 65.21.196.90
                                                  3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 65.21.245.7
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Users\user\AppData\Roaming\saLBqUuaxl.exefile.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                                    C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exefile.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                                      Process:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:34 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                      Category:dropped
                                                      Size (bytes):2104
                                                      Entropy (8bit):3.4591763193933103
                                                      Encrypted:false
                                                      SSDEEP:48:8S8dGTi+GRYrnvPdAKRkdAGdAKRFdAKR/U:8Slt
                                                      MD5:289FF15F91075A12C31FF35E2BEEDA03
                                                      SHA1:0ED299567D741B1C9EE66FD730DD52A930FBDEB0
                                                      SHA-256:CCC31C32E9B2B6116E2165E225971A87F4269044320F011A610D95050B6E3579
                                                      SHA-512:5A23EEB7E6F33D31096F041772550C988BDB1BB62E7BFCC202B5672A2D4FD7A408EE37DE25BD43DA324AE01611AB309C5C000605070B894F5AE3B475B0C8C272
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ......,..............q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDW5`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWR`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWR`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWR`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDWI`..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                      Process:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):3274
                                                      Entropy (8bit):5.3318368586986695
                                                      Encrypted:false
                                                      SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlqY
                                                      MD5:0B2E58EF6402AD69025B36C36D16B67F
                                                      SHA1:5ECC642327EF5E6A54B7918A4BD7B46A512BF926
                                                      SHA-256:4B0FB8EECEAD6C835CED9E06F47D9021C2BCDB196F2D60A96FEE09391752C2D7
                                                      SHA-512:1464106CEC5E264F8CEA7B7FF03C887DA5192A976FBC9369FC60A480A7B9DB0ED1956EFCE6FFAD2E40A790BD51FD27BB037256964BC7B4B2DA6D4D5C6B267FA1
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                      Process:C:\Users\user\Desktop\eovQPjY5wz.exe
                                                      File Type:CSV text
                                                      Category:modified
                                                      Size (bytes):425
                                                      Entropy (8bit):5.353683843266035
                                                      Encrypted:false
                                                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                      MD5:859802284B12C59DDBB85B0AC64C08F0
                                                      SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                      SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                      SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                      Process:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2662
                                                      Entropy (8bit):7.8230547059446645
                                                      Encrypted:false
                                                      SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                      MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                      SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                      SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                      SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                      Process:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2662
                                                      Entropy (8bit):7.8230547059446645
                                                      Encrypted:false
                                                      SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                      MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                      SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                      SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                      SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                      Malicious:false
                                                      Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                      Process:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2251
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:0158FE9CEAD91D1B027B795984737614
                                                      SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                                      SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                                      SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                                      Malicious:false
                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):311296
                                                      Entropy (8bit):5.082543579488037
                                                      Encrypted:false
                                                      SSDEEP:3072:Oq6EgY6iYrUj1Np/wPG/2hIUrTA7tMSiy1cZqf7D34teqiOLibBOQ:1qY6i3wPtIUrTAxMY1cZqf7DIXL
                                                      MD5:4E60F3FD76D9EAB244F9DC00F7765B0B
                                                      SHA1:1A154D6E837E7105C551793131CDE89F157C4330
                                                      SHA-256:D6945846CC23C01B9C9AD2B97D35B5A14C01F1A4CC2EC651A596F06777BA4FEC
                                                      SHA-512:44727E25781F448579AC35AAB94AFF550ED9FE5AC58D95BD394569C62892DC78216AC687BAA43CEF66187EBE629F5DD9CD63EA274222D11DBEF3440EC4D7F77A
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe, Author: Joe Security
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 74%
                                                      Joe Sandbox View:
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ................0................. ... ....@.. ....................... ............@.....................................O.... ..............................h................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):364544
                                                      Entropy (8bit):6.656062545289343
                                                      Encrypted:false
                                                      SSDEEP:6144:PJdHU1vR3RO5NSdLcHUPnAGrV1GdauIgmxmbsWeSI9ifLW3:PJS1vRhOfX0PA61Gig0mQY
                                                      MD5:A3EF9920A91B891837705E46BB26DE17
                                                      SHA1:9CFBCD0F46EC86FB57D3D6D74A064F9098ADF117
                                                      SHA-256:171CEF885F6C285E995CE3EC5960C5EA4E4ED049CEC362745058FEE39E4136CC
                                                      SHA-512:C65E91091B95C3ABA0AF7DF4ED6543D26BCB5B54D6FAB82F9D2AC1BA156F475F98124A1A0E8851D69BE23B1DC945C76C075CD32515203273260802E1224DBD6E
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 47%
                                                      Joe Sandbox View:
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....#.f..........................................@..........................P............@.....................................x................................J...................................................................................text...~........................... ..`.rdata...).......*..................@..@.data............b..................@....reloc...J.......L...D..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\eovQPjY5wz.exe
                                                      File Type:ASCII text, with CRLF, LF line terminators
                                                      Category:dropped
                                                      Size (bytes):33
                                                      Entropy (8bit):2.2845972159140855
                                                      Encrypted:false
                                                      SSDEEP:3:i6vvRyMivvRya:iKvHivD
                                                      MD5:45B4C82B8041BF0F9CCED0D6A18D151A
                                                      SHA1:B4DAD3FFFEF507CBB78671EE620BB495F8CE22F1
                                                      SHA-256:7CFA461ED1FC8611AB74878EDB1FBBDE3596F5D042946A42A7F31EB6D462E628
                                                      SHA-512:B29C3696A8A311EFAF9B9709BA082FF2C8D45A6912D79BC1DE7FEEFBEF8F8DDEFCD6650B5E1165D0A79800C8AED399E2B11BC2431E3837DD8587516BDE50EAB5
                                                      Malicious:false
                                                      Preview:0..1..2..3..4..0..1..2..3..4.....
                                                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.997700688704897
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:eovQPjY5wz.exe
                                                      File size:903'168 bytes
                                                      MD5:84263ab03b0a0f2b51cc11b93ec49c9f
                                                      SHA1:e6457eb0e0131bec70a2fd4d4a943314f0bd28d4
                                                      SHA256:7d6e4e01c452dd502361640ee095e2bee35e3f55fd11edc9e94c3580d2c132b5
                                                      SHA512:db35a02345b5166077e300524675c523a8b4082fa62fc151c0797141348cae5e173eeaec5ad1e95556e048ea6ed34a78b90b1184420557c53cd91f351417ebb2
                                                      SSDEEP:24576:9YroRg0QD2ZDvpSgezC2pSSqb9VAMsGm1ykciQgh75tT:9YroRmgSPC2MSpMsGmGiQg95t
                                                      TLSH:BB15336CEE844BA7DCE69ABDC1077FB8330EDC8744CA3948D986124C111CD9A9E779D1
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.f................................. ........@.. ....................... ............`................................
                                                      Icon Hash:90cececece8e8eb0
                                                      Entrypoint:0x4ddcee
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows cui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x66F464B6 [Wed Sep 25 19:29:58 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xddc940x57.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x5b8.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe00000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xddb5c0x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xdbcf40xdbe00f8d06f126e6f8959ee85698393fa56c6False0.9977515189738487data7.999068736163035IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xde0000x5b80x600be0c6503cf5b18649d1fe184002f6a0aFalse0.4381510416666667data4.114519052070512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xe00000xc0x200fd5c6017bdd8c4e893e6ac38c438a6f5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0xde0a00x324data0.4552238805970149
                                                      RT_MANIFEST0xde3c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-09-26T09:58:25.407694+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:25.407694+02002046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:25.615211+02002043234ET MALWARE Redline Stealer TCP CnC - Id1Response165.21.18.5145580192.168.2.449730TCP
                                                      2024-09-26T09:58:30.721331+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:31.062539+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:31.067627+02002046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)165.21.18.5145580192.168.2.449730TCP
                                                      2024-09-26T09:58:31.334152+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:31.658118+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:31.867486+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:32.081416+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:32.353299+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:32.737429+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:33.066743+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:33.273704+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:33.483573+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:33.749163+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:33.958138+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:35.187403+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:35.488246+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:35.696227+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:35.903268+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:36.123951+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:36.374287+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:36.586135+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:36.791735+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      2024-09-26T09:58:37.235137+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.44973065.21.18.5145580TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Sep 26, 2024 09:58:24.548475981 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:24.553452015 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:24.553683996 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:24.562705040 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:24.567523956 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:25.235713959 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:25.306453943 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:25.407694101 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:25.412713051 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:25.615211010 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:25.665838957 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:30.721330881 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:30.726269007 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929128885 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929148912 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929160118 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929172993 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929184914 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929198027 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:30.929225922 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:30.929267883 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.062539101 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.067626953 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.268326998 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.322077036 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.334151983 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.339111090 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339134932 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339159012 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339171886 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339184999 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339207888 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339220047 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.339220047 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339294910 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.339307070 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.343744040 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.343997002 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.344011068 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.344043970 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.344212055 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.648180008 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.658118010 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.662975073 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.863095999 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:31.867486000 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:31.872361898 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.072911978 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.081415892 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:32.086445093 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086466074 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086493015 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086505890 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086520910 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086534023 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086546898 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.086563110 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.301126957 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.353298903 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:32.737428904 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:32.742398977 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.742419004 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:32.742430925 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.064280987 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.066742897 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.071746111 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.271542072 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.273704052 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.278513908 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.478478909 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.483572960 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.488492966 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.688282013 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.728526115 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.749162912 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.754091978 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.953929901 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:33.958137989 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:33.963346004 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:34.163645029 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:34.212691069 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.187402964 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.192290068 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.393275023 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.447421074 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.488245964 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.493354082 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.693662882 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.696227074 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.701184034 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.901185989 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:35.903268099 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:35.908067942 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.122826099 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.123950958 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:36.128880024 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.328840971 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.374286890 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:36.379179955 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.579425097 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.586134911 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:36.590984106 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.790910006 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:36.791734934 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:36.796582937 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:37.058495045 CEST455804973065.21.18.51192.168.2.4
                                                      Sep 26, 2024 09:58:37.103349924 CEST4973045580192.168.2.465.21.18.51
                                                      Sep 26, 2024 09:58:37.235136986 CEST4973045580192.168.2.465.21.18.51
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Sep 26, 2024 09:58:53.814085007 CEST5363380162.159.36.2192.168.2.4
                                                      Sep 26, 2024 09:58:54.285024881 CEST6202553192.168.2.41.1.1.1
                                                      Sep 26, 2024 09:58:54.292188883 CEST53620251.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Sep 26, 2024 09:58:54.285024881 CEST192.168.2.41.1.1.10x50b7Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Sep 26, 2024 09:58:54.292188883 CEST1.1.1.1192.168.2.40x50b7Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:03:58:19
                                                      Start date:26/09/2024
                                                      Path:C:\Users\user\Desktop\eovQPjY5wz.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\eovQPjY5wz.exe"
                                                      Imagebase:0x760000
                                                      File size:903'168 bytes
                                                      MD5 hash:84263AB03B0A0F2B51CC11B93EC49C9F
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:03:58:19
                                                      Start date:26/09/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:03:58:21
                                                      Start date:26/09/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      Imagebase:0x840000
                                                      File size:65'440 bytes
                                                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:03:58:21
                                                      Start date:26/09/2024
                                                      Path:C:\Users\user\AppData\Roaming\saLBqUuaxl.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\saLBqUuaxl.exe"
                                                      Imagebase:0x4f0000
                                                      File size:364'544 bytes
                                                      MD5 hash:A3EF9920A91B891837705E46BB26DE17
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 47%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:4
                                                      Start time:03:58:21
                                                      Start date:26/09/2024
                                                      Path:C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe"
                                                      Imagebase:0x250000
                                                      File size:311'296 bytes
                                                      MD5 hash:4E60F3FD76D9EAB244F9DC00F7765B0B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1864748963.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000000.1717964881.0000000000252000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1864748963.0000000002A7E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Roaming\aqYlLZ8hwJ.exe, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 74%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:35.7%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:28.6%
                                                        Total number of Nodes:21
                                                        Total number of Limit Nodes:1
                                                        execution_graph 571 10f097c 572 10f0988 571->572 573 10f0ad6 572->573 574 10f1268 VirtualProtectEx 572->574 575 10f1270 VirtualProtectEx 572->575 574->573 575->573 546 10f0988 547 10f09aa 546->547 548 10f0ad6 547->548 551 10f1268 547->551 555 10f1270 547->555 552 10f12de VirtualProtectEx 551->552 554 10f126e 551->554 553 10f12ff 552->553 553->548 554->552 556 10f12bb VirtualProtectEx 555->556 558 10f12ff 556->558 558->548 564 2c92145 565 2c9217d CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 564->565 567 2c9235a WriteProcessMemory 565->567 568 2c9239f 567->568 569 2c923e1 WriteProcessMemory Wow64SetThreadContext ResumeThread 568->569 570 2c923a4 WriteProcessMemory 568->570 570->568

                                                        Callgraph

                                                        • Executed
                                                        • Not Executed
                                                        • Opacity -> Relevance
                                                        • Disassembly available
                                                        callgraph 0 Function_010F010C 1 Function_010F0988 20 Function_010F0524 1->20 23 Function_010F053C 1->23 29 Function_010F0530 1->29 35 Function_010F0548 1->35 42 Function_010F0B40 1->42 49 Function_010F0C58 1->49 64 Function_010F1268 1->64 83 Function_010F1270 1->83 2 Function_010F0188 3 Function_010F0208 4 Function_02C92145 5 Function_010F0080 6 Function_010F0100 7 Function_010F011C 8 Function_010F121C 61 Function_010F026C 8->61 9 Function_010F0198 10 Function_010F0498 11 Function_010F0517 12 Function_010F1216 13 Function_010F0214 14 Function_010F0014 15 Function_010F0090 16 Function_010F012C 17 Function_010F10AC 17->61 18 Function_010F01A8 19 Function_010F10A6 21 Function_010F0224 22 Function_010F00A0 23->61 24 Function_010F00BC 25 Function_010F013C 26 Function_010F01B4 27 Function_010F0234 28 Function_010F00B0 29->61 30 Function_010F1330 31 Function_010F004D 32 Function_010F04C9 33 Function_010F0148 34 Function_010F00C8 36 Function_010F0848 37 Function_010F0BC8 38 Function_010F04C5 39 Function_010F0244 40 Function_010F0444 41 Function_010F04C1 43 Function_010F01C0 44 Function_010F04DF 45 Function_010F0F5F 45->61 46 Function_010F045D 47 Function_010F055D 48 Function_010F0559 50 Function_010F08D8 51 Function_02C91F9E 52 Function_010F0A57 52->23 52->29 52->35 52->42 52->49 52->64 52->83 53 Function_010F01D5 54 Function_010F0555 55 Function_010F0154 56 Function_010F00D4 57 Function_010F0254 58 Function_010F0450 59 Function_010F046D 60 Function_02C91D2B 62 Function_010F0469 63 Function_010F08E8 65 Function_010F0165 66 Function_010F01E5 67 Function_010F0465 68 Function_010F00E4 69 Function_010F0461 70 Function_010F0561 71 Function_010F0060 72 Function_010F0260 73 Function_010F047D 74 Function_010F027C 75 Function_010F097C 75->20 75->23 75->29 75->35 75->42 75->49 75->64 75->83 76 Function_010F0479 77 Function_010F0178 78 Function_010F01F8 79 Function_010F0577 80 Function_010F0475 81 Function_010F10F4 81->61 82 Function_010F0471 84 Function_010F0070 85 Function_010F00F0

                                                        Control-flow Graph

                                                        APIs
                                                        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02C920B7,02C920A7), ref: 02C922B4
                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02C922C7
                                                        • Wow64GetThreadContext.KERNEL32(000000A0,00000000), ref: 02C922E5
                                                        • ReadProcessMemory.KERNELBASE(0000009C,?,02C920FB,00000004,00000000), ref: 02C92309
                                                        • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 02C92334
                                                        • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 02C9238C
                                                        • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 02C923D7
                                                        • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 02C92415
                                                        • Wow64SetThreadContext.KERNEL32(000000A0,01150000), ref: 02C92451
                                                        • ResumeThread.KERNELBASE(000000A0), ref: 02C92460
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1714105495.0000000002C91000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C91000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2c91000_eovQPjY5wz.jbxd
                                                        Similarity
                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                        • API String ID: 2687962208-1257834847
                                                        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                        • Instruction ID: 78c26038a607ee4df82e4a7b6ce4566d278efe032b380fe1e75b10d029dc9bb2
                                                        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                        • Instruction Fuzzy Hash: 6FB1F57664024AAFDB60CF68CC80BDA77A9FF88714F158124EA0CAB341D770FA51CB94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 23 10f1268-10f126c 24 10f12de-10f12fd VirtualProtectEx 23->24 25 10f126e-10f12db 23->25 27 10f12ff 24->27 28 10f1304-10f1325 24->28 25->24 27->28
                                                        APIs
                                                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 010F12F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1714004114.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_10f0000_eovQPjY5wz.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 9a5b9ba12a1569ff38e8bd6a28e055e2dd80e10f4eda2a8bd40e72c05bcbebcc
                                                        • Instruction ID: f0482ef69cb4cc989898cb8e31cf502850e3da8aef221df65451d29774b37839
                                                        • Opcode Fuzzy Hash: 9a5b9ba12a1569ff38e8bd6a28e055e2dd80e10f4eda2a8bd40e72c05bcbebcc
                                                        • Instruction Fuzzy Hash: C92116B19013499FDB10DFAAC881ADEBFF4FF48314F10841DDA59A7250D735A915CBA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 33 10f1270-10f12fd VirtualProtectEx 37 10f12ff 33->37 38 10f1304-10f1325 33->38 37->38
                                                        APIs
                                                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 010F12F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1714004114.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_10f0000_eovQPjY5wz.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: cd9fb536bfd776aa9b43d7e04983d4349df455e060b60b5e3d951ae54dedebf6
                                                        • Instruction ID: 683b79c51e6a0cee6e5bc01095fda848f78851cbd266365a83ca9b8a5e81d866
                                                        • Opcode Fuzzy Hash: cd9fb536bfd776aa9b43d7e04983d4349df455e060b60b5e3d951ae54dedebf6
                                                        • Instruction Fuzzy Hash: 7B2110B19002499FCB10DFAAC881ADEFBF4FF48310F10842EEA59A7250C774A914CFA1

                                                        Execution Graph

                                                        Execution Coverage:5.2%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:2.5%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:62
                                                        execution_graph 19825 40104e 19830 405abe 19825->19830 19827 401061 19834 4076cb 19827->19834 19831 405aca __EH_prolog3 19830->19831 19837 40641a 19831->19837 19833 405b26 std::locale::_Init 19833->19827 19901 40769e 19834->19901 19846 406039 19837->19846 19839 406425 19854 4049a0 19839->19854 19842 406452 19844 40645e 19842->19844 19858 406fef 19842->19858 19843 401f00 std::ios_base::_Init 43 API calls 19843->19842 19844->19833 19847 406045 __EH_prolog3 19846->19847 19848 401f00 std::ios_base::_Init 43 API calls 19847->19848 19849 406076 19848->19849 19850 40742e std::_Facet_Register 16 API calls 19849->19850 19851 40607d 19850->19851 19853 40608e std::locale::_Init 19851->19853 19863 4057aa 19851->19863 19853->19839 19855 4049b3 19854->19855 19856 404b20 72 API calls 19855->19856 19857 4049bd 19856->19857 19857->19842 19857->19843 19859 405474 std::_Lockit::_Lockit 7 API calls 19858->19859 19860 406fff 19859->19860 19861 4054cc std::_Lockit::~_Lockit 2 API calls 19860->19861 19862 40703d 19861->19862 19862->19844 19864 4057b6 __EH_prolog3 19863->19864 19865 405474 std::_Lockit::_Lockit 7 API calls 19864->19865 19866 4057c1 19865->19866 19874 4057f2 19866->19874 19875 40590f 19866->19875 19868 4054cc std::_Lockit::~_Lockit 2 API calls 19870 405832 std::locale::_Init 19868->19870 19869 4057d4 19881 405932 19869->19881 19870->19853 19873 405702 _Yarn 15 API calls 19873->19874 19874->19868 19876 40742e std::_Facet_Register 16 API calls 19875->19876 19877 40591a 19876->19877 19878 40592e 19877->19878 19885 40563e 19877->19885 19878->19869 19882 4057dc 19881->19882 19883 40593e 19881->19883 19882->19873 19888 406fc0 19883->19888 19886 405702 _Yarn 15 API calls 19885->19886 19887 405678 19886->19887 19887->19869 19889 406fd0 EncodePointer 19888->19889 19890 40e13c 19888->19890 19889->19882 19889->19890 19891 4174ae std::locale::_Setgloballocale 2 API calls 19890->19891 19892 40e141 19891->19892 19895 4174f3 std::locale::_Setgloballocale 41 API calls 19892->19895 19898 40e14c 19892->19898 19893 40e156 IsProcessorFeaturePresent 19896 40e162 19893->19896 19894 40e175 19897 411577 std::locale::_Setgloballocale 23 API calls 19894->19897 19895->19898 19899 40dd78 std::locale::_Setgloballocale 8 API calls 19896->19899 19900 40e17f 19897->19900 19898->19893 19898->19894 19899->19894 19902 4076b4 19901->19902 19903 4076ad 19901->19903 19910 413230 19902->19910 19907 4131b3 19903->19907 19906 40106b 19908 413230 44 API calls 19907->19908 19909 4131c5 19908->19909 19909->19906 19913 412f7c 19910->19913 19914 412f88 __FrameHandler3::FrameUnwindToState 19913->19914 19921 40e0c6 EnterCriticalSection 19914->19921 19916 412f96 19922 412fd7 19916->19922 19918 412fa3 19932 412fcb 19918->19932 19921->19916 19923 413065 __dosmaperr 19922->19923 19924 412ff2 19922->19924 19923->19918 19924->19923 19931 413045 19924->19931 19935 41ef6b 19924->19935 19925 41ef6b 44 API calls 19927 41305b 19925->19927 19930 4140f1 ___free_lconv_mon 14 API calls 19927->19930 19928 41303b 19929 4140f1 ___free_lconv_mon 14 API calls 19928->19929 19929->19931 19930->19923 19931->19923 19931->19925 19963 40e10e LeaveCriticalSection 19932->19963 19934 412fb4 19934->19906 19936 41ef93 19935->19936 19937 41ef78 19935->19937 19940 41efa2 19936->19940 19944 4239f1 19936->19944 19937->19936 19938 41ef84 19937->19938 19941 40e072 __dosmaperr 14 API calls 19938->19941 19951 419c05 19940->19951 19943 41ef89 codecvt 19941->19943 19943->19928 19945 423a11 HeapSize 19944->19945 19946 4239fc 19944->19946 19945->19940 19947 40e072 __dosmaperr 14 API calls 19946->19947 19948 423a01 19947->19948 19949 40df74 _Ungetc 41 API calls 19948->19949 19950 423a0c 19949->19950 19950->19940 19952 419c12 19951->19952 19953 419c1d 19951->19953 19954 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 19952->19954 19955 419c25 19953->19955 19961 419c2e __dosmaperr 19953->19961 19959 419c1a 19954->19959 19956 4140f1 ___free_lconv_mon 14 API calls 19955->19956 19956->19959 19957 419c33 19960 40e072 __dosmaperr 14 API calls 19957->19960 19958 419c58 HeapReAlloc 19958->19959 19958->19961 19959->19943 19960->19959 19961->19957 19961->19958 19962 412e98 std::_Facet_Register 2 API calls 19961->19962 19962->19961 19963->19934 20048 406464 20049 406485 20048->20049 20053 406489 20048->20053 20050 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20049->20050 20051 4064f1 20050->20051 20053->20049 20054 40653f 20053->20054 20055 4064cd 20053->20055 20054->20049 20056 40dcfa 69 API calls 20054->20056 20055->20049 20057 4059eb 20055->20057 20056->20049 20060 40e7fb 20057->20060 20061 40e80e _Fputc 20060->20061 20066 40e5ff 20061->20066 20064 40bbd5 _Fputc 41 API calls 20065 4059f9 20064->20065 20065->20049 20067 40e60b __FrameHandler3::FrameUnwindToState 20066->20067 20068 40e612 20067->20068 20069 40e637 20067->20069 20070 40def7 _Fputc 41 API calls 20068->20070 20077 40bb65 EnterCriticalSection 20069->20077 20076 40e62d 20070->20076 20072 40e646 20078 40e6c3 20072->20078 20076->20064 20077->20072 20079 40e6fa 20078->20079 20099 40e6e8 _Fputc 20078->20099 20080 414bd2 _Ungetc 41 API calls 20079->20080 20081 40e701 20080->20081 20082 414bd2 _Ungetc 41 API calls 20081->20082 20086 40e729 20081->20086 20084 40e712 20082->20084 20083 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20085 40e657 20083->20085 20084->20086 20087 414bd2 _Ungetc 41 API calls 20084->20087 20100 40e687 20085->20100 20088 414bd2 _Ungetc 41 API calls 20086->20088 20086->20099 20089 40e71e 20087->20089 20090 40e75c 20088->20090 20091 414bd2 _Ungetc 41 API calls 20089->20091 20092 40e77f 20090->20092 20093 414bd2 _Ungetc 41 API calls 20090->20093 20091->20086 20095 41607a _Fputc 43 API calls 20092->20095 20092->20099 20094 40e768 20093->20094 20094->20092 20096 414bd2 _Ungetc 41 API calls 20094->20096 20095->20099 20097 40e774 20096->20097 20098 414bd2 _Ungetc 41 API calls 20097->20098 20098->20092 20099->20083 20103 40bb79 LeaveCriticalSection 20100->20103 20102 40e68d 20102->20076 20103->20102 21425 40657c 21426 406597 21425->21426 21428 4065a9 21426->21428 21429 405a08 21426->21429 21432 40ea6d 21429->21432 21433 40ea79 __FrameHandler3::FrameUnwindToState 21432->21433 21434 40ea80 21433->21434 21435 40ea97 21433->21435 21436 40e072 __dosmaperr 14 API calls 21434->21436 21445 40bb65 EnterCriticalSection 21435->21445 21438 40ea85 21436->21438 21441 40df74 _Ungetc 41 API calls 21438->21441 21439 40eaa6 21446 40e9b7 21439->21446 21443 405a1a 21441->21443 21442 40eab4 21458 40eae3 21442->21458 21443->21428 21445->21439 21447 40ea30 _Ungetc 21446->21447 21448 40e9cd 21446->21448 21447->21442 21448->21447 21449 40e9fb 21448->21449 21450 418105 _Ungetc 14 API calls 21448->21450 21449->21447 21451 414bd2 _Ungetc 41 API calls 21449->21451 21450->21449 21452 40ea0d 21451->21452 21452->21447 21453 414bd2 _Ungetc 41 API calls 21452->21453 21454 40ea19 21453->21454 21454->21447 21455 414bd2 _Ungetc 41 API calls 21454->21455 21456 40ea25 21455->21456 21457 414bd2 _Ungetc 41 API calls 21456->21457 21457->21447 21461 40bb79 LeaveCriticalSection 21458->21461 21460 40eae9 21460->21443 21461->21460 20229 415002 20230 41500d 20229->20230 20234 41501d 20229->20234 20235 415023 20230->20235 20233 4140f1 ___free_lconv_mon 14 API calls 20233->20234 20236 41503e 20235->20236 20237 415038 20235->20237 20239 4140f1 ___free_lconv_mon 14 API calls 20236->20239 20238 4140f1 ___free_lconv_mon 14 API calls 20237->20238 20238->20236 20240 41504a 20239->20240 20241 4140f1 ___free_lconv_mon 14 API calls 20240->20241 20242 415055 20241->20242 20243 4140f1 ___free_lconv_mon 14 API calls 20242->20243 20244 415060 20243->20244 20245 4140f1 ___free_lconv_mon 14 API calls 20244->20245 20246 41506b 20245->20246 20247 4140f1 ___free_lconv_mon 14 API calls 20246->20247 20248 415076 20247->20248 20249 4140f1 ___free_lconv_mon 14 API calls 20248->20249 20250 415081 20249->20250 20251 4140f1 ___free_lconv_mon 14 API calls 20250->20251 20252 41508c 20251->20252 20253 4140f1 ___free_lconv_mon 14 API calls 20252->20253 20254 415097 20253->20254 20255 4140f1 ___free_lconv_mon 14 API calls 20254->20255 20256 4150a5 20255->20256 20261 414e4f 20256->20261 20262 414e5b __FrameHandler3::FrameUnwindToState 20261->20262 20277 40e0c6 EnterCriticalSection 20262->20277 20264 414e65 20267 4140f1 ___free_lconv_mon 14 API calls 20264->20267 20268 414e8f 20264->20268 20267->20268 20278 414eae 20268->20278 20269 414eba 20270 414ec6 __FrameHandler3::FrameUnwindToState 20269->20270 20282 40e0c6 EnterCriticalSection 20270->20282 20272 414ed0 20273 4150f0 __dosmaperr 14 API calls 20272->20273 20274 414ee3 20273->20274 20283 414f03 20274->20283 20277->20264 20281 40e10e LeaveCriticalSection 20278->20281 20280 414e9c 20280->20269 20281->20280 20282->20272 20286 40e10e LeaveCriticalSection 20283->20286 20285 414ef1 20285->20233 20286->20285 21654 40f516 21655 40f529 _Fputc 21654->21655 21660 40f44d 21655->21660 21657 40f53e 21658 40bbd5 _Fputc 41 API calls 21657->21658 21659 40f54b 21658->21659 21661 40f45f 21660->21661 21663 40f482 21660->21663 21662 40def7 _Fputc 41 API calls 21661->21662 21664 40f47a 21662->21664 21663->21661 21665 40f4a9 21663->21665 21664->21657 21668 40f352 21665->21668 21669 40f35e __FrameHandler3::FrameUnwindToState 21668->21669 21676 40bb65 EnterCriticalSection 21669->21676 21671 40f36c 21677 40f3ad 21671->21677 21673 40f379 21686 40f3a1 21673->21686 21676->21671 21678 40ed28 ___scrt_uninitialize_crt 66 API calls 21677->21678 21679 40f3c8 21678->21679 21680 4149a0 14 API calls 21679->21680 21681 40f3d2 21680->21681 21682 414094 __dosmaperr 14 API calls 21681->21682 21685 40f3ed 21681->21685 21683 40f411 21682->21683 21684 4140f1 ___free_lconv_mon 14 API calls 21683->21684 21684->21685 21685->21673 21689 40bb79 LeaveCriticalSection 21686->21689 21688 40f38a 21688->21657 21689->21688 21697 40bb19 21698 40edf6 ___scrt_uninitialize_crt 70 API calls 21697->21698 21699 40bb21 21698->21699 21707 4148f5 21699->21707 21701 40bb26 21702 4149a0 14 API calls 21701->21702 21703 40bb35 DeleteCriticalSection 21702->21703 21703->21701 21704 40bb50 21703->21704 21705 4140f1 ___free_lconv_mon 14 API calls 21704->21705 21706 40bb5b 21705->21706 21708 414901 __FrameHandler3::FrameUnwindToState 21707->21708 21717 40e0c6 EnterCriticalSection 21708->21717 21710 414978 21718 414997 21710->21718 21711 41490c 21711->21710 21713 41494c DeleteCriticalSection 21711->21713 21715 40bd99 71 API calls 21711->21715 21716 4140f1 ___free_lconv_mon 14 API calls 21713->21716 21715->21711 21716->21711 21717->21711 21721 40e10e LeaveCriticalSection 21718->21721 21720 414984 21720->21701 21721->21720 21735 417f20 21736 417f2f 21735->21736 21740 417f44 21735->21740 21737 40e072 __dosmaperr 14 API calls 21736->21737 21738 417f34 21737->21738 21739 40df74 _Ungetc 41 API calls 21738->21739 21749 417f3f 21739->21749 21741 417fa2 21740->21741 21742 418105 _Ungetc 14 API calls 21740->21742 21740->21749 21743 414bd2 _Ungetc 41 API calls 21741->21743 21742->21741 21744 417fd2 21743->21744 21755 42211e 21744->21755 21747 414bd2 _Ungetc 41 API calls 21748 418014 21747->21748 21748->21749 21750 414bd2 _Ungetc 41 API calls 21748->21750 21751 418022 21750->21751 21751->21749 21752 414bd2 _Ungetc 41 API calls 21751->21752 21753 418030 21752->21753 21754 414bd2 _Ungetc 41 API calls 21753->21754 21754->21749 21756 42212a __FrameHandler3::FrameUnwindToState 21755->21756 21757 422132 21756->21757 21758 42214a 21756->21758 21759 40e05f __dosmaperr 14 API calls 21757->21759 21760 422207 21758->21760 21764 422180 21758->21764 21761 422137 21759->21761 21762 40e05f __dosmaperr 14 API calls 21760->21762 21763 40e072 __dosmaperr 14 API calls 21761->21763 21765 42220c 21762->21765 21784 417fda 21763->21784 21767 422189 21764->21767 21768 42219e 21764->21768 21766 40e072 __dosmaperr 14 API calls 21765->21766 21770 422196 21766->21770 21771 40e05f __dosmaperr 14 API calls 21767->21771 21785 41c9b3 EnterCriticalSection 21768->21785 21776 40df74 _Ungetc 41 API calls 21770->21776 21773 42218e 21771->21773 21772 4221a4 21774 4221c0 21772->21774 21775 4221d5 21772->21775 21777 40e072 __dosmaperr 14 API calls 21773->21777 21778 40e072 __dosmaperr 14 API calls 21774->21778 21779 422232 __wsopen_s 53 API calls 21775->21779 21776->21784 21777->21770 21780 4221c5 21778->21780 21781 4221d0 21779->21781 21782 40e05f __dosmaperr 14 API calls 21780->21782 21786 4221ff 21781->21786 21782->21781 21784->21747 21784->21749 21785->21772 21789 41ca68 LeaveCriticalSection 21786->21789 21788 422205 21788->21784 21789->21788 20464 40683d 20465 406849 __EH_prolog3_GS 20464->20465 20467 406898 20465->20467 20471 406860 20465->20471 20475 4068b2 20465->20475 20478 4059c4 20467->20478 20511 4076f4 20471->20511 20474 406961 20506 403f30 20474->20506 20475->20474 20476 40699c 20475->20476 20481 403f80 20475->20481 20486 40ee9b 20475->20486 20476->20474 20514 40f649 20476->20514 20527 40e588 20478->20527 20482 403fa7 20481->20482 20483 403f89 20481->20483 20484 404420 43 API calls 20482->20484 20483->20475 20485 403fbb 20484->20485 20485->20475 20487 40eea7 __FrameHandler3::FrameUnwindToState 20486->20487 20488 40eeb1 20487->20488 20489 40eec9 20487->20489 20490 40e072 __dosmaperr 14 API calls 20488->20490 20611 40bb65 EnterCriticalSection 20489->20611 20492 40eeb6 20490->20492 20494 40df74 _Ungetc 41 API calls 20492->20494 20493 40eed3 20495 40ef6f 20493->20495 20496 414bd2 _Ungetc 41 API calls 20493->20496 20505 40eec1 20494->20505 20612 40ee54 20495->20612 20501 40eef0 20496->20501 20498 40ef75 20619 40ef9f 20498->20619 20500 40ef47 20502 40e072 __dosmaperr 14 API calls 20500->20502 20501->20495 20501->20500 20503 40ef4c 20502->20503 20504 40df74 _Ungetc 41 API calls 20503->20504 20504->20505 20505->20475 20507 403f3b 20506->20507 20508 403f56 std::ios_base::_Ios_base_dtor 20506->20508 20507->20508 20509 40df84 std::ios_base::_Init 41 API calls 20507->20509 20508->20471 20510 403f7a 20509->20510 20512 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20511->20512 20513 4076fe 20512->20513 20513->20513 20515 40f655 __FrameHandler3::FrameUnwindToState 20514->20515 20516 40f671 20515->20516 20517 40f65c 20515->20517 20623 40bb65 EnterCriticalSection 20516->20623 20518 40e072 __dosmaperr 14 API calls 20517->20518 20520 40f661 20518->20520 20522 40df74 _Ungetc 41 API calls 20520->20522 20521 40f67b 20624 40f550 20521->20624 20524 40f66c 20522->20524 20524->20476 20528 40e594 __FrameHandler3::FrameUnwindToState 20527->20528 20529 40e5b2 20528->20529 20530 40e59b 20528->20530 20540 40bb65 EnterCriticalSection 20529->20540 20532 40e072 __dosmaperr 14 API calls 20530->20532 20534 40e5a0 20532->20534 20533 40e5be 20541 40e418 20533->20541 20536 40df74 _Ungetc 41 API calls 20534->20536 20538 4059cf 20536->20538 20537 40e5c9 20575 40e5f7 20537->20575 20538->20471 20540->20533 20542 40e435 20541->20542 20543 40e49b 20541->20543 20544 414bd2 _Ungetc 41 API calls 20542->20544 20545 40e492 20543->20545 20546 414bd2 _Ungetc 41 API calls 20543->20546 20548 40e43b 20544->20548 20545->20537 20549 40e4b0 20546->20549 20547 40e45e 20547->20543 20559 40e479 20547->20559 20548->20547 20550 414bd2 _Ungetc 41 API calls 20548->20550 20551 40e4d3 20549->20551 20553 414bd2 _Ungetc 41 API calls 20549->20553 20552 40e447 20550->20552 20551->20545 20554 40ee90 41 API calls 20551->20554 20552->20547 20558 414bd2 _Ungetc 41 API calls 20552->20558 20555 40e4bc 20553->20555 20557 40e4f3 20554->20557 20555->20551 20561 414bd2 _Ungetc 41 API calls 20555->20561 20557->20545 20562 40f704 __Getctype 41 API calls 20557->20562 20560 40e453 20558->20560 20559->20545 20578 40ee90 20559->20578 20563 414bd2 _Ungetc 41 API calls 20560->20563 20564 40e4c8 20561->20564 20565 40e50b 20562->20565 20563->20547 20566 414bd2 _Ungetc 41 API calls 20564->20566 20567 40e535 20565->20567 20569 40ee90 41 API calls 20565->20569 20566->20551 20585 416351 20567->20585 20571 40e51c 20569->20571 20571->20567 20572 40e522 20571->20572 20574 40f649 43 API calls 20572->20574 20573 40e072 __dosmaperr 14 API calls 20573->20545 20574->20545 20610 40bb79 LeaveCriticalSection 20575->20610 20577 40e5fd 20577->20538 20579 40ee54 20578->20579 20580 40e072 __dosmaperr 14 API calls 20579->20580 20582 40ee75 20579->20582 20581 40ee65 20580->20581 20583 40df74 _Ungetc 41 API calls 20581->20583 20582->20559 20584 40ee70 20583->20584 20584->20559 20586 416364 _Fputc 20585->20586 20591 41621e 20586->20591 20589 40bbd5 _Fputc 41 API calls 20590 40e549 20589->20590 20590->20545 20590->20573 20592 416232 20591->20592 20601 416242 20591->20601 20593 416267 20592->20593 20594 40d730 _Fputc 41 API calls 20592->20594 20592->20601 20595 416278 20593->20595 20596 41629b 20593->20596 20594->20593 20603 421a85 20595->20603 20598 4162c3 20596->20598 20599 416317 20596->20599 20596->20601 20598->20601 20602 41b00f __wsopen_s MultiByteToWideChar 20598->20602 20600 41b00f __wsopen_s MultiByteToWideChar 20599->20600 20600->20601 20601->20589 20602->20601 20606 423fd4 20603->20606 20609 423fff _Fputc 20606->20609 20607 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20608 421aa0 20607->20608 20608->20601 20609->20607 20610->20577 20611->20493 20613 40ee60 20612->20613 20616 40ee75 20612->20616 20614 40e072 __dosmaperr 14 API calls 20613->20614 20615 40ee65 20614->20615 20617 40df74 _Ungetc 41 API calls 20615->20617 20616->20498 20618 40ee70 20617->20618 20618->20498 20622 40bb79 LeaveCriticalSection 20619->20622 20621 40efa5 20621->20505 20622->20621 20623->20521 20625 40f568 20624->20625 20632 40f5d8 20624->20632 20626 414bd2 _Ungetc 41 API calls 20625->20626 20631 40f56e 20626->20631 20628 40f5c0 20629 40e072 __dosmaperr 14 API calls 20628->20629 20633 40f5c5 20629->20633 20630 40f5d0 20635 40f6b4 20630->20635 20631->20628 20631->20632 20632->20630 20638 418105 20632->20638 20634 40df74 _Ungetc 41 API calls 20633->20634 20634->20630 20643 40bb79 LeaveCriticalSection 20635->20643 20637 40f6ba 20637->20524 20639 414094 __dosmaperr 14 API calls 20638->20639 20640 418122 20639->20640 20641 4140f1 ___free_lconv_mon 14 API calls 20640->20641 20642 41812c 20641->20642 20642->20630 20643->20637 20644 4060d1 20645 406124 20644->20645 20646 4060d8 20644->20646 20649 40bb65 EnterCriticalSection 20646->20649 20648 4060dd 20649->20648 21978 41efea 21979 41f003 21978->21979 21980 41f021 21978->21980 21979->21980 21981 414b46 46 API calls 21979->21981 21982 414a96 2 API calls 21979->21982 21981->21979 21982->21979 20794 411aed 20797 4117b9 20794->20797 20798 4117c5 __FrameHandler3::FrameUnwindToState 20797->20798 20805 40e0c6 EnterCriticalSection 20798->20805 20800 4117cf 20801 4117fd 20800->20801 20803 41dcc6 __Getctype 14 API calls 20800->20803 20806 41181b 20801->20806 20803->20800 20805->20800 20809 40e10e LeaveCriticalSection 20806->20809 20808 411809 20809->20808 20810 4066ee 20811 406710 20810->20811 20815 406725 20810->20815 20816 405e65 20811->20816 20819 405ed1 20816->20819 20820 405e80 20816->20820 20817 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20818 405ee9 20817->20818 20818->20815 20822 40f002 20818->20822 20819->20817 20820->20819 20821 40dcfa 69 API calls 20820->20821 20821->20819 20823 40f022 20822->20823 20824 40f00d 20822->20824 20823->20824 20826 40f029 20823->20826 20825 40e072 __dosmaperr 14 API calls 20824->20825 20828 40f012 20825->20828 20832 40f318 20826->20832 20830 40df74 _Ungetc 41 API calls 20828->20830 20831 40f01d 20830->20831 20831->20815 20833 40f32b _Fputc 20832->20833 20838 40f0b7 20833->20838 20836 40bbd5 _Fputc 41 API calls 20837 40f038 20836->20837 20837->20815 20839 40f0c3 __FrameHandler3::FrameUnwindToState 20838->20839 20840 40f0c9 20839->20840 20842 40f0fd 20839->20842 20841 40def7 _Fputc 41 API calls 20840->20841 20844 40f0e4 20841->20844 20849 40bb65 EnterCriticalSection 20842->20849 20844->20836 20845 40f109 20850 40f22c 20845->20850 20847 40f120 20859 40f149 20847->20859 20849->20845 20851 40f252 20850->20851 20852 40f23f 20850->20852 20862 40f153 20851->20862 20852->20847 20854 40f303 20854->20847 20855 40f275 20855->20854 20856 40ed28 ___scrt_uninitialize_crt 66 API calls 20855->20856 20858 40f2a3 20856->20858 20857 418af3 __wsopen_s 43 API calls 20857->20854 20858->20857 20866 40bb79 LeaveCriticalSection 20859->20866 20861 40f151 20861->20844 20863 40f164 20862->20863 20865 40f1bc 20862->20865 20864 418ab3 __wsopen_s 43 API calls 20863->20864 20863->20865 20864->20865 20865->20855 20866->20861 17073 413ef2 17078 413cc8 17073->17078 17077 413f31 17079 413ce7 17078->17079 17080 413cfa 17079->17080 17088 413d0f 17079->17088 17098 40e072 17080->17098 17084 413d0a 17084->17077 17095 41fe8c 17084->17095 17085 40e072 __dosmaperr 14 API calls 17086 413ee0 17085->17086 17087 40df74 _Ungetc 41 API calls 17086->17087 17087->17084 17088->17088 17093 413e2f 17088->17093 17104 41f71e 17088->17104 17090 413e7f 17091 41f71e 41 API calls 17090->17091 17090->17093 17092 413e9d 17091->17092 17092->17093 17094 41f71e 41 API calls 17092->17094 17093->17084 17093->17085 17094->17093 17630 41f856 17095->17630 17118 41528c GetLastError 17098->17118 17100 40e077 17101 40df74 17100->17101 17339 40dec0 17101->17339 17105 41f775 17104->17105 17106 41f72d 17104->17106 17553 41f78b 17105->17553 17107 41f733 17106->17107 17111 41f750 17106->17111 17110 40e072 __dosmaperr 14 API calls 17107->17110 17109 41f743 17109->17090 17112 41f738 17110->17112 17114 40e072 __dosmaperr 14 API calls 17111->17114 17117 41f76e 17111->17117 17113 40df74 _Ungetc 41 API calls 17112->17113 17113->17109 17115 41f75f 17114->17115 17116 40df74 _Ungetc 41 API calls 17115->17116 17116->17109 17117->17090 17119 4152a2 17118->17119 17122 4152a8 17118->17122 17141 4145dd 17119->17141 17138 4152ac SetLastError 17122->17138 17146 41461c 17122->17146 17127 4152e1 17130 41461c __dosmaperr 6 API calls 17127->17130 17128 4152f2 17129 41461c __dosmaperr 6 API calls 17128->17129 17132 4152fe 17129->17132 17131 4152ef 17130->17131 17158 4140f1 17131->17158 17133 415302 17132->17133 17134 415319 17132->17134 17135 41461c __dosmaperr 6 API calls 17133->17135 17164 414f69 17134->17164 17135->17131 17138->17100 17140 4140f1 ___free_lconv_mon 12 API calls 17140->17138 17169 4143cc 17141->17169 17143 4145f9 17144 414602 17143->17144 17145 414614 TlsGetValue 17143->17145 17144->17122 17147 4143cc __dosmaperr 5 API calls 17146->17147 17148 414638 17147->17148 17149 414641 17148->17149 17150 414656 TlsSetValue 17148->17150 17149->17138 17151 414094 17149->17151 17156 4140a1 __dosmaperr 17151->17156 17152 4140e1 17155 40e072 __dosmaperr 13 API calls 17152->17155 17153 4140cc RtlAllocateHeap 17154 4140df 17153->17154 17153->17156 17154->17127 17154->17128 17155->17154 17156->17152 17156->17153 17183 412e98 17156->17183 17159 414126 17158->17159 17160 4140fc HeapFree 17158->17160 17159->17138 17160->17159 17161 414111 GetLastError 17160->17161 17162 41411e __dosmaperr 17161->17162 17163 40e072 __dosmaperr 12 API calls 17162->17163 17163->17159 17197 414dfd 17164->17197 17170 4143fa 17169->17170 17174 4143f6 __dosmaperr 17169->17174 17170->17174 17175 414301 17170->17175 17173 414414 GetProcAddress 17173->17174 17174->17143 17181 414312 ___vcrt_InitializeCriticalSectionEx 17175->17181 17176 4143a8 17176->17173 17176->17174 17177 414330 LoadLibraryExW 17178 41434b GetLastError 17177->17178 17179 4143af 17177->17179 17178->17181 17179->17176 17180 4143c1 FreeLibrary 17179->17180 17180->17176 17181->17176 17181->17177 17182 41437e LoadLibraryExW 17181->17182 17182->17179 17182->17181 17186 412ec5 17183->17186 17187 412ed1 __FrameHandler3::FrameUnwindToState 17186->17187 17192 40e0c6 EnterCriticalSection 17187->17192 17189 412edc 17193 412f18 17189->17193 17192->17189 17196 40e10e LeaveCriticalSection 17193->17196 17195 412ea3 17195->17156 17196->17195 17198 414e09 __FrameHandler3::FrameUnwindToState 17197->17198 17211 40e0c6 EnterCriticalSection 17198->17211 17200 414e13 17212 414e43 17200->17212 17203 414f0f 17204 414f1b __FrameHandler3::FrameUnwindToState 17203->17204 17216 40e0c6 EnterCriticalSection 17204->17216 17206 414f25 17217 4150f0 17206->17217 17208 414f3d 17221 414f5d 17208->17221 17211->17200 17215 40e10e LeaveCriticalSection 17212->17215 17214 414e31 17214->17203 17215->17214 17216->17206 17218 415126 __Getctype 17217->17218 17219 4150ff __Getctype 17217->17219 17218->17208 17219->17218 17224 41d9f9 17219->17224 17338 40e10e LeaveCriticalSection 17221->17338 17223 414f4b 17223->17140 17225 41da79 17224->17225 17229 41da0f 17224->17229 17226 41dac7 17225->17226 17228 4140f1 ___free_lconv_mon 14 API calls 17225->17228 17292 41db6a 17226->17292 17230 41da9b 17228->17230 17229->17225 17231 41da42 17229->17231 17234 4140f1 ___free_lconv_mon 14 API calls 17229->17234 17232 4140f1 ___free_lconv_mon 14 API calls 17230->17232 17233 41da64 17231->17233 17240 4140f1 ___free_lconv_mon 14 API calls 17231->17240 17235 41daae 17232->17235 17236 4140f1 ___free_lconv_mon 14 API calls 17233->17236 17238 41da37 17234->17238 17239 4140f1 ___free_lconv_mon 14 API calls 17235->17239 17241 41da6e 17236->17241 17237 41db35 17242 4140f1 ___free_lconv_mon 14 API calls 17237->17242 17252 41ccaf 17238->17252 17244 41dabc 17239->17244 17245 41da59 17240->17245 17246 4140f1 ___free_lconv_mon 14 API calls 17241->17246 17247 41db3b 17242->17247 17249 4140f1 ___free_lconv_mon 14 API calls 17244->17249 17280 41d163 17245->17280 17246->17225 17247->17218 17248 41dad5 17248->17237 17251 4140f1 14 API calls ___free_lconv_mon 17248->17251 17249->17226 17251->17248 17253 41ccc0 17252->17253 17279 41cda9 17252->17279 17254 41ccd1 17253->17254 17256 4140f1 ___free_lconv_mon 14 API calls 17253->17256 17255 41cce3 17254->17255 17257 4140f1 ___free_lconv_mon 14 API calls 17254->17257 17258 41ccf5 17255->17258 17259 4140f1 ___free_lconv_mon 14 API calls 17255->17259 17256->17254 17257->17255 17260 41cd07 17258->17260 17261 4140f1 ___free_lconv_mon 14 API calls 17258->17261 17259->17258 17262 4140f1 ___free_lconv_mon 14 API calls 17260->17262 17264 41cd19 17260->17264 17261->17260 17262->17264 17263 4140f1 ___free_lconv_mon 14 API calls 17265 41cd2b 17263->17265 17264->17263 17264->17265 17266 4140f1 ___free_lconv_mon 14 API calls 17265->17266 17268 41cd3d 17265->17268 17266->17268 17267 41cd4f 17270 41cd61 17267->17270 17272 4140f1 ___free_lconv_mon 14 API calls 17267->17272 17268->17267 17269 4140f1 ___free_lconv_mon 14 API calls 17268->17269 17269->17267 17271 41cd73 17270->17271 17273 4140f1 ___free_lconv_mon 14 API calls 17270->17273 17274 41cd85 17271->17274 17275 4140f1 ___free_lconv_mon 14 API calls 17271->17275 17272->17270 17273->17271 17276 41cd97 17274->17276 17277 4140f1 ___free_lconv_mon 14 API calls 17274->17277 17275->17274 17278 4140f1 ___free_lconv_mon 14 API calls 17276->17278 17276->17279 17277->17276 17278->17279 17279->17231 17281 41d170 17280->17281 17291 41d1c8 17280->17291 17282 41d180 17281->17282 17283 4140f1 ___free_lconv_mon 14 API calls 17281->17283 17284 4140f1 ___free_lconv_mon 14 API calls 17282->17284 17288 41d192 17282->17288 17283->17282 17284->17288 17285 4140f1 ___free_lconv_mon 14 API calls 17286 41d1a4 17285->17286 17287 41d1b6 17286->17287 17289 4140f1 ___free_lconv_mon 14 API calls 17286->17289 17290 4140f1 ___free_lconv_mon 14 API calls 17287->17290 17287->17291 17288->17285 17288->17286 17289->17287 17290->17291 17291->17233 17293 41db77 17292->17293 17294 41db96 17292->17294 17293->17294 17298 41d67e 17293->17298 17294->17248 17297 4140f1 ___free_lconv_mon 14 API calls 17297->17294 17299 41d75c 17298->17299 17300 41d68f 17298->17300 17299->17297 17334 41d3dd 17300->17334 17303 41d3dd __Getctype 14 API calls 17304 41d6a2 17303->17304 17305 41d3dd __Getctype 14 API calls 17304->17305 17306 41d6ad 17305->17306 17307 41d3dd __Getctype 14 API calls 17306->17307 17308 41d6b8 17307->17308 17309 41d3dd __Getctype 14 API calls 17308->17309 17310 41d6c6 17309->17310 17311 4140f1 ___free_lconv_mon 14 API calls 17310->17311 17312 41d6d1 17311->17312 17313 4140f1 ___free_lconv_mon 14 API calls 17312->17313 17314 41d6dc 17313->17314 17315 4140f1 ___free_lconv_mon 14 API calls 17314->17315 17316 41d6e7 17315->17316 17335 41d3ef 17334->17335 17336 41d3fe 17335->17336 17337 4140f1 ___free_lconv_mon 14 API calls 17335->17337 17336->17303 17337->17335 17338->17223 17340 40ded2 _Fputc 17339->17340 17345 40def7 17340->17345 17342 40deea 17356 40bbd5 17342->17356 17346 40df0e 17345->17346 17347 40df07 17345->17347 17352 40df1c 17346->17352 17366 40dd4f 17346->17366 17362 40bd36 GetLastError 17347->17362 17350 40df43 17350->17352 17369 40dfa1 IsProcessorFeaturePresent 17350->17369 17352->17342 17353 40df73 17354 40dec0 _Ungetc 41 API calls 17353->17354 17355 40df80 17354->17355 17355->17342 17357 40bbe1 17356->17357 17358 40bbf8 17357->17358 17409 40bd7c 17357->17409 17360 40bd7c _Fputc 41 API calls 17358->17360 17361 40bc0b 17358->17361 17360->17361 17361->17084 17363 40bd4f 17362->17363 17373 41533d 17363->17373 17367 40dd73 17366->17367 17368 40dd5a GetLastError SetLastError 17366->17368 17367->17350 17368->17350 17370 40dfad 17369->17370 17395 40dd78 17370->17395 17374 415350 17373->17374 17375 415356 17373->17375 17376 4145dd __dosmaperr 6 API calls 17374->17376 17377 41461c __dosmaperr 6 API calls 17375->17377 17394 40bd67 SetLastError 17375->17394 17376->17375 17378 415370 17377->17378 17379 414094 __dosmaperr 14 API calls 17378->17379 17378->17394 17380 415380 17379->17380 17381 415388 17380->17381 17382 41539d 17380->17382 17384 41461c __dosmaperr 6 API calls 17381->17384 17383 41461c __dosmaperr 6 API calls 17382->17383 17385 4153a9 17383->17385 17388 415394 17384->17388 17386 4153ad 17385->17386 17387 4153bc 17385->17387 17389 41461c __dosmaperr 6 API calls 17386->17389 17390 414f69 __dosmaperr 14 API calls 17387->17390 17391 4140f1 ___free_lconv_mon 14 API calls 17388->17391 17389->17388 17392 4153c7 17390->17392 17391->17394 17393 4140f1 ___free_lconv_mon 14 API calls 17392->17393 17393->17394 17394->17346 17396 40dd94 codecvt std::locale::_Setgloballocale 17395->17396 17397 40ddc0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17396->17397 17400 40de91 std::locale::_Setgloballocale 17397->17400 17399 40deaf GetCurrentProcess TerminateProcess 17399->17353 17401 407420 17400->17401 17402 407428 17401->17402 17403 407429 IsProcessorFeaturePresent 17401->17403 17402->17399 17405 407db2 17403->17405 17408 407d75 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17405->17408 17407 407e95 17407->17399 17408->17407 17410 40bd86 17409->17410 17411 40bd8f 17409->17411 17412 40bd36 _Fputc 16 API calls 17410->17412 17411->17358 17413 40bd8b 17412->17413 17413->17411 17416 40e13c 17413->17416 17427 4174ae 17416->17427 17419 40e14c 17420 40e156 IsProcessorFeaturePresent 17419->17420 17426 40e175 17419->17426 17422 40e162 17420->17422 17424 40dd78 std::locale::_Setgloballocale 8 API calls 17422->17424 17424->17426 17457 411577 17426->17457 17460 4173e0 17427->17460 17430 4174f3 17431 4174ff __FrameHandler3::FrameUnwindToState 17430->17431 17432 41528c __dosmaperr 14 API calls 17431->17432 17435 41752c std::locale::_Setgloballocale 17431->17435 17437 417526 std::locale::_Setgloballocale 17431->17437 17432->17437 17433 417573 17434 40e072 __dosmaperr 14 API calls 17433->17434 17436 417578 17434->17436 17439 41759f 17435->17439 17471 40e0c6 EnterCriticalSection 17435->17471 17438 40df74 _Ungetc 41 API calls 17436->17438 17437->17433 17437->17435 17456 41755d 17437->17456 17438->17456 17442 4175e1 17439->17442 17443 4176d2 17439->17443 17453 417610 17439->17453 17442->17453 17472 41513b GetLastError 17442->17472 17445 4176dd 17443->17445 17503 40e10e LeaveCriticalSection 17443->17503 17446 411577 std::locale::_Setgloballocale 23 API calls 17445->17446 17448 4176e5 17446->17448 17450 41513b __Getctype 41 API calls 17454 417665 17450->17454 17452 41513b __Getctype 41 API calls 17452->17453 17499 41767f 17453->17499 17455 41513b __Getctype 41 API calls 17454->17455 17454->17456 17455->17456 17456->17419 17505 41139b 17457->17505 17461 4173ec __FrameHandler3::FrameUnwindToState 17460->17461 17466 40e0c6 EnterCriticalSection 17461->17466 17463 4173fa 17467 417438 17463->17467 17466->17463 17470 40e10e LeaveCriticalSection 17467->17470 17469 40e141 17469->17419 17469->17430 17470->17469 17471->17439 17473 415151 17472->17473 17474 415157 17472->17474 17475 4145dd __dosmaperr 6 API calls 17473->17475 17476 41461c __dosmaperr 6 API calls 17474->17476 17478 41515b SetLastError 17474->17478 17475->17474 17477 415173 17476->17477 17477->17478 17480 414094 __dosmaperr 14 API calls 17477->17480 17482 4151f0 17478->17482 17483 4151eb 17478->17483 17481 415188 17480->17481 17485 4151a1 17481->17485 17486 415190 17481->17486 17484 40e13c __purecall 39 API calls 17482->17484 17483->17452 17488 4151f5 17484->17488 17487 41461c __dosmaperr 6 API calls 17485->17487 17489 41461c __dosmaperr 6 API calls 17486->17489 17490 4151ad 17487->17490 17493 41519e 17489->17493 17491 4151b1 17490->17491 17492 4151c8 17490->17492 17494 41461c __dosmaperr 6 API calls 17491->17494 17496 414f69 __dosmaperr 14 API calls 17492->17496 17495 4140f1 ___free_lconv_mon 14 API calls 17493->17495 17494->17493 17495->17478 17497 4151d3 17496->17497 17498 4140f1 ___free_lconv_mon 14 API calls 17497->17498 17498->17478 17500 417685 17499->17500 17501 417656 17499->17501 17504 40e10e LeaveCriticalSection 17500->17504 17501->17450 17501->17454 17501->17456 17503->17445 17504->17501 17506 4113c8 17505->17506 17507 4113da 17505->17507 17532 411463 GetModuleHandleW 17506->17532 17517 411263 17507->17517 17512 40e17f 17518 41126f __FrameHandler3::FrameUnwindToState 17517->17518 17540 40e0c6 EnterCriticalSection 17518->17540 17520 411279 17541 4112b0 17520->17541 17522 411286 17545 4112a4 17522->17545 17525 411432 17548 4114a6 17525->17548 17528 411450 17530 4114c8 std::locale::_Setgloballocale 3 API calls 17528->17530 17529 411440 GetCurrentProcess TerminateProcess 17529->17528 17531 411458 ExitProcess 17530->17531 17533 4113cd 17532->17533 17533->17507 17534 4114c8 GetModuleHandleExW 17533->17534 17535 411507 GetProcAddress 17534->17535 17536 411528 17534->17536 17535->17536 17539 41151b 17535->17539 17537 4113d9 17536->17537 17538 41152e FreeLibrary 17536->17538 17537->17507 17538->17537 17539->17536 17540->17520 17543 4112bc __FrameHandler3::FrameUnwindToState 17541->17543 17542 411323 std::locale::_Setgloballocale 17542->17522 17543->17542 17544 4131c9 std::locale::_Setgloballocale 14 API calls 17543->17544 17544->17542 17546 40e10e std::_Lockit::~_Lockit LeaveCriticalSection 17545->17546 17547 411292 17546->17547 17547->17512 17547->17525 17549 41914c std::locale::_Setgloballocale 6 API calls 17548->17549 17550 4114ab 17549->17550 17551 4114b0 GetPEB 17550->17551 17552 41143c 17550->17552 17551->17552 17552->17528 17552->17529 17554 41f7b5 17553->17554 17555 41f79b 17553->17555 17557 41f7d4 17554->17557 17558 41f7bd 17554->17558 17556 40e072 __dosmaperr 14 API calls 17555->17556 17559 41f7a0 17556->17559 17561 41f7e0 17557->17561 17562 41f7f7 17557->17562 17560 40e072 __dosmaperr 14 API calls 17558->17560 17563 40df74 _Ungetc 41 API calls 17559->17563 17564 41f7c2 17560->17564 17565 40e072 __dosmaperr 14 API calls 17561->17565 17569 41f7ab 17562->17569 17571 40fc60 17562->17571 17563->17569 17567 40df74 _Ungetc 41 API calls 17564->17567 17568 41f7e5 17565->17568 17567->17569 17570 40df74 _Ungetc 41 API calls 17568->17570 17569->17109 17570->17569 17572 40fc77 17571->17572 17573 40fc7e 17571->17573 17572->17569 17573->17572 17574 41513b __Getctype 41 API calls 17573->17574 17575 40fc9f 17574->17575 17579 415474 17575->17579 17580 415487 17579->17580 17581 40fcb5 17579->17581 17580->17581 17587 41dc45 17580->17587 17583 4154d2 17581->17583 17584 4154e5 17583->17584 17585 4154fa 17583->17585 17584->17585 17609 41c183 17584->17609 17585->17572 17588 41dc51 __FrameHandler3::FrameUnwindToState 17587->17588 17589 41513b __Getctype 41 API calls 17588->17589 17590 41dc5a 17589->17590 17597 41dca0 17590->17597 17600 40e0c6 EnterCriticalSection 17590->17600 17592 41dc78 17601 41dcc6 17592->17601 17597->17581 17598 40e13c __purecall 41 API calls 17599 41dcc5 17598->17599 17600->17592 17602 41dc89 17601->17602 17603 41dcd4 __Getctype 17601->17603 17605 41dca5 17602->17605 17603->17602 17604 41d9f9 __Getctype 14 API calls 17603->17604 17604->17602 17608 40e10e LeaveCriticalSection 17605->17608 17607 41dc9c 17607->17597 17607->17598 17608->17607 17610 41513b __Getctype 41 API calls 17609->17610 17611 41c188 17610->17611 17614 41c09b 17611->17614 17615 41c0a7 __FrameHandler3::FrameUnwindToState 17614->17615 17621 41c0c1 17615->17621 17625 40e0c6 EnterCriticalSection 17615->17625 17617 41c0fd 17626 41c11a 17617->17626 17619 40e13c __purecall 41 API calls 17622 41c13a 17619->17622 17620 41c0c8 17620->17585 17621->17619 17621->17620 17623 41c0d1 17623->17617 17624 4140f1 ___free_lconv_mon 14 API calls 17623->17624 17624->17617 17625->17623 17629 40e10e LeaveCriticalSection 17626->17629 17628 41c121 17628->17621 17629->17628 17632 41f862 __FrameHandler3::FrameUnwindToState 17630->17632 17631 41f869 17633 40e072 __dosmaperr 14 API calls 17631->17633 17632->17631 17634 41f894 17632->17634 17635 41f86e 17633->17635 17641 41fe1e 17634->17641 17637 40df74 _Ungetc 41 API calls 17635->17637 17640 41f878 17637->17640 17640->17077 17654 41b2f4 17641->17654 17647 41fe54 17648 4140f1 ___free_lconv_mon 14 API calls 17647->17648 17649 41f8b8 17647->17649 17648->17649 17650 41f8eb 17649->17650 17651 41f8f1 17650->17651 17652 41f915 17650->17652 18145 41ca68 LeaveCriticalSection 17651->18145 17652->17640 17655 40fc60 __wsopen_s 41 API calls 17654->17655 17656 41b306 17655->17656 17657 41b318 17656->17657 17708 41448f 17656->17708 17659 410964 17657->17659 17714 4107f0 17659->17714 17662 41feaf 17663 41fecc 17662->17663 17664 41fee1 17663->17664 17665 41fefa 17663->17665 17667 40e05f __dosmaperr 14 API calls 17664->17667 17762 41ca8b 17665->17762 17682 41fee6 17667->17682 17669 41ff08 17671 40e05f __dosmaperr 14 API calls 17669->17671 17670 41ff1f 17775 41fb65 CreateFileW 17670->17775 17674 41ff0d 17671->17674 17673 40e072 __dosmaperr 14 API calls 17698 41fef3 17673->17698 17675 40e072 __dosmaperr 14 API calls 17674->17675 17675->17682 17676 41ffd5 GetFileType 17677 41ffe0 GetLastError 17676->17677 17684 420027 17676->17684 17680 40e018 __dosmaperr 14 API calls 17677->17680 17678 41ffaa GetLastError 17679 40e018 __dosmaperr 14 API calls 17678->17679 17679->17682 17683 41ffee CloseHandle 17680->17683 17681 41ff58 17681->17676 17681->17678 17776 41fb65 CreateFileW 17681->17776 17682->17673 17683->17682 17688 420017 17683->17688 17777 41c9d6 17684->17777 17687 41ff9d 17687->17676 17687->17678 17690 40e072 __dosmaperr 14 API calls 17688->17690 17692 42001c 17690->17692 17691 420094 17696 42009b 17691->17696 17807 41f917 17691->17807 17692->17682 17801 414d2d 17696->17801 17697 4200d7 17697->17698 17700 420153 CloseHandle 17697->17700 17698->17647 17834 41fb65 CreateFileW 17700->17834 17702 42017e 17703 4201b4 17702->17703 17704 420188 GetLastError 17702->17704 17703->17698 17705 40e018 __dosmaperr 14 API calls 17704->17705 17706 420194 17705->17706 17835 41cb9e 17706->17835 17711 4141e3 17708->17711 17712 4143cc __dosmaperr 5 API calls 17711->17712 17713 4141f9 17712->17713 17713->17657 17715 410818 17714->17715 17716 4107fe 17714->17716 17718 41081f 17715->17718 17719 41083e 17715->17719 17732 4109a5 17716->17732 17720 410808 17718->17720 17736 4109e6 17718->17736 17741 41b00f 17719->17741 17720->17647 17720->17662 17723 41084d 17724 410854 GetLastError 17723->17724 17726 41087a 17723->17726 17728 4109e6 __wsopen_s 15 API calls 17723->17728 17744 40e018 17724->17744 17726->17720 17729 41b00f __wsopen_s MultiByteToWideChar 17726->17729 17728->17726 17731 410891 17729->17731 17730 40e072 __dosmaperr 14 API calls 17730->17720 17731->17720 17731->17724 17733 4109b0 17732->17733 17734 4109b8 17732->17734 17735 4140f1 ___free_lconv_mon 14 API calls 17733->17735 17734->17720 17735->17734 17737 4109a5 __wsopen_s 14 API calls 17736->17737 17738 4109f4 17737->17738 17749 410a25 17738->17749 17742 41b020 MultiByteToWideChar 17741->17742 17742->17723 17759 40e05f 17744->17759 17746 40e023 __dosmaperr 17747 40e072 __dosmaperr 14 API calls 17746->17747 17748 40e036 17747->17748 17748->17730 17752 415426 17749->17752 17753 415464 17752->17753 17757 415434 __dosmaperr 17752->17757 17754 40e072 __dosmaperr 14 API calls 17753->17754 17756 410a05 17754->17756 17755 41544f HeapAlloc 17755->17756 17755->17757 17756->17720 17757->17753 17757->17755 17758 412e98 std::_Facet_Register 2 API calls 17757->17758 17758->17757 17760 41528c __dosmaperr 14 API calls 17759->17760 17761 40e064 17760->17761 17761->17746 17763 41ca97 __FrameHandler3::FrameUnwindToState 17762->17763 17844 40e0c6 EnterCriticalSection 17763->17844 17765 41cae5 17845 41cb95 17765->17845 17766 41cac3 17848 41c865 17766->17848 17767 41ca9e 17767->17765 17767->17766 17772 41cb32 EnterCriticalSection 17767->17772 17772->17765 17773 41cb3f LeaveCriticalSection 17772->17773 17773->17767 17775->17681 17776->17687 17778 41c9e5 17777->17778 17779 41ca4e 17777->17779 17778->17779 17784 41ca0b __wsopen_s 17778->17784 17780 40e072 __dosmaperr 14 API calls 17779->17780 17781 41ca53 17780->17781 17782 40e05f __dosmaperr 14 API calls 17781->17782 17783 41ca3b 17782->17783 17783->17691 17786 41fd74 17783->17786 17784->17783 17785 41ca35 SetStdHandle 17784->17785 17785->17783 17787 41fd9c 17786->17787 17799 41fdce 17786->17799 17787->17799 17862 418ab3 17787->17862 17790 41fdd2 17868 422232 17790->17868 17791 41fdbc 17793 40e05f __dosmaperr 14 API calls 17791->17793 17795 41fdc1 17793->17795 17797 40e072 __dosmaperr 14 API calls 17795->17797 17795->17799 17797->17799 17799->17691 17802 414d40 _Fputc 17801->17802 18103 414d5d 17802->18103 17804 414d4c 17805 40bbd5 _Fputc 41 API calls 17804->17805 17806 414d58 17805->17806 17806->17698 17808 41fa2b 17807->17808 17809 41f948 17807->17809 17808->17696 17808->17697 17817 41f968 17809->17817 18116 4115c9 17809->18116 17811 41f95f 17812 41fb5a 17811->17812 17811->17817 17813 40dfa1 __Getctype 11 API calls 17812->17813 17814 41fb64 17813->17814 17815 41fa51 17815->17808 17816 422232 __wsopen_s 53 API calls 17815->17816 17820 41fa5b 17815->17820 17827 41fa83 17816->17827 17817->17808 17817->17815 17818 418ab3 __wsopen_s 43 API calls 17817->17818 17819 41fa22 17817->17819 17821 41fa3b 17818->17821 17819->17808 17819->17820 18123 416c70 17819->18123 17820->17808 17826 40e072 __dosmaperr 14 API calls 17820->17826 17821->17819 17824 41fa46 17821->17824 17822 41fac8 17828 41faee 17822->17828 17831 41fad0 17822->17831 17823 41fabb 17829 40e072 __dosmaperr 14 API calls 17823->17829 17830 418ab3 __wsopen_s 43 API calls 17824->17830 17826->17808 17827->17808 17827->17820 17827->17822 17827->17823 17827->17828 17832 418ab3 __wsopen_s 43 API calls 17828->17832 17829->17820 17830->17815 17833 418ab3 __wsopen_s 43 API calls 17831->17833 17832->17820 17833->17820 17834->17702 17836 41cc14 17835->17836 17837 41cbad 17835->17837 17838 40e072 __dosmaperr 14 API calls 17836->17838 17837->17836 17843 41cbd7 __wsopen_s 17837->17843 17839 41cc19 17838->17839 17840 40e05f __dosmaperr 14 API calls 17839->17840 17841 41cc04 17840->17841 17841->17703 17842 41cbfe SetStdHandle 17842->17841 17843->17841 17843->17842 17844->17767 17856 40e10e LeaveCriticalSection 17845->17856 17847 41cb05 17847->17669 17847->17670 17849 414094 __dosmaperr 14 API calls 17848->17849 17851 41c877 17849->17851 17850 41c884 17852 4140f1 ___free_lconv_mon 14 API calls 17850->17852 17851->17850 17857 4146d9 17851->17857 17853 41c8d9 17852->17853 17853->17765 17855 41c9b3 EnterCriticalSection 17853->17855 17855->17765 17856->17847 17858 4143cc __dosmaperr 5 API calls 17857->17858 17859 4146f5 17858->17859 17860 414713 InitializeCriticalSectionAndSpinCount 17859->17860 17861 4146fe 17859->17861 17860->17861 17861->17851 17863 418ac7 _Fputc 17862->17863 17937 4189d2 17863->17937 17865 418adc 17866 40bbd5 _Fputc 41 API calls 17865->17866 17867 418aeb 17866->17867 17867->17790 17867->17791 17869 422244 17868->17869 17870 42225c 17868->17870 17871 40e05f __dosmaperr 14 API calls 17869->17871 17872 4225b2 17870->17872 17880 4222a2 17870->17880 17943 41cc2f 17937->17943 17939 4189e4 17940 418a00 SetFilePointerEx 17939->17940 17942 4189ec __wsopen_s 17939->17942 17941 418a18 GetLastError 17940->17941 17940->17942 17941->17942 17942->17865 17944 41cc51 17943->17944 17945 41cc3c 17943->17945 17948 40e05f __dosmaperr 14 API calls 17944->17948 17950 41cc76 17944->17950 17946 40e05f __dosmaperr 14 API calls 17945->17946 17947 41cc41 17946->17947 17949 40e072 __dosmaperr 14 API calls 17947->17949 17951 41cc81 17948->17951 17952 41cc49 17949->17952 17950->17939 17953 40e072 __dosmaperr 14 API calls 17951->17953 17952->17939 17954 41cc89 17953->17954 17955 40df74 _Ungetc 41 API calls 17954->17955 17955->17952 18104 41cc2f __wsopen_s 41 API calls 18103->18104 18107 414d6d 18104->18107 18105 414d73 18106 41cb9e __wsopen_s 15 API calls 18105->18106 18110 414dcb __wsopen_s 18106->18110 18107->18105 18108 41cc2f __wsopen_s 41 API calls 18107->18108 18115 414da5 18107->18115 18111 414d9c 18108->18111 18109 41cc2f __wsopen_s 41 API calls 18112 414db1 CloseHandle 18109->18112 18110->17804 18113 41cc2f __wsopen_s 41 API calls 18111->18113 18112->18105 18114 414dbd GetLastError 18112->18114 18113->18115 18114->18105 18115->18105 18115->18109 18117 4115d5 18116->18117 18118 4115ea 18116->18118 18119 40e072 __dosmaperr 14 API calls 18117->18119 18118->17811 18120 4115da 18119->18120 18121 40df74 _Ungetc 41 API calls 18120->18121 18122 4115e5 18121->18122 18122->17811 18124 416c83 _Fputc 18123->18124 18129 416ca7 18124->18129 18127 40bbd5 _Fputc 41 API calls 18128 416ca2 18127->18128 18128->17819 18130 416cb3 __FrameHandler3::FrameUnwindToState 18129->18130 18131 416d77 18130->18131 18133 416d08 18130->18133 18139 416c95 18130->18139 18132 40def7 _Fputc 41 API calls 18131->18132 18132->18139 18140 41c9b3 EnterCriticalSection 18133->18140 18135 416d0e 18136 416d2b 18135->18136 18137 416daf __wsopen_s 64 API calls 18135->18137 18141 416d6f 18136->18141 18137->18136 18139->18127 18140->18135 18144 41ca68 LeaveCriticalSection 18141->18144 18143 416d75 18143->18139 18144->18143 18145->17652 22063 40edff 22064 40ee11 22063->22064 22068 40ee1a ___scrt_uninitialize_crt 22063->22068 22065 40ec83 ___scrt_uninitialize_crt 70 API calls 22064->22065 22066 40ee17 22065->22066 22067 40ee2b 22068->22067 22071 40ec23 22068->22071 22072 40ec2f __FrameHandler3::FrameUnwindToState 22071->22072 22079 40bb65 EnterCriticalSection 22072->22079 22074 40ec3d 22075 40ed91 ___scrt_uninitialize_crt 70 API calls 22074->22075 22076 40ec4e 22075->22076 22080 40ec77 22076->22080 22079->22074 22083 40bb79 LeaveCriticalSection 22080->22083 22082 40ec60 22083->22082 18146 407294 18147 4072a0 __FrameHandler3::FrameUnwindToState 18146->18147 18172 407505 18147->18172 18149 4072a7 18150 407400 18149->18150 18160 4072d1 ___scrt_release_startup_lock std::locale::_Setgloballocale 18149->18160 18209 407b01 IsProcessorFeaturePresent 18150->18209 18152 407407 18190 4115b3 18152->18190 18155 411577 std::locale::_Setgloballocale 23 API calls 18156 407415 18155->18156 18157 4072f0 18158 407371 18183 4111f1 18158->18183 18160->18157 18160->18158 18193 41158d 18160->18193 18162 407377 18187 403ee0 CreateThread WaitForSingleObject 18162->18187 18167 40739c 18168 4073a5 18167->18168 18200 411568 18167->18200 18203 407676 18168->18203 18173 40750e 18172->18173 18213 4077e0 IsProcessorFeaturePresent 18173->18213 18177 40751f 18182 407523 18177->18182 18223 41335e 18177->18223 18180 40753a 18180->18149 18182->18149 18184 4111ff 18183->18184 18185 4111fa 18183->18185 18184->18162 18337 410f4b 18185->18337 18188 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18187->18188 18604 4038c0 18187->18604 18189 403f22 18188->18189 18198 407c21 GetModuleHandleW 18189->18198 18191 41139b std::locale::_Setgloballocale 23 API calls 18190->18191 18192 40740d 18191->18192 18192->18155 18194 4115a3 __dosmaperr 18193->18194 18197 4107b4 __FrameHandler3::FrameUnwindToState 18193->18197 18194->18158 18195 41513b __Getctype 41 API calls 18195->18197 18196 40e13c __purecall 41 API calls 18196->18197 18197->18193 18197->18195 18197->18196 18199 407398 18198->18199 18199->18152 18199->18167 18201 41139b std::locale::_Setgloballocale 23 API calls 18200->18201 18202 411573 18201->18202 18202->18168 18204 407682 18203->18204 18205 4073ae 18204->18205 19645 413370 18204->19645 18205->18157 18207 407690 18208 40a5ad ___scrt_uninitialize_crt 7 API calls 18207->18208 18208->18205 18210 407b17 codecvt std::locale::_Setgloballocale 18209->18210 18211 407bc2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18210->18211 18212 407c0d std::locale::_Setgloballocale 18211->18212 18212->18152 18214 40751a 18213->18214 18215 40a58e 18214->18215 18232 40b667 18215->18232 18219 40a59f 18220 40a5aa 18219->18220 18246 40b6a3 18219->18246 18220->18177 18222 40a597 18222->18177 18286 41eff3 18223->18286 18226 40a5ad 18227 40a5c0 18226->18227 18228 40a5b6 18226->18228 18227->18182 18229 40a726 ___vcrt_uninitialize_ptd 6 API calls 18228->18229 18230 40a5bb 18229->18230 18231 40b6a3 ___vcrt_uninitialize_locks DeleteCriticalSection 18230->18231 18231->18227 18233 40b670 18232->18233 18235 40b699 18233->18235 18237 40a593 18233->18237 18250 40b8ac 18233->18250 18236 40b6a3 ___vcrt_uninitialize_locks DeleteCriticalSection 18235->18236 18236->18237 18237->18222 18238 40a6f3 18237->18238 18267 40b7bd 18238->18267 18241 40a708 18241->18219 18244 40a723 18244->18219 18247 40b6cd 18246->18247 18248 40b6ae 18246->18248 18247->18222 18249 40b6b8 DeleteCriticalSection 18248->18249 18249->18247 18249->18249 18255 40b6d2 18250->18255 18253 40b8e4 InitializeCriticalSectionAndSpinCount 18254 40b8cf 18253->18254 18254->18233 18256 40b6ef 18255->18256 18259 40b6f3 18255->18259 18256->18253 18256->18254 18257 40b75b GetProcAddress 18257->18256 18259->18256 18259->18257 18260 40b74c 18259->18260 18262 40b772 LoadLibraryExW 18259->18262 18260->18257 18261 40b754 FreeLibrary 18260->18261 18261->18257 18263 40b789 GetLastError 18262->18263 18264 40b7b9 18262->18264 18263->18264 18265 40b794 ___vcrt_InitializeCriticalSectionEx 18263->18265 18264->18259 18265->18264 18266 40b7aa LoadLibraryExW 18265->18266 18266->18259 18268 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18267->18268 18269 40b7d7 18268->18269 18270 40b7f0 TlsAlloc 18269->18270 18271 40a6fd 18269->18271 18271->18241 18272 40b86e 18271->18272 18273 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18272->18273 18274 40b888 18273->18274 18275 40b8a3 TlsSetValue 18274->18275 18276 40a716 18274->18276 18275->18276 18276->18244 18277 40a726 18276->18277 18278 40a730 18277->18278 18279 40a736 18277->18279 18281 40b7f8 18278->18281 18279->18241 18282 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18281->18282 18283 40b812 18282->18283 18284 40b82a TlsFree 18283->18284 18285 40b81e 18283->18285 18284->18285 18285->18279 18287 41f003 18286->18287 18288 40752c 18286->18288 18287->18288 18291 414b46 18287->18291 18303 414a96 18287->18303 18288->18180 18288->18226 18292 414b52 __FrameHandler3::FrameUnwindToState 18291->18292 18308 40e0c6 EnterCriticalSection 18292->18308 18294 414b59 18309 41c915 18294->18309 18297 414b77 18328 414b9d 18297->18328 18302 414a96 2 API calls 18302->18297 18304 414a9d 18303->18304 18305 414ae0 GetStdHandle 18304->18305 18306 414b42 18304->18306 18307 414af3 GetFileType 18304->18307 18305->18304 18306->18287 18307->18304 18308->18294 18310 41c921 __FrameHandler3::FrameUnwindToState 18309->18310 18311 41c94b 18310->18311 18312 41c92a 18310->18312 18331 40e0c6 EnterCriticalSection 18311->18331 18314 40e072 __dosmaperr 14 API calls 18312->18314 18315 41c92f 18314->18315 18316 40df74 _Ungetc 41 API calls 18315->18316 18318 414b68 18316->18318 18317 41c983 18332 41c9aa 18317->18332 18318->18297 18322 4149e0 GetStartupInfoW 18318->18322 18320 41c865 __wsopen_s 15 API calls 18321 41c957 18320->18321 18321->18317 18321->18320 18323 414a91 18322->18323 18324 4149fd 18322->18324 18323->18302 18324->18323 18325 41c915 42 API calls 18324->18325 18326 414a25 18325->18326 18326->18323 18327 414a55 GetFileType 18326->18327 18327->18326 18336 40e10e LeaveCriticalSection 18328->18336 18330 414b88 18330->18287 18331->18321 18335 40e10e LeaveCriticalSection 18332->18335 18334 41c9b1 18334->18318 18335->18334 18336->18330 18338 410f54 18337->18338 18339 410f6a 18337->18339 18338->18339 18343 410f77 18338->18343 18339->18184 18341 410f61 18341->18339 18360 4110e2 18341->18360 18344 410f80 18343->18344 18345 410f83 18343->18345 18344->18341 18368 41c13b 18345->18368 18350 410fa0 18395 410fd1 18350->18395 18351 410f94 18352 4140f1 ___free_lconv_mon 14 API calls 18351->18352 18354 410f9a 18352->18354 18354->18341 18356 4140f1 ___free_lconv_mon 14 API calls 18357 410fc4 18356->18357 18358 4140f1 ___free_lconv_mon 14 API calls 18357->18358 18359 410fca 18358->18359 18359->18341 18361 4110f1 18360->18361 18362 411153 18360->18362 18361->18362 18363 414094 __dosmaperr 14 API calls 18361->18363 18364 411157 18361->18364 18365 41b08b WideCharToMultiByte _Fputc 18361->18365 18367 4140f1 ___free_lconv_mon 14 API calls 18361->18367 18362->18339 18363->18361 18366 4140f1 ___free_lconv_mon 14 API calls 18364->18366 18365->18361 18366->18362 18367->18361 18369 41c144 18368->18369 18373 410f89 18368->18373 18417 4151f6 18369->18417 18374 41c43d GetEnvironmentStringsW 18373->18374 18375 41c455 18374->18375 18380 410f8e 18374->18380 18376 41b08b _Fputc WideCharToMultiByte 18375->18376 18377 41c472 18376->18377 18378 41c487 18377->18378 18379 41c47c FreeEnvironmentStringsW 18377->18379 18381 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18378->18381 18379->18380 18380->18350 18380->18351 18382 41c48e 18381->18382 18383 41c4a7 18382->18383 18384 41c496 18382->18384 18386 41b08b _Fputc WideCharToMultiByte 18383->18386 18385 4140f1 ___free_lconv_mon 14 API calls 18384->18385 18387 41c49b FreeEnvironmentStringsW 18385->18387 18388 41c4b7 18386->18388 18387->18380 18389 41c4c6 18388->18389 18390 41c4be 18388->18390 18392 4140f1 ___free_lconv_mon 14 API calls 18389->18392 18391 4140f1 ___free_lconv_mon 14 API calls 18390->18391 18393 41c4c4 FreeEnvironmentStringsW 18391->18393 18392->18393 18393->18380 18396 410fe6 18395->18396 18397 414094 __dosmaperr 14 API calls 18396->18397 18398 41100d 18397->18398 18399 411015 18398->18399 18408 41101f 18398->18408 18400 4140f1 ___free_lconv_mon 14 API calls 18399->18400 18416 410fa7 18400->18416 18401 41107c 18402 4140f1 ___free_lconv_mon 14 API calls 18401->18402 18402->18416 18403 414094 __dosmaperr 14 API calls 18403->18408 18404 41108b 18598 4110b3 18404->18598 18408->18401 18408->18403 18408->18404 18409 4110a6 18408->18409 18411 4140f1 ___free_lconv_mon 14 API calls 18408->18411 18589 4133ff 18408->18589 18412 40dfa1 __Getctype 11 API calls 18409->18412 18410 4140f1 ___free_lconv_mon 14 API calls 18413 411098 18410->18413 18411->18408 18414 4110b2 18412->18414 18415 4140f1 ___free_lconv_mon 14 API calls 18413->18415 18415->18416 18416->18356 18418 415201 18417->18418 18421 415207 18417->18421 18419 4145dd __dosmaperr 6 API calls 18418->18419 18419->18421 18420 41461c __dosmaperr 6 API calls 18423 415221 18420->18423 18421->18420 18422 41520d 18421->18422 18424 40e13c __purecall 41 API calls 18422->18424 18425 415212 18422->18425 18423->18422 18426 414094 __dosmaperr 14 API calls 18423->18426 18427 41528b 18424->18427 18442 41bf46 18425->18442 18428 415231 18426->18428 18429 415239 18428->18429 18430 41524e 18428->18430 18431 41461c __dosmaperr 6 API calls 18429->18431 18432 41461c __dosmaperr 6 API calls 18430->18432 18433 415245 18431->18433 18434 41525a 18432->18434 18437 4140f1 ___free_lconv_mon 14 API calls 18433->18437 18435 41526d 18434->18435 18436 41525e 18434->18436 18439 414f69 __dosmaperr 14 API calls 18435->18439 18438 41461c __dosmaperr 6 API calls 18436->18438 18437->18422 18438->18433 18440 415278 18439->18440 18441 4140f1 ___free_lconv_mon 14 API calls 18440->18441 18441->18425 18443 41c09b __wsopen_s 41 API calls 18442->18443 18444 41bf70 18443->18444 18465 41bcc6 18444->18465 18447 41bf89 18447->18373 18448 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18449 41bf9a 18448->18449 18450 41bfb0 18449->18450 18451 41bfa2 18449->18451 18472 41c196 18450->18472 18452 4140f1 ___free_lconv_mon 14 API calls 18451->18452 18452->18447 18455 41bfe8 18456 40e072 __dosmaperr 14 API calls 18455->18456 18457 41bfed 18456->18457 18459 4140f1 ___free_lconv_mon 14 API calls 18457->18459 18458 41c003 18460 4140f1 ___free_lconv_mon 14 API calls 18458->18460 18463 41c02f 18458->18463 18459->18447 18460->18463 18462 4140f1 ___free_lconv_mon 14 API calls 18462->18447 18464 41c078 18463->18464 18483 41bbb8 18463->18483 18464->18462 18466 40fc60 __wsopen_s 41 API calls 18465->18466 18467 41bcd8 18466->18467 18468 41bce7 GetOEMCP 18467->18468 18469 41bcf9 18467->18469 18470 41bd10 18468->18470 18469->18470 18471 41bcfe GetACP 18469->18471 18470->18447 18470->18448 18471->18470 18473 41bcc6 43 API calls 18472->18473 18474 41c1b6 18473->18474 18475 41c1f3 IsValidCodePage 18474->18475 18476 41c22f codecvt 18474->18476 18475->18476 18479 41c205 18475->18479 18477 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18476->18477 18478 41bfdd 18477->18478 18478->18455 18478->18458 18480 41c234 GetCPInfo 18479->18480 18482 41c20e codecvt 18479->18482 18480->18476 18480->18482 18491 41bd9a 18482->18491 18484 41bbc4 __FrameHandler3::FrameUnwindToState 18483->18484 18563 40e0c6 EnterCriticalSection 18484->18563 18486 41bbce 18564 41bc05 18486->18564 18492 41bdc2 GetCPInfo 18491->18492 18501 41be8b 18491->18501 18493 41bdda 18492->18493 18492->18501 18502 418da8 18493->18502 18495 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18497 41bf44 18495->18497 18497->18476 18501->18495 18503 40fc60 __wsopen_s 41 API calls 18502->18503 18504 418dc8 18503->18504 18505 41b00f __wsopen_s MultiByteToWideChar 18504->18505 18509 418df5 18505->18509 18506 418e8c 18508 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18506->18508 18507 418e84 18522 40716c 18507->18522 18510 418eaf 18508->18510 18509->18506 18509->18507 18512 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18509->18512 18513 418e1a __alloca_probe_16 codecvt 18509->18513 18517 41909f 18510->18517 18512->18513 18513->18507 18514 41b00f __wsopen_s MultiByteToWideChar 18513->18514 18515 418e65 18514->18515 18515->18507 18516 418e70 GetStringTypeW 18515->18516 18516->18507 18523 407176 18522->18523 18524 407187 18522->18524 18523->18524 18526 40dd34 18523->18526 18524->18506 18563->18486 18574 410178 18564->18574 18566 41bc27 18567 410178 41 API calls 18566->18567 18568 41bc46 18567->18568 18575 410189 18574->18575 18578 410185 codecvt 18574->18578 18576 410190 18575->18576 18581 4101a3 codecvt 18575->18581 18577 40e072 __dosmaperr 14 API calls 18576->18577 18579 410195 18577->18579 18578->18566 18581->18578 18582 4101d1 18581->18582 18583 4101da 18581->18583 18584 40e072 __dosmaperr 14 API calls 18582->18584 18583->18578 18586 40e072 __dosmaperr 14 API calls 18583->18586 18590 41340d 18589->18590 18591 41341b 18589->18591 18590->18591 18595 413433 18590->18595 18592 40e072 __dosmaperr 14 API calls 18591->18592 18597 413423 18592->18597 18593 40df74 _Ungetc 41 API calls 18594 41342d 18593->18594 18594->18408 18595->18594 18596 40e072 __dosmaperr 14 API calls 18595->18596 18596->18597 18597->18593 18599 4110c0 18598->18599 18600 411091 18598->18600 18601 4110d7 18599->18601 18602 4140f1 ___free_lconv_mon 14 API calls 18599->18602 18600->18410 18603 4140f1 ___free_lconv_mon 14 API calls 18601->18603 18602->18599 18603->18600 18643 40742e 18604->18643 18606 4038e3 std::ios_base::_Ios_base_dtor 18607 403902 LoadLibraryW 18606->18607 18653 402320 18607->18653 18645 407433 18643->18645 18646 40744d 18645->18646 18647 412e98 std::_Facet_Register 2 API calls 18645->18647 18649 40744f std::_Facet_Register 18645->18649 18739 40e180 18645->18739 18646->18606 18647->18645 18648 407f8e std::_Facet_Register 18650 408090 CallUnexpected RaiseException 18648->18650 18649->18648 18748 408090 18649->18748 18652 407fab 18650->18652 18656 402368 std::ios_base::_Ios_base_dtor 18653->18656 18660 4036c0 std::ios_base::_Ios_base_dtor 18653->18660 18654 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18655 403723 18654->18655 18664 401fd0 18655->18664 18657 404390 std::ios_base::_Init 43 API calls 18656->18657 18659 4036c2 18656->18659 18656->18660 18661 403727 18656->18661 18751 401110 18656->18751 18657->18656 18659->18660 18659->18661 18660->18654 18755 40df84 18661->18755 18982 403fc0 18664->18982 18740 415426 18739->18740 18741 415464 18740->18741 18743 41544f HeapAlloc 18740->18743 18746 415438 __dosmaperr 18740->18746 18742 40e072 __dosmaperr 14 API calls 18741->18742 18745 415469 18742->18745 18744 415462 18743->18744 18743->18746 18744->18745 18745->18645 18746->18741 18746->18743 18747 412e98 std::_Facet_Register 2 API calls 18746->18747 18747->18746 18749 4080d7 RaiseException 18748->18749 18750 4080aa 18748->18750 18749->18648 18750->18749 18752 401122 18751->18752 18760 40d98e 18752->18760 18756 40dec0 _Ungetc 41 API calls 18755->18756 18757 40df93 18756->18757 18758 40dfa1 __Getctype 11 API calls 18757->18758 18759 40dfa0 18758->18759 18761 40d9a2 _Fputc 18760->18761 18762 40d9c4 18761->18762 18763 40d9eb 18761->18763 18764 40def7 _Fputc 41 API calls 18762->18764 18769 40bdc9 18763->18769 18766 40d9df 18764->18766 18767 40bbd5 _Fputc 41 API calls 18766->18767 18768 40113c 18767->18768 18768->18656 18770 40bdd5 __FrameHandler3::FrameUnwindToState 18769->18770 18777 40bb65 EnterCriticalSection 18770->18777 18772 40bde3 18778 40c97a 18772->18778 18777->18772 18792 4163d8 18778->18792 18780 40c9a1 18801 40cb85 18780->18801 18787 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18823 41639d 18792->18823 18794 4163e9 18795 416462 18794->18795 18796 416439 18794->18796 18795->18780 18797 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18796->18797 18798 416443 18797->18798 18799 4140f1 ___free_lconv_mon 14 API calls 18798->18799 18800 41644c 18799->18800 18800->18795 18836 40d7a6 18801->18836 18804 40cbae 18805 40def7 _Fputc 41 API calls 18804->18805 18806 40c9e8 18805->18806 18816 40c93c 18806->18816 18809 40d730 _Fputc 41 API calls 18811 40cbd9 std::_Locinfo::_Locinfo_ctor 18809->18811 18811->18806 18811->18809 18812 40cdb6 18811->18812 18842 40cb0d 18811->18842 18845 40ce31 18811->18845 18879 40cf8f 18811->18879 18813 40def7 _Fputc 41 API calls 18812->18813 18814 40cdd2 18813->18814 18815 40def7 _Fputc 41 API calls 18814->18815 18815->18806 18817 4140f1 ___free_lconv_mon 14 API calls 18816->18817 18818 40c94c 18817->18818 18819 416484 18818->18819 18820 40ca02 18819->18820 18821 41648f 18819->18821 18820->18787 18821->18820 18975 40ed28 18821->18975 18824 4163a9 18823->18824 18828 4163ca 18824->18828 18829 414bd2 18824->18829 18826 4163c4 18827 421bd0 __wsopen_s 41 API calls 18826->18827 18827->18828 18828->18794 18830 414bf3 18829->18830 18831 414bde 18829->18831 18830->18826 18832 40e072 __dosmaperr 14 API calls 18831->18832 18833 414be3 18832->18833 18834 40df74 _Ungetc 41 API calls 18833->18834 18835 414bee 18834->18835 18835->18826 18837 40d7b1 18836->18837 18838 40d7d3 18836->18838 18839 40def7 _Fputc 41 API calls 18837->18839 18908 40d7de 18838->18908 18841 40cba0 18839->18841 18841->18804 18841->18806 18841->18811 18916 40bf1f 18842->18916 18846 40ce38 18845->18846 18847 40ce4f 18845->18847 18848 40cfb3 18846->18848 18849 40d024 18846->18849 18858 40ce8e 18846->18858 18850 40def7 _Fputc 41 API calls 18847->18850 18847->18858 18853 40d051 18848->18853 18854 40cfb9 18848->18854 18851 40d077 18849->18851 18852 40d029 18849->18852 18855 40ce83 18850->18855 18851->18853 18861 40cff6 18851->18861 18878 40cfdb 18851->18878 18856 40d06b 18852->18856 18857 40d02b 18852->18857 18945 40c2c9 18853->18945 18854->18861 18866 40cfbf 18854->18866 18855->18811 18962 40d645 18856->18962 18860 40d030 18857->18860 18869 40cfcd 18857->18869 18858->18811 18860->18853 18877 40cfef 18861->18877 18866->18869 18866->18878 18869->18877 18869->18878 18878->18877 18880 40cfb3 18879->18880 18881 40d024 18879->18881 18884 40d051 18880->18884 18885 40cfb9 18880->18885 18882 40d077 18881->18882 18883 40d029 18881->18883 18882->18884 18891 40cff6 18882->18891 18907 40cfdb 18882->18907 18886 40d06b 18883->18886 18887 40d02b 18883->18887 18892 40c2c9 42 API calls 18884->18892 18888 40cfbf 18885->18888 18885->18891 18890 40d645 42 API calls 18886->18890 18889 40d030 18887->18889 18899 40cfcd 18887->18899 18895 40d00b 18888->18895 18888->18899 18888->18907 18889->18884 18894 40d035 18889->18894 18890->18907 18898 40c446 42 API calls 18891->18898 18906 40cfef 18891->18906 18892->18907 18893 40d385 44 API calls 18893->18907 18902 40d50f 43 API calls 18895->18902 18895->18906 18898->18907 18899->18893 18899->18906 18899->18907 18900 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18902->18907 18905 41607a _Fputc 43 API calls 18905->18907 18906->18900 18907->18905 18907->18906 18909 40d85c 18908->18909 18910 40d7f2 18908->18910 18909->18841 18911 414bd2 _Ungetc 41 API calls 18910->18911 18912 40d7f9 18911->18912 18912->18909 18913 40e072 __dosmaperr 14 API calls 18912->18913 18914 40d851 18913->18914 18915 40df74 _Ungetc 41 API calls 18914->18915 18915->18909 18917 40d78b std::_Locinfo::_Locinfo_ctor 41 API calls 18916->18917 18918 40bf31 18917->18918 18919 40bf46 18918->18919 18922 40bf79 18918->18922 18925 40bf61 std::_Locinfo::_Locinfo_ctor 18918->18925 18920 40def7 _Fputc 41 API calls 18919->18920 18920->18925 18921 40c010 18922->18921 18924 40d6cc 41 API calls 18922->18924 18924->18921 18946 40c2dd 18945->18946 18983 404002 18982->18983 19052 404700 18983->19052 18985 40405c 18987 404b20 72 API calls 18985->18987 18991 404062 std::ios_base::_Ios_base_dtor 18985->18991 18987->18991 18988 404256 18989 401fff 18988->18989 19067 404a90 18988->19067 18992 404b20 18989->18992 19057 401f00 18991->19057 19175 405474 18992->19175 18995 405474 std::_Lockit::_Lockit 7 API calls 18996 404b6e 18995->18996 18999 4054cc std::_Lockit::~_Lockit 2 API calls 18996->18999 18998 404b92 19001 404bb1 18998->19001 19003 40742e std::_Facet_Register 16 API calls 18998->19003 18999->18998 19000 404bbd 19002 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 19000->19002 19181 4054cc 19001->19181 19004 402020 19002->19004 19005 404c03 19003->19005 19035 404890 19004->19035 19006 405474 std::_Lockit::_Lockit 7 API calls 19005->19006 19007 404c2f 19006->19007 19008 404d98 19007->19008 19009 404c79 19007->19009 19226 40561e 19008->19226 19188 4058aa 19009->19188 19036 404700 43 API calls 19035->19036 19037 4048ce 19036->19037 19054 40471c 19052->19054 19053 404730 19053->18985 19054->19053 19055 404780 43 API calls 19054->19055 19056 40474f 19055->19056 19056->18985 19058 401f1a 19057->19058 19058->18988 19059 408090 CallUnexpected RaiseException 19058->19059 19060 401f32 std::ios_base::_Init 19058->19060 19059->19060 19071 401e50 19060->19071 19068 404af3 19067->19068 19069 404ace 19067->19069 19068->18989 19069->19068 19172 404a00 19069->19172 19072 401e90 19071->19072 19072->19072 19073 404390 std::ios_base::_Init 43 API calls 19072->19073 19074 401ea6 19073->19074 19096 4013b0 19074->19096 19097 4013f3 19096->19097 19098 401641 19097->19098 19101 401408 19097->19101 19149 4012d0 19098->19149 19100 401646 19102 40df84 std::ios_base::_Init 41 API calls 19100->19102 19103 401415 codecvt 19101->19103 19120 404a40 19101->19120 19105 40164b 19102->19105 19106 401490 19103->19106 19134 404560 19103->19134 19107 40df84 std::ios_base::_Init 41 API calls 19105->19107 19112 404560 std::ios_base::_Init 43 API calls 19106->19112 19113 40150a codecvt 19106->19113 19108 401650 19107->19108 19154 40804e 19108->19154 19112->19113 19113->19100 19114 401580 std::ios_base::_Ios_base_dtor 19113->19114 19115 407feb ___std_exception_copy 42 API calls 19114->19115 19116 4015dc 19115->19116 19116->19105 19117 40160d std::ios_base::_Ios_base_dtor 19116->19117 19118 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 19117->19118 19121 404a4b 19120->19121 19122 404a6d 19120->19122 19123 404a82 19121->19123 19124 404a52 19121->19124 19125 404a7d 19122->19125 19127 40742e std::_Facet_Register 16 API calls 19122->19127 19158 401250 19123->19158 19126 40742e std::_Facet_Register 16 API calls 19124->19126 19125->19103 19129 404a58 19126->19129 19130 404a77 19127->19130 19131 404a61 19129->19131 19132 40df84 std::ios_base::_Init 41 API calls 19129->19132 19130->19103 19131->19103 19133 404a8c 19132->19133 19135 4046b0 19134->19135 19136 404587 19134->19136 19137 4012d0 std::ios_base::_Init 43 API calls 19135->19137 19140 4045f6 19136->19140 19141 4045e9 19136->19141 19143 4045a0 19136->19143 19138 4046b5 19137->19138 19139 401250 std::ios_base::_Init 43 API calls 19138->19139 19147 4045b0 codecvt 19139->19147 19145 40742e std::_Facet_Register 16 API calls 19140->19145 19140->19147 19141->19138 19141->19143 19142 40742e std::_Facet_Register 16 API calls 19142->19147 19143->19142 19144 40df84 std::ios_base::_Init 41 API calls 19146 4046bf 19144->19146 19145->19147 19147->19144 19148 404669 std::ios_base::_Ios_base_dtor codecvt 19147->19148 19148->19106 19164 4055de 19149->19164 19159 40125b std::_Facet_Register 19158->19159 19160 408090 CallUnexpected RaiseException 19159->19160 19161 40126a 19160->19161 19162 407feb ___std_exception_copy 42 API calls 19161->19162 19163 401291 19162->19163 19163->19129 19169 40551e 19164->19169 19167 408090 CallUnexpected RaiseException 19168 4055fd 19167->19168 19170 401150 std::invalid_argument::invalid_argument 42 API calls 19169->19170 19171 405530 19170->19171 19171->19167 19173 401f00 std::ios_base::_Init 43 API calls 19172->19173 19174 404a1f 19173->19174 19174->19068 19176 405483 19175->19176 19177 40548a 19175->19177 19231 40e125 19176->19231 19178 404b51 19177->19178 19236 406f3c EnterCriticalSection 19177->19236 19178->18995 19178->18998 19182 40e133 19181->19182 19183 4054d6 19181->19183 19286 40e10e LeaveCriticalSection 19182->19286 19184 4054e9 19183->19184 19285 406f4a LeaveCriticalSection 19183->19285 19184->19000 19186 40e13a 19186->19000 19287 40e3e0 19188->19287 19431 405592 19226->19431 19237 414874 19231->19237 19236->19178 19238 4141e3 std::_Lockit::_Lockit 5 API calls 19237->19238 19239 414879 19238->19239 19258 4141fd 19239->19258 19259 4143cc __dosmaperr 5 API calls 19258->19259 19260 414213 19259->19260 19261 414217 19260->19261 19262 4143cc __dosmaperr 5 API calls 19261->19262 19263 41422d 19262->19263 19264 414231 19263->19264 19265 4143cc __dosmaperr 5 API calls 19264->19265 19285->19184 19286->19186 19288 414874 std::_Lockit::_Lockit 5 API calls 19287->19288 19289 40e3ed 19288->19289 19298 40e18b 19289->19298 19434 401150 19431->19434 19435 407feb ___std_exception_copy 42 API calls 19434->19435 19436 401188 19435->19436 19646 41337b 19645->19646 19647 41338d ___scrt_uninitialize_crt 19645->19647 19648 413389 19646->19648 19650 40edf6 19646->19650 19647->18207 19648->18207 19653 40ec83 19650->19653 19656 40eb77 19653->19656 19657 40eb83 __FrameHandler3::FrameUnwindToState 19656->19657 19664 40e0c6 EnterCriticalSection 19657->19664 19659 40ebf9 19673 40ec17 19659->19673 19660 40eb8d ___scrt_uninitialize_crt 19660->19659 19665 40eaeb 19660->19665 19664->19660 19666 40eaf7 __FrameHandler3::FrameUnwindToState 19665->19666 19676 40bb65 EnterCriticalSection 19666->19676 19668 40eb01 ___scrt_uninitialize_crt 19672 40eb3a 19668->19672 19677 40ed91 19668->19677 19690 40eb6b 19672->19690 19722 40e10e LeaveCriticalSection 19673->19722 19675 40ec05 19675->19648 19676->19668 19678 40eda6 _Fputc 19677->19678 19679 40edb8 19678->19679 19680 40edad 19678->19680 19682 40ed28 ___scrt_uninitialize_crt 66 API calls 19679->19682 19681 40ec83 ___scrt_uninitialize_crt 70 API calls 19680->19681 19683 40edb3 19681->19683 19684 40edc2 19682->19684 19685 40bbd5 _Fputc 41 API calls 19683->19685 19684->19683 19687 414bd2 _Ungetc 41 API calls 19684->19687 19686 40edf0 19685->19686 19686->19672 19688 40edd9 19687->19688 19693 418203 19688->19693 19721 40bb79 LeaveCriticalSection 19690->19721 19692 40eb59 19692->19660 19694 418214 19693->19694 19697 418221 19693->19697 19695 40e072 __dosmaperr 14 API calls 19694->19695 19703 418219 19695->19703 19696 41826a 19698 40e072 __dosmaperr 14 API calls 19696->19698 19697->19696 19699 418248 19697->19699 19700 41826f 19698->19700 19704 418161 19699->19704 19702 40df74 _Ungetc 41 API calls 19700->19702 19702->19703 19703->19683 19705 41816d __FrameHandler3::FrameUnwindToState 19704->19705 19717 41c9b3 EnterCriticalSection 19705->19717 19707 41817c 19709 41cc2f __wsopen_s 41 API calls 19707->19709 19716 4181c1 19707->19716 19708 40e072 __dosmaperr 14 API calls 19711 4181a8 FlushFileBuffers 19709->19711 19716->19708 19717->19707 19721->19692 19722->19675 21002 4170a5 21003 414bd2 _Ungetc 41 API calls 21002->21003 21005 4170b2 21003->21005 21004 4170be 21005->21004 21006 41710c 21005->21006 21014 417345 21005->21014 21006->21004 21007 41716e 21006->21007 21009 41639d 41 API calls 21006->21009 21022 417271 21007->21022 21011 417161 21009->21011 21011->21007 21013 418105 _Ungetc 14 API calls 21011->21013 21013->21007 21015 41735b 21014->21015 21016 41735f 21014->21016 21015->21006 21017 41cc2f __wsopen_s 41 API calls 21016->21017 21021 4173ae 21016->21021 21018 417380 21017->21018 21019 417388 SetFilePointerEx 21018->21019 21018->21021 21020 41739f GetFileSizeEx 21019->21020 21019->21021 21020->21021 21021->21006 21023 414bd2 _Ungetc 41 API calls 21022->21023 21024 417280 21023->21024 21025 417293 21024->21025 21026 417329 21024->21026 21028 4172b4 21025->21028 21031 4172da 21025->21031 21027 416ca7 __wsopen_s 66 API calls 21026->21027 21030 41717f 21027->21030 21029 416ca7 __wsopen_s 66 API calls 21028->21029 21029->21030 21031->21030 21033 418a55 21031->21033 21034 418a69 _Fputc 21033->21034 21039 4188ac 21034->21039 21037 40bbd5 _Fputc 41 API calls 21038 418a8d 21037->21038 21038->21030 21040 4188b8 __FrameHandler3::FrameUnwindToState 21039->21040 21041 4188c0 21040->21041 21042 418996 21040->21042 21044 418914 21040->21044 21041->21037 21043 40def7 _Fputc 41 API calls 21042->21043 21043->21041 21050 41c9b3 EnterCriticalSection 21044->21050 21046 41891a 21047 41893f 21046->21047 21048 4189d2 __wsopen_s 43 API calls 21046->21048 21051 41898e 21047->21051 21048->21047 21050->21046 21054 41ca68 LeaveCriticalSection 21051->21054 21053 418994 21053->21041 21054->21053 22231 40efa7 22232 40efb2 22231->22232 22233 40efc7 22231->22233 22234 40e072 __dosmaperr 14 API calls 22232->22234 22235 40efe4 22233->22235 22236 40efcf 22233->22236 22238 40efb7 22234->22238 22245 41886b 22235->22245 22239 40e072 __dosmaperr 14 API calls 22236->22239 22241 40df74 _Ungetc 41 API calls 22238->22241 22242 40efd4 22239->22242 22240 40efdf 22243 40efc2 22241->22243 22244 40df74 _Ungetc 41 API calls 22242->22244 22244->22240 22246 41887f _Fputc 22245->22246 22251 418280 22246->22251 22249 40bbd5 _Fputc 41 API calls 22250 418899 22249->22250 22250->22240 22252 41828c __FrameHandler3::FrameUnwindToState 22251->22252 22253 418293 22252->22253 22254 4182b6 22252->22254 22255 40def7 _Fputc 41 API calls 22253->22255 22262 40bb65 EnterCriticalSection 22254->22262 22257 4182ac 22255->22257 22257->22249 22258 4182c4 22263 41830f 22258->22263 22260 4182d3 22276 418305 22260->22276 22262->22258 22264 418346 22263->22264 22265 41831e 22263->22265 22267 414bd2 _Ungetc 41 API calls 22264->22267 22266 40def7 _Fputc 41 API calls 22265->22266 22274 418339 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22266->22274 22268 41834f 22267->22268 22279 418a95 22268->22279 22271 4183f9 22282 41866f 22271->22282 22273 418410 22273->22274 22294 4184b0 22273->22294 22274->22260 22301 40bb79 LeaveCriticalSection 22276->22301 22278 41830d 22278->22257 22280 4188ac 45 API calls 22279->22280 22281 41836d 22280->22281 22281->22271 22281->22273 22281->22274 22283 41867e __wsopen_s 22282->22283 22284 414bd2 _Ungetc 41 API calls 22283->22284 22286 41869a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22284->22286 22285 407420 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 22287 418818 22285->22287 22288 418a95 45 API calls 22286->22288 22293 4186a6 22286->22293 22287->22274 22289 4186fa 22288->22289 22290 41872c ReadFile 22289->22290 22289->22293 22291 418753 22290->22291 22290->22293 22292 418a95 45 API calls 22291->22292 22292->22293 22293->22285 22295 414bd2 _Ungetc 41 API calls 22294->22295 22296 4184c3 22295->22296 22297 418a95 45 API calls 22296->22297 22300 41850b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22296->22300 22298 41855e 22297->22298 22299 418a95 45 API calls 22298->22299 22298->22300 22299->22300 22300->22274 22301->22278

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 177 402320-402362 178 403710-403726 call 407420 177->178 179 402368 177->179 180 402370-402491 179->180 182 402493-40249c 180->182 183 40249e-402511 180->183 185 402517-402538 182->185 183->185 186 40253a-40254c 185->186 187 40254e-402577 185->187 188 40257b-402603 186->188 187->188 189 402605-40260d 188->189 190 40260f-402620 188->190 191 402624-4026b4 189->191 190->191 192 4026c3-402709 191->192 193 4026b6-4026c1 191->193 194 40270c-402758 192->194 193->194 195 402761-4027a5 194->195 196 40275a-40275f 194->196 197 4027a7-402820 195->197 196->197 198 402840-4028cd 197->198 199 402822-402825 197->199 202 4028d3-402975 198->202 200 40282b-40283b 199->200 201 40299f-4029fc 199->201 200->202 204 402a00-402a73 201->204 202->201 203 402977-40297d 202->203 205 402983-40299d 203->205 206 402a87-402ac0 203->206 204->206 207 402a75-402a7b 204->207 205->204 210 402ac2-402b1f 206->210 208 402a81-402a85 207->208 209 402b2e-402b9a 207->209 208->210 212 402b9d-402c0e 209->212 210->209 211 402b21-402b2c 210->211 211->212 213 402c10-402c16 212->213 214 402c39-402c60 212->214 215 402cd2-402d09 213->215 216 402c1c-402c37 213->216 217 402c64-402cb8 214->217 219 402d0d-402dac 215->219 216->217 217->215 218 402cba-402cbd 217->218 220 402cc3-402cd0 218->220 221 402dc4-402de6 218->221 219->221 222 402dae-402db1 219->222 220->219 225 402de8-402e05 221->225 223 402db3-402dc2 222->223 224 402e1a-402e76 222->224 223->225 227 402e79-402ee7 224->227 225->224 226 402e07-402e0d 225->226 228 402ef5-402f70 226->228 230 402e13-402e18 226->230 227->228 229 402ee9-402ef3 227->229 231 402f74-403012 228->231 229->231 230->227 232 403034-4030d0 231->232 233 403014-40302f 231->233 234 4030d6-403156 232->234 233->234 235 403158-40316b 234->235 236 40316d-4031af 234->236 237 4031b1-403220 235->237 236->237 238 403222-403228 237->238 239 403248-40324c 237->239 240 40322a-403246 238->240 241 40328d-4032bc 238->241 242 403250-40326b 239->242 240->242 243 4032be-4032f7 241->243 242->241 244 40326d-403272 242->244 245 403305-403384 243->245 246 4032f9-403300 243->246 244->245 247 403278-40328b 244->247 248 403388-403412 245->248 246->248 247->243 249 403414-403416 248->249 250 40341b-40349e 248->250 251 4034a1-40352b 249->251 250->251 252 403538-40353e 251->252 253 40352d-403536 251->253 254 403540-4035a9 252->254 253->254 255 4035b0-4035b5 254->255 255->255 256 4035b7-4035e7 call 404390 255->256 259 4035e9 256->259 260 40362c-403637 256->260 263 4035f0-403624 call 401110 259->263 261 403653-40365e 260->261 262 403639-40363c 260->262 267 403660-403677 261->267 265 40364a-403651 262->265 266 40363e-403641 262->266 272 403626-403629 263->272 265->261 266->267 269 403643-403647 266->269 270 4036c2-4036e7 267->270 271 403679-403683 267->271 269->265 270->178 273 4036e9-4036f4 270->273 274 4036b0-4036ba 271->274 275 403685-403690 271->275 272->260 277 403706-40370d call 40745e 273->277 278 4036f6-403704 273->278 274->180 276 4036c0 274->276 279 403692-4036a0 275->279 280 4036a6-4036ad call 40745e 275->280 276->178 277->178 278->277 281 403727-40372f call 40df84 278->281 279->280 279->281 280->274
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 9@$%x and %p$.exe$open$shell32.dll
                                                        • API String ID: 0-1499470633
                                                        • Opcode ID: 569a7f47ffdd8adeeff8127ab31c8b2c5ec200de375ad0e47e65cd08048f4f44
                                                        • Instruction ID: b3621ca4427cacb3bc8dd38ebfce6b13c7c8c57b5ac8815a6f58a24341565fb5
                                                        • Opcode Fuzzy Hash: 569a7f47ffdd8adeeff8127ab31c8b2c5ec200de375ad0e47e65cd08048f4f44
                                                        • Instruction Fuzzy Hash: 4392B017A30D1F06E30C64398D562E6A94AD7EA731F869337BD76EB3F4D36E48428244

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 0041FB65: CreateFileW.KERNELBASE(?,00000000,?,0041FF58,?,?,00000000,?,0041FF58,?,0000000C), ref: 0041FB82
                                                        • GetLastError.KERNEL32 ref: 0041FFC3
                                                        • __dosmaperr.LIBCMT ref: 0041FFCA
                                                        • GetFileType.KERNELBASE(00000000), ref: 0041FFD6
                                                        • GetLastError.KERNEL32 ref: 0041FFE0
                                                        • __dosmaperr.LIBCMT ref: 0041FFE9
                                                        • CloseHandle.KERNEL32(00000000), ref: 00420009
                                                        • CloseHandle.KERNEL32(?), ref: 00420156
                                                        • GetLastError.KERNEL32 ref: 00420188
                                                        • __dosmaperr.LIBCMT ref: 0042018F
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID:
                                                        • API String ID: 4237864984-0
                                                        • Opcode ID: 87ef763bbd003f1d2de960a3db6ca709dde3cd444b7d1b6f895e6fd8deb0075d
                                                        • Instruction ID: c043dc6610800097a8c7d9f7805d75e01504a092e95ab29a96a2aa982ce353c5
                                                        • Opcode Fuzzy Hash: 87ef763bbd003f1d2de960a3db6ca709dde3cd444b7d1b6f895e6fd8deb0075d
                                                        • Instruction Fuzzy Hash: FCA14732A041559FCF19DF28EC91BAE3BA1AB46314F18016EF801EB3D2C7398957D759

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 69 4038c0-40398c call 40742e call 40745e LoadLibraryW call 402320 call 401fd0 * 2 81 403990-403995 69->81 81->81 82 403997-4039e0 call 404390 call 403730 call 4042a0 81->82 90 4039e2 82->90 91 4039e4-403abf call 4084c0 82->91 90->91 97 403ac1-403acc 91->97 98 403aec-403af3 91->98 99 403ae2-403ae9 call 40745e 97->99 100 403ace-403adc 97->100 101 403b22-403b3e 98->101 102 403af5-403b02 98->102 99->98 100->99 106 403b40-403b4d 101->106 107 403b6d-403bd4 call 40ba2a call 40dcfa call 40bd99 101->107 104 403b04-403b12 102->104 105 403b18-403b1f call 40745e 102->105 104->105 105->101 111 403b63-403b6a call 40745e 106->111 112 403b4f-403b5d 106->112 121 403bd7-403bdc 107->121 111->107 112->111 121->121 122 403bde-403c24 call 404390 call 403730 call 4042a0 121->122 130 403c26 122->130 131 403c28-403cef call 4084c0 122->131 130->131 137 403cf1-403cfc 131->137 138 403d1c-403d23 131->138 139 403d12-403d19 call 40745e 137->139 140 403cfe-403d0c 137->140 141 403d52-403d6e 138->141 142 403d25-403d32 138->142 139->138 140->139 143 403d70-403d7d 141->143 144 403d9d-403e38 call 40ba2a call 40dcfa call 40bd99 call 402320 ShellExecuteA * 2 141->144 146 403d34-403d42 142->146 147 403d48-403d4f call 40745e 142->147 149 403d93-403d9a call 40745e 143->149 150 403d7f-403d8d 143->150 163 403e67-403e8c 144->163 164 403e3a-403e47 144->164 146->147 147->141 149->144 150->149 167 403eba-403ecd call 407420 163->167 168 403e8e-403e9e 163->168 165 403e49-403e57 164->165 166 403e5d-403e64 call 40745e 164->166 165->166 166->163 170 403eb0-403eb7 call 40745e 168->170 171 403ea0-403eae 168->171 170->167 171->170
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(shell32.dll), ref: 0040390A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: .exe$open$shell32.dll
                                                        • API String ID: 1029625771-3690275032
                                                        • Opcode ID: c9f59ac015d61ec70614d93d888e022ef416f64b299715dc7f56bdbe0cac2894
                                                        • Instruction ID: 7d5b2598125341daaadbafcfaee473a7e4c633bdeea8f021ad5caa46309aa23f
                                                        • Opcode Fuzzy Hash: c9f59ac015d61ec70614d93d888e022ef416f64b299715dc7f56bdbe0cac2894
                                                        • Instruction Fuzzy Hash: EFE12A712083408BD718CF28CC45B6FBBE5BF85305F244A2DF489AB2D2D779E6458B5A

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(?,?,0041142C,00000016,0040BD98,?,?,52949588,0040BD98,?), ref: 00411443
                                                        • TerminateProcess.KERNEL32(00000000,?,0041142C,00000016,0040BD98,?,?,52949588,0040BD98,?), ref: 0041144A
                                                        • ExitProcess.KERNEL32 ref: 0041145C
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: fdc9db31659cbe28c415a8b0888f718e5b65b0592ff8268f2e9698ce38014a47
                                                        • Instruction ID: 3fe6f93935658f8ab67006e652a10cd0383134051074610e396dae59c432ecd7
                                                        • Opcode Fuzzy Hash: fdc9db31659cbe28c415a8b0888f718e5b65b0592ff8268f2e9698ce38014a47
                                                        • Instruction Fuzzy Hash: 5DD09E31100148ABCF117F61EC0DA993F2AAF407557858025FA0A56131CB369993AA58

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 295 416daf-416dce 296 416dd4-416dd6 295->296 297 416fa8 295->297 298 416e02-416e28 296->298 299 416dd8-416df7 call 40def7 296->299 300 416faa-416fae 297->300 302 416e2a-416e2c 298->302 303 416e2e-416e34 298->303 306 416dfa-416dfd 299->306 302->303 305 416e36-416e40 302->305 303->299 303->305 307 416e50-416e5b call 4168fc 305->307 308 416e42-416e4d call 418af3 305->308 306->300 313 416e9d-416eaf 307->313 314 416e5d-416e62 307->314 308->307 317 416eb1-416eb7 313->317 318 416f00-416f20 WriteFile 313->318 315 416e64-416e68 314->315 316 416e87-416e9b call 4164c2 314->316 319 416f70-416f82 315->319 320 416e6e-416e7d call 416894 315->320 337 416e80-416e82 316->337 324 416eb9-416ebc 317->324 325 416eee-416efe call 41697a 317->325 322 416f22-416f28 GetLastError 318->322 323 416f2b 318->323 326 416f84-416f8a 319->326 327 416f8c-416f9e 319->327 320->337 322->323 331 416f2e-416f39 323->331 332 416edc-416eec call 416b3e 324->332 333 416ebe-416ec1 324->333 343 416ed7-416eda 325->343 326->297 326->327 327->306 338 416fa3-416fa6 331->338 339 416f3b-416f40 331->339 332->343 333->319 340 416ec7-416ed2 call 416a55 333->340 337->331 338->300 344 416f42-416f47 339->344 345 416f6e 339->345 340->343 343->337 346 416f60-416f69 call 40e03b 344->346 347 416f49-416f5b 344->347 345->319 346->306 347->306
                                                        APIs
                                                          • Part of subcall function 004164C2: GetConsoleOutputCP.KERNEL32(52949588,00000000,00000000,0040BDB8), ref: 00416525
                                                        • WriteFile.KERNELBASE(FFBF5BE8,00000000,?,0040BC75,00000000,00000000,00000000,00000000,?,?,0040BC75,?,?,004328B8,00000010,0040BDB8), ref: 00416F18
                                                        • GetLastError.KERNEL32(?,0040BC75,?,?,004328B8,00000010,0040BDB8,?,?,00000000,?), ref: 00416F22
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ConsoleErrorFileLastOutputWrite
                                                        • String ID:
                                                        • API String ID: 2915228174-0
                                                        • Opcode ID: f464ed671a76038d08897ffb1fb948258ea98ac2c0acb72c9529f46f39d22c7a
                                                        • Instruction ID: cb585fdb2482b244a4d3bef91fab55670e651a1c55327e645a67e42ff2a15e13
                                                        • Opcode Fuzzy Hash: f464ed671a76038d08897ffb1fb948258ea98ac2c0acb72c9529f46f39d22c7a
                                                        • Instruction Fuzzy Hash: 4461D775D04249AFDF10CFA8C844AEF7FB9AF09308F16415AF804A7252D379D986CB69

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 350 414a96-414a9b 351 414a9d-414ab5 350->351 352 414ac3-414acc 351->352 353 414ab7-414abb 351->353 354 414ade 352->354 355 414ace-414ad1 352->355 353->352 356 414abd-414ac1 353->356 360 414ae0-414aed GetStdHandle 354->360 358 414ad3-414ad8 355->358 359 414ada-414adc 355->359 357 414b38-414b3c 356->357 357->351 363 414b42-414b45 357->363 358->360 359->360 361 414b1a-414b2c 360->361 362 414aef-414af1 360->362 361->357 365 414b2e-414b31 361->365 362->361 364 414af3-414afc GetFileType 362->364 364->361 366 414afe-414b07 364->366 365->357 367 414b09-414b0d 366->367 368 414b0f-414b12 366->368 367->357 368->357 369 414b14-414b18 368->369 369->357
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00414AE2
                                                        • GetFileType.KERNELBASE(00000000), ref: 00414AF4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileHandleType
                                                        • String ID:
                                                        • API String ID: 3000768030-0
                                                        • Opcode ID: 14da27bdb5d952759cc947a18c1f6313485b17a09da5127208cbfccaf6a1781a
                                                        • Instruction ID: 68df3f11dd2f645efc31e1e90aadc3e75d180b75955679e0b2236dab09e8ba97
                                                        • Opcode Fuzzy Hash: 14da27bdb5d952759cc947a18c1f6313485b17a09da5127208cbfccaf6a1781a
                                                        • Instruction Fuzzy Hash: 141175712087514AC7308E3E9C887637AD4ABD6370B39071BD1B6962F1C328E9C6965D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 370 403ee0-403f1d CreateThread WaitForSingleObject call 407420 372 403f22-403f25 370->372
                                                        APIs
                                                        • CreateThread.KERNELBASE(00000000,00000000,004038C0,00000000,00000000,52949588), ref: 00403F06
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00403F0F
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 1891408510-0
                                                        • Opcode ID: af3e1afe4429c917983b20489d93451d494df3de1508f1cbbf6b72916d2180c4
                                                        • Instruction ID: 9ada69c4f7ca39928594594d106047c4e65b58e1a3541a0c5f1fc3d2bb6a9bfa
                                                        • Opcode Fuzzy Hash: af3e1afe4429c917983b20489d93451d494df3de1508f1cbbf6b72916d2180c4
                                                        • Instruction Fuzzy Hash: 10E08675758300BBD710EF24EC07F1A3BE4BB48B05F914A39F295A62D0D674B404965E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 401 414d5d-414d71 call 41cc2f 404 414d73-414d75 401->404 405 414d77-414d7f 401->405 406 414dc5-414de5 call 41cb9e 404->406 407 414d81-414d88 405->407 408 414d8a-414d8d 405->408 418 414df7 406->418 419 414de7-414df5 call 40e03b 406->419 407->408 410 414d95-414da9 call 41cc2f * 2 407->410 411 414dab-414dbb call 41cc2f CloseHandle 408->411 412 414d8f-414d93 408->412 410->404 410->411 411->404 421 414dbd-414dc3 GetLastError 411->421 412->410 412->411 423 414df9-414dfc 418->423 419->423 421->406
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,CF830579,?,00414C44,00000000,CF830579,00432C48,0000000C,00414D00,0040BD0B,?), ref: 00414DB3
                                                        • GetLastError.KERNEL32(?,00414C44,00000000,CF830579,00432C48,0000000C,00414D00,0040BD0B,?), ref: 00414DBD
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast
                                                        • String ID:
                                                        • API String ID: 918212764-0
                                                        • Opcode ID: cf05b64a0bbd980239ba65db1c1c6f103e722fbee84b5f4660c8636332b429dd
                                                        • Instruction ID: ceb111eb948f9657ebdeceefd9bfba8073a9b29251fc9eed98a790ab6a2c0bec
                                                        • Opcode Fuzzy Hash: cf05b64a0bbd980239ba65db1c1c6f103e722fbee84b5f4660c8636332b429dd
                                                        • Instruction Fuzzy Hash: 06114C336041241ADB246635BC867FE6749CBC1738F290A5FF808C72C1DE388CC2929C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 426 4143cc-4143f4 427 4143f6-4143f8 426->427 428 4143fa-4143fc 426->428 429 41444b-41444e 427->429 430 414402-414412 call 414301 428->430 431 4143fe-414400 428->431 434 414431-414448 430->434 435 414414-414422 GetProcAddress 430->435 431->429 437 41444a 434->437 435->434 436 414424-41442f call 410bb3 435->436 436->437 437->429
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 672b8ef80a1082ffe797a66fe554d50d659c07feffc08aafbed84bfcd02d8428
                                                        • Instruction ID: d7b25293e7db54f96000769fea1aeb7630fb582f3d7d0c2fc2c622193e8995c8
                                                        • Opcode Fuzzy Hash: 672b8ef80a1082ffe797a66fe554d50d659c07feffc08aafbed84bfcd02d8428
                                                        • Instruction Fuzzy Hash: 620128373002255F9F25CF6EEC40ADB33A6FBC07243148136FA20CB684DA34D8829799

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 440 413ef2-413f18 call 413cc8 443 413f71-413f74 440->443 444 413f1a-413f2c call 41fe8c 440->444 446 413f31-413f36 444->446 446->443 447 413f38-413f70 446->447
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 86b5a37895ede01666616fd7f26fe40e68c10059cd8d9e9be6e6956d389c093e
                                                        • Instruction ID: be02312cd07e58b193bdeee16c95f5fde802225de20a5ed1c7ae4422ede983e8
                                                        • Opcode Fuzzy Hash: 86b5a37895ede01666616fd7f26fe40e68c10059cd8d9e9be6e6956d389c093e
                                                        • Instruction Fuzzy Hash: 46110375A0420AAFCB05DF58E9419DB7BF9EF48304F04406AF809AB351D630EA15CBA8

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 448 414094-41409f 449 4140a1-4140ab 448->449 450 4140ad-4140b3 448->450 449->450 451 4140e1-4140ec call 40e072 449->451 452 4140b5-4140b6 450->452 453 4140cc-4140dd RtlAllocateHeap 450->453 458 4140ee-4140f0 451->458 452->453 454 4140b8-4140bf call 412e4d 453->454 455 4140df 453->455 454->451 461 4140c1-4140ca call 412e98 454->461 455->458 461->451 461->453
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,0000000C,?,?,004152D9,00000001,00000364,?,00000006,000000FF,?,?,0040E077,00415469), ref: 004140D5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 14b8f9ac75b8980b6812ff089cde42dce8ba1f12a125e940596199f5ca44a4d3
                                                        • Instruction ID: 7a371578952800d697783e4f14dfa84f7cfeb60b6085e341501622e7ba028638
                                                        • Opcode Fuzzy Hash: 14b8f9ac75b8980b6812ff089cde42dce8ba1f12a125e940596199f5ca44a4d3
                                                        • Instruction Fuzzy Hash: E9F0BB35605625ABDB215A63DC05BDB3F489FC5760B158123B904EB1A0CA68D9D1819D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 464 41fb65-41fb89 CreateFileW
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,00000000,?,0041FF58,?,?,00000000,?,0041FF58,?,0000000C), ref: 0041FB82
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 32f1cee3c5876f16e38c750b1e34007635eee82df29fa4d42b06ff8a7cf34f14
                                                        • Instruction ID: 28cfbda6749b70c9de2fbd9d245fef773b8951bf2dd70127050a9a6bf190398c
                                                        • Opcode Fuzzy Hash: 32f1cee3c5876f16e38c750b1e34007635eee82df29fa4d42b06ff8a7cf34f14
                                                        • Instruction Fuzzy Hash: 05D06C3210010DFBDF128F84DC06EDA3FAAFB4C714F018010FA5856021C732E832AB94
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 04691cd5221879a38aa0f057816d8a73d07112325195ad38bce5c0dde7aa5ce2
                                                        • Instruction ID: 5123da61b8cdaac21cd302dc6e4a5341095d796461dc8fa416339e05d9df0b54
                                                        • Opcode Fuzzy Hash: 04691cd5221879a38aa0f057816d8a73d07112325195ad38bce5c0dde7aa5ce2
                                                        • Instruction Fuzzy Hash: 58D23A71E082289FDB65CE28ED407EAB7B5EB94304F5441EBD80DE7241DB78AE818F45
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(3FC00000,2000000B,0041EEBF,00000002,00000000,?,?,?,0041EEBF,?,00000000), ref: 0041EC3A
                                                        • GetLocaleInfoW.KERNEL32(3FC00000,20001004,0041EEBF,00000002,00000000,?,?,?,0041EEBF,?,00000000), ref: 0041EC63
                                                        • GetACP.KERNEL32(?,?,0041EEBF,?,00000000), ref: 0041EC78
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID: ACP$OCP
                                                        • API String ID: 2299586839-711371036
                                                        • Opcode ID: ae0517b9bda7198648f1cbed6e652a34a4e79f3510d6da964a24c0c18db862fc
                                                        • Instruction ID: 81a9d30784dd22d719d41cfb92251f6e816e7a4bc62bdb22216d11a6fc444572
                                                        • Opcode Fuzzy Hash: ae0517b9bda7198648f1cbed6e652a34a4e79f3510d6da964a24c0c18db862fc
                                                        • Instruction Fuzzy Hash: 92218E3AB04101AADB34CF56CD05AD773A7AF50B50B568826FD0AD7211F736EE81C798
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0041EE82
                                                        • IsValidCodePage.KERNEL32(00000000), ref: 0041EECB
                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 0041EEDA
                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0041EF22
                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0041EF41
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                        • String ID:
                                                        • API String ID: 415426439-0
                                                        • Opcode ID: 1f142972335a53d1e2416df24534188105d76140515381cc06687f0020485920
                                                        • Instruction ID: eeabbf5cfaddba79e94d22b4dd48aaeada7d5b667952b3c456454f902e5df75d
                                                        • Opcode Fuzzy Hash: 1f142972335a53d1e2416df24534188105d76140515381cc06687f0020485920
                                                        • Instruction Fuzzy Hash: B4519075A00315ABDF20DFA6DC41BEB77B8FF48700F54442AAD14E7290E7789980CB69
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetACP.KERNEL32(?,?,?,?,?,?,00411EE1,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0041E4D3
                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00411EE1,?,?,?,00000055,?,-00000050,?,?), ref: 0041E4FE
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0041E661
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$CodeInfoLocalePageValid
                                                        • String ID: utf8
                                                        • API String ID: 607553120-905460609
                                                        • Opcode ID: d2e92ad91d33230e432f41824a885b4f53a9106f8c4d9673b702c20c8aa694f9
                                                        • Instruction ID: 5e8f11e88951c7c1c9557d61489bca48d24d80555c5ca4e9e4b82e7d51b65768
                                                        • Opcode Fuzzy Hash: d2e92ad91d33230e432f41824a885b4f53a9106f8c4d9673b702c20c8aa694f9
                                                        • Instruction Fuzzy Hash: 8F711775A00611AADB24AB77CC42BE773A8EF54708F14442BFD05D7281FB7CE9818799
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _strrchr
                                                        • String ID:
                                                        • API String ID: 3213747228-0
                                                        • Opcode ID: d8f824a3a597dbe048be884bb3e91045552750dfa5ffe6b567c0d7537b351b3d
                                                        • Instruction ID: 91afe31f9ab3d507f6121463a8ee3d13cfef47ac4a512e863f990cc27fdcea00
                                                        • Opcode Fuzzy Hash: d8f824a3a597dbe048be884bb3e91045552750dfa5ffe6b567c0d7537b351b3d
                                                        • Instruction Fuzzy Hash: 92B15872E00645DFDB119F68C891BEEBBE5EF85310F14816BE815AB341D2389D81CBA9
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00407B0D
                                                        • IsDebuggerPresent.KERNEL32 ref: 00407BD9
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00407BF9
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00407C03
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: bdb8d4ffe5861b74027a400539b36d4e8f115b4355d90c864d7f04757154f5f6
                                                        • Instruction ID: ca20a48664bdef0e78e9b146848890f6e34f40b99dedcfcf476291c653997e40
                                                        • Opcode Fuzzy Hash: bdb8d4ffe5861b74027a400539b36d4e8f115b4355d90c864d7f04757154f5f6
                                                        • Instruction Fuzzy Hash: 1B314B75D0521CDBDF20DFA0D9497CDBBB8BF04304F1040AAE50DA7290EB756A859F09
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0041E879
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0041E8C3
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0041E989
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale$ErrorLast
                                                        • String ID:
                                                        • API String ID: 661929714-0
                                                        • Opcode ID: dd539c89c5381dfdaac91928ad5ed676a1006981e28db1904c6f4bbe4cde2b34
                                                        • Instruction ID: efc99f0a6d6f1c6c35933ec1b38cf6b3cd41524c9fcadcabef19194d257b4763
                                                        • Opcode Fuzzy Hash: dd539c89c5381dfdaac91928ad5ed676a1006981e28db1904c6f4bbe4cde2b34
                                                        • Instruction Fuzzy Hash: EB618CB59101079BDB689F26CD82BEA77A8FF04340F14417BED16C6281F738D981DB58
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000001), ref: 0040DE70
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000001), ref: 0040DE7A
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000001), ref: 0040DE87
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: b5dd4f76152aea6ca03237fb28cccd4ebdc33645a90cdebeab5d7b36533c9830
                                                        • Instruction ID: 2886232a598c6d0739cb6745ed5e05dca1263a9451a5c599d013a0f88592b0f0
                                                        • Opcode Fuzzy Hash: b5dd4f76152aea6ca03237fb28cccd4ebdc33645a90cdebeab5d7b36533c9830
                                                        • Instruction Fuzzy Hash: 4131E574D012189BCB21DF69D98878DBBB8BF08310F5041EAE41CA7291E774AF858F48
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ddea241b9222524aa140a82a6791fc6d0ddcc5cf7be7707f7ebfe0d02a874e92
                                                        • Instruction ID: 2f25568155576164fff2026d57733e275abf4854a932f81770cec84d7f7bd70a
                                                        • Opcode Fuzzy Hash: ddea241b9222524aa140a82a6791fc6d0ddcc5cf7be7707f7ebfe0d02a874e92
                                                        • Instruction Fuzzy Hash: 86F17F71E002199FDF14CF68D8806EEBBB1FF88314F15826AE819AB381D775AD45CB84
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,3FC00000,?,00000008,?,?,00419516,3FC00000,?,00000008,?,?,00422FF7,00000000), ref: 00419748
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: 66bd135522bfd48ef431717ac9a2d3ac4e718912ce61b150da326bc1aaae8d12
                                                        • Instruction ID: 8ce61fd47942680b4b6d640883987f5213aad906e3822604c48ba3c560e6b802
                                                        • Opcode Fuzzy Hash: 66bd135522bfd48ef431717ac9a2d3ac4e718912ce61b150da326bc1aaae8d12
                                                        • Instruction Fuzzy Hash: BCB15D31620605DFD719CF28C496BA57BA0FF45364F258659E8AACF3A1C339ED82CB44
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004077F6
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor
                                                        • String ID:
                                                        • API String ID: 2325560087-0
                                                        • Opcode ID: 96a2ba3aa580dc615e5e38e6a61e3a4296c942238419a14d8ec0a8789d2e52c4
                                                        • Instruction ID: 853601205c21894bcdc8f75123652b739dccbac0e00907a06a8c71bf04373a9d
                                                        • Opcode Fuzzy Hash: 96a2ba3aa580dc615e5e38e6a61e3a4296c942238419a14d8ec0a8789d2e52c4
                                                        • Instruction Fuzzy Hash: 865180B2E056059FEB18CF54E9857AEBBF0FB48350F14913AD501EB390D378A940CB59
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0041EACC
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: 22a4290edeb40b255e0ef88b49f21dfdd78c731e0f866b45595c0c5f80cee5a7
                                                        • Instruction ID: 09566a44d01ac47d2cdad9f49e07ec0328cace9eeb3adbfa8c3b07b4827ecd72
                                                        • Opcode Fuzzy Hash: 22a4290edeb40b255e0ef88b49f21dfdd78c731e0f866b45595c0c5f80cee5a7
                                                        • Instruction Fuzzy Hash: D321AF36605206ABDB28DE26DD42AFB73A8EF44314B10407FED02D6241EB78AD81CB58
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: a0aab24acc3b3978c9a5ada52a2d7b7c9db1a835270475109fab3b2612413d47
                                                        • Instruction ID: db3753c2c33e7530f0929c46863b0870b75bf5936d116eaba6b158d6d29c11f4
                                                        • Opcode Fuzzy Hash: a0aab24acc3b3978c9a5ada52a2d7b7c9db1a835270475109fab3b2612413d47
                                                        • Instruction Fuzzy Hash: CEB19470D0060A8BCB249FE4C991ABFB7A1AB05308F14463FD456F73D1CA39D94ACB5A
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • EnumSystemLocalesW.KERNEL32(0041E825,00000001,00000000,?,-00000050,?,0041EE56,00000000,?,?,?,00000055,?), ref: 0041E771
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 9637497d46bd12567f8eabdc0472934baf484039a92a8dbd1bfa50b3c5102b1b
                                                        • Instruction ID: f28f85ac1fea5866725ce88a4d547c14bcace0560233e7335010750b785556cb
                                                        • Opcode Fuzzy Hash: 9637497d46bd12567f8eabdc0472934baf484039a92a8dbd1bfa50b3c5102b1b
                                                        • Instruction Fuzzy Hash: F0112C3A6007019FEB189F3AD8916FAB791FF80368B14442ED95747740E7757843C744
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0041EB22,00000000,00000000,?), ref: 0041ECD3
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: f78a423274370276909a02de998c8e2fb19ace7283c045400ea6aabaf7fbf6a9
                                                        • Instruction ID: 6e93bce3e8a9596dc076f6a872b53f7d727095e2315f943068ff1bd0afa52940
                                                        • Opcode Fuzzy Hash: f78a423274370276909a02de998c8e2fb19ace7283c045400ea6aabaf7fbf6a9
                                                        • Instruction Fuzzy Hash: 56F02D3A600113BFDB245B26EC09BFB7764EB40354F19442AEC06A3280EA78FDC2C694
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0041E661
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID: utf8
                                                        • API String ID: 3736152602-905460609
                                                        • Opcode ID: 2152daac5f42ae25a129a23ac8d896ce75da55d7df13b3f6dfbcda70826a3db5
                                                        • Instruction ID: d369d087f973f2c2e7390e19339e1b86590d8fa7fa541369cb1b30fd3d4077c9
                                                        • Opcode Fuzzy Hash: 2152daac5f42ae25a129a23ac8d896ce75da55d7df13b3f6dfbcda70826a3db5
                                                        • Instruction Fuzzy Hash: B0F0F436A10105ABC714AF25DC45FFA73A8EB84324F40007EAA02D7281EA78AD418758
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • EnumSystemLocalesW.KERNEL32(0041EA78,00000001,45F1B473,?,-00000050,?,0041EE1A,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0041E7E4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 7822a5e4b117a09642d2d9f73cbe77476052005b15321de9f48d0f235ef5c92f
                                                        • Instruction ID: 0c0c1f316863ef4a6d30beb722119c93d5a9d1266b3f20af8045389666d513f6
                                                        • Opcode Fuzzy Hash: 7822a5e4b117a09642d2d9f73cbe77476052005b15321de9f48d0f235ef5c92f
                                                        • Instruction Fuzzy Hash: BDF0C23A2003045FEB249F3A9881ABABB95FF80368F15442EFD568B690D6759C82C718
                                                        APIs
                                                          • Part of subcall function 0040E0C6: EnterCriticalSection.KERNEL32(?,?,00412EDC,00000000,00432B68,0000000C,00412EA3,0000000C,?,004140C7,0000000C,?,004152D9,00000001,00000364,?), ref: 0040E0D5
                                                        • EnumSystemLocalesW.KERNEL32(0041412B,00000001,00432BE8,0000000C,0041455A,00000000), ref: 00414170
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                        • String ID:
                                                        • API String ID: 1272433827-0
                                                        • Opcode ID: 80f246e533dc21f73d9613eff5259b5841ca6d0f841dd3ce2907f16627d73c59
                                                        • Instruction ID: 198ab3507c4040aae18c9164df511e00e81c972c753b4360ebc7eca8a0771405
                                                        • Opcode Fuzzy Hash: 80f246e533dc21f73d9613eff5259b5841ca6d0f841dd3ce2907f16627d73c59
                                                        • Instruction Fuzzy Hash: 14F03C72A14204DFD710EF99E842B9C77B0FB84725F10422BE811DB2A0C7B959409B98
                                                        APIs
                                                          • Part of subcall function 0041513B: GetLastError.KERNEL32(?,00000008,004176BA), ref: 0041513F
                                                          • Part of subcall function 0041513B: SetLastError.KERNEL32(00000000,00000001,00000006,000000FF), ref: 004151E1
                                                        • EnumSystemLocalesW.KERNEL32(0041E60D,00000001,45F1B473,?,?,0041EE78,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0041E6EB
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 8c2aaa4c0cd0d54cc735e91a7a0ddb58f51471a544283acf310fccb30414098b
                                                        • Instruction ID: d7e3b5c502124c080ac9a43a58f0728b4bb26e435a168ea3e401fe3e83efba30
                                                        • Opcode Fuzzy Hash: 8c2aaa4c0cd0d54cc735e91a7a0ddb58f51471a544283acf310fccb30414098b
                                                        • Instruction Fuzzy Hash: A9F0E53A30025597CB149F3AD8557AABF94EFD1724F87405AEE06CB250C6799883C758
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00412A47,?,20001004,00000000,00000002,?,?,00412049), ref: 00414692
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: a79f5b4871ba1c4f54388a69458767bdf475af3fdf68469de367ee09879fad86
                                                        • Instruction ID: f9bd5592f4a27906ba0b7000611c056f456b6c13901b9127fc06cc884ae94f8f
                                                        • Opcode Fuzzy Hash: a79f5b4871ba1c4f54388a69458767bdf475af3fdf68469de367ee09879fad86
                                                        • Instruction Fuzzy Hash: 63E04F31540268BBCF122F61DC04EEE3F19FF85761F064026FC1566261CB7A9D61AA9D
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00007C6F,00407287), ref: 00407C68
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 91f082824127807ca67e9bea16e4e1142dcaa675fdc02378074aa91e014118a9
                                                        • Instruction ID: 0ff61591fe6e7fdbf664e27eab8a47433d3f920744837751a1e33914f5cec1be
                                                        • Opcode Fuzzy Hash: 91f082824127807ca67e9bea16e4e1142dcaa675fdc02378074aa91e014118a9
                                                        • Instruction Fuzzy Hash:
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HeapProcess
                                                        • String ID:
                                                        • API String ID: 54951025-0
                                                        • Opcode ID: 960917853a08cbcbaec74a3857df259023f2eba71cc87e2cdee0c8228e0b7f47
                                                        • Instruction ID: d5d072ba9748c195f736b78e16f2f5f2af1f06de213b616d404cea10f9c51eb0
                                                        • Opcode Fuzzy Hash: 960917853a08cbcbaec74a3857df259023f2eba71cc87e2cdee0c8228e0b7f47
                                                        • Instruction Fuzzy Hash: 01A02230300280CF83808F32AE0CB0C3FF8AE082E0B0AC03AA000C80B0EF3080A0AF08
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 516d30cb957660e1ce7009900f7c89419000928a7b4542a70a6d7973bb8b5465
                                                        • Instruction ID: e0b6eab36911d749f2a52d9d755c71c6f3a9b3d1a8d09863ec84b4b35a7f43a0
                                                        • Opcode Fuzzy Hash: 516d30cb957660e1ce7009900f7c89419000928a7b4542a70a6d7973bb8b5465
                                                        • Instruction Fuzzy Hash: 47320231E29F014DD7339634C922336A248AFB73D4F55D737E81AB5AA5EB28C4E34106
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93b451423774f390a84f535dcfe3ba546839b42ee0b499e0766b2c7a98dc649c
                                                        • Instruction ID: 5feebbaa43ed32d93f9715846b212e544a85bbfc92224125606550ec09a82999
                                                        • Opcode Fuzzy Hash: 93b451423774f390a84f535dcfe3ba546839b42ee0b499e0766b2c7a98dc649c
                                                        • Instruction Fuzzy Hash: CB51A531711A168BD708CF39C895666F7E1FB98310F148779E429CB2C1EB35E915CB94
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8c71e8a4d4c822c2af38b7bb403b9e2aeae5574d6a876ff0dc428173de2df168
                                                        • Instruction ID: 2e6b64c01918b1979876a487fb5af248adadb05a606b7677175458bc7ad97d97
                                                        • Opcode Fuzzy Hash: 8c71e8a4d4c822c2af38b7bb403b9e2aeae5574d6a876ff0dc428173de2df168
                                                        • Instruction Fuzzy Hash: A6519171711A128FD70CCF39C895A66B7E1FB98310F048779E42ACB2D6DB34A915CB94
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fa0ba1e5d9a22f7c6db1b863d068fd7604d8ca8b2c2046f773a74d09f23aaf89
                                                        • Instruction ID: ed00e364353b2709b8c4936f7de79ec0fff9d1aa87bc6e08b7c0caa285f9e44e
                                                        • Opcode Fuzzy Hash: fa0ba1e5d9a22f7c6db1b863d068fd7604d8ca8b2c2046f773a74d09f23aaf89
                                                        • Instruction Fuzzy Hash: 73E04632911268EBCB18DB89C95898AB2ACEB44B04B15009AF902D3210C274DE80C7D4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eafc9afbd71d0c63c25bd700d152b00fba6a1b79f89aedc9458559ba3c3e83a7
                                                        • Instruction ID: 9d670eee6a7ff43784672fcc557034ad53df9d6dcb31fc26035e34de67efaf71
                                                        • Opcode Fuzzy Hash: eafc9afbd71d0c63c25bd700d152b00fba6a1b79f89aedc9458559ba3c3e83a7
                                                        • Instruction Fuzzy Hash: 6EC08C3420098046CF29CE10C2713EA33D5A392B82F80098ECA0A0F752CA1E9CC2DA44
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404B4C
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404B69
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00404B8D
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00404BB8
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404C2A
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00404C7F
                                                        • __Getctype.LIBCPMT ref: 00404C96
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00404CD6
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00404D78
                                                        • std::_Facet_Register.LIBCPMT ref: 00404D7E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_GetctypeLocinfo_ctorLocinfo_dtorRegister
                                                        • String ID: bad locale name
                                                        • API String ID: 103145292-1405518554
                                                        • Opcode ID: 07779c633be37db408639f77928584da0fe84fd984f841e2fd8ba1ab6a6bcfd4
                                                        • Instruction ID: c45789c66640c356b2bc41b45c406846e681c44b1f4b151baf81fb86c109fe15
                                                        • Opcode Fuzzy Hash: 07779c633be37db408639f77928584da0fe84fd984f841e2fd8ba1ab6a6bcfd4
                                                        • Instruction Fuzzy Hash: 7B619FB19043408BD720DF65D941B5BB7F4AFD4304F05493EE989A7392E738E948CB5A
                                                        APIs
                                                        • type_info::operator==.LIBVCRUNTIME ref: 0040AAB7
                                                        • ___TypeMatch.LIBVCRUNTIME ref: 0040ABC5
                                                        • _UnwindNestedFrames.LIBCMT ref: 0040AD17
                                                        • CallUnexpected.LIBVCRUNTIME ref: 0040AD32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                        • String ID: csm$csm$csm$hqB
                                                        • API String ID: 2751267872-961717235
                                                        • Opcode ID: 5312b3d91eab99b169114e3402d6476c4e494fcb55b904c8292e4fd39c2bab0a
                                                        • Instruction ID: 1a84720c735a061b690d6f447b3278b908e1dcb1436106e9bb87ee9a1a6810cd
                                                        • Opcode Fuzzy Hash: 5312b3d91eab99b169114e3402d6476c4e494fcb55b904c8292e4fd39c2bab0a
                                                        • Instruction Fuzzy Hash: 2DB18A718003099FDF14DFA5C9809AEBBB5FF14304B19456BE8017B282C739DA61CF9A
                                                        APIs
                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0042485F), ref: 00422D5B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DecodePointer
                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                        • API String ID: 3527080286-3064271455
                                                        • Opcode ID: 99bc9cc3bdd9136b520063792197f245364da15bbda7aca5a31b7bed04557963
                                                        • Instruction ID: 541d14d2076966b173cd57405107be29c5c83d47e8039af315078564b0fddfcc
                                                        • Opcode Fuzzy Hash: 99bc9cc3bdd9136b520063792197f245364da15bbda7aca5a31b7bed04557963
                                                        • Instruction Fuzzy Hash: 76514371B0062AEBCB108F59FA4C1AEBBB0FB45304F924057D480A6354CBBD8925EB5E
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00407190
                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0040719E
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004071AF
                                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 004071C0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                        • API String ID: 667068680-1247241052
                                                        • Opcode ID: 12cc8ab004fe47f31fffcbf58e36badd15f6e56e2ad587471c9b10d870eb8305
                                                        • Instruction ID: 3afd18a413fbafaec0d1884410ec314f69904bb85606d66d63126fe90f125993
                                                        • Opcode Fuzzy Hash: 12cc8ab004fe47f31fffcbf58e36badd15f6e56e2ad587471c9b10d870eb8305
                                                        • Instruction Fuzzy Hash: 3CE0EC71749671AB83209F70BC0EDAA3AA4EE0971139205B2BD15D2361D6BC44559B9C
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __freea$__alloca_probe_16$Info
                                                        • String ID:
                                                        • API String ID: 127012223-0
                                                        • Opcode ID: 8a56644c9f658ced4a7fecf9f58cf2b799a0c4498a4b3962048a55bd8390d3ba
                                                        • Instruction ID: b3b1fd3be87dc675253da9249cad55eb0a70a834b65d1a532299ad71412a1fff
                                                        • Opcode Fuzzy Hash: 8a56644c9f658ced4a7fecf9f58cf2b799a0c4498a4b3962048a55bd8390d3ba
                                                        • Instruction Fuzzy Hash: 24711872B00625ABDF20AE64AC41BAF77B5DFC5314F94005BEA44A7381D73CDC8187A9
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,52949588,?,0041440E,004038E3,?,?,00000000), ref: 004143C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3664257935-537541572
                                                        • Opcode ID: 86759f0994eafd6f84a6647c0fdf9b4e30a2247b6dec6dce197b99e7f52573c2
                                                        • Instruction ID: 9d281342414512710d521e2bc5e8bd8d189b06f0c9bb1d1e4d3acc3ca9f27be4
                                                        • Opcode Fuzzy Hash: 86759f0994eafd6f84a6647c0fdf9b4e30a2247b6dec6dce197b99e7f52573c2
                                                        • Instruction Fuzzy Hash: 9E21F371B41219ABCB219B61AC41F9B77589F817B4F250222ED26A73C0D738ED42C6D8
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 34dfbc0b19412f8332e2df089f070eab11bf50ad423d98e1f5d4bef1ead3c863
                                                        • Instruction ID: 9d2747a7e5b70225cc448f1b3832819408a251e63c6cb1e4317f51345b07cf5e
                                                        • Opcode Fuzzy Hash: 34dfbc0b19412f8332e2df089f070eab11bf50ad423d98e1f5d4bef1ead3c863
                                                        • Instruction Fuzzy Hash: B9B1E870B00215BFDB11DF59D980BAE7BB1BF45304F94816AE401AB392C7B99D42CB69
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,0040A621,00408D5A,00407CB3), ref: 0040A638
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0040A646
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0040A65F
                                                        • SetLastError.KERNEL32(00000000,0040A621,00408D5A,00407CB3), ref: 0040A6B1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: ea70f88f1a7dd67ad85e4a1eb3bc890aa5c44d2470a951be6c0d9591e2143091
                                                        • Instruction ID: 78011c5e5d228000ed262031febe4d72c2c7c60d5ad4d387ad9a5ce747099190
                                                        • Opcode Fuzzy Hash: ea70f88f1a7dd67ad85e4a1eb3bc890aa5c44d2470a951be6c0d9591e2143091
                                                        • Instruction Fuzzy Hash: 530128332093112ED62427B6BD45A5B2678DB51774738063FF510722F1EF7E5C11554D
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,52949588,?,?,00000000,0042534E,000000FF,?,00411458,?,?,0041142C,00000016), ref: 004114FD
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041150F
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,0042534E,000000FF,?,00411458,?,?,0041142C,00000016), ref: 00411531
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 5db7edf03dd5c6a86733f78c3fc37fecd77a691f09511d684ccae05772ab5e40
                                                        • Instruction ID: 91ec29eb5be505712193f20e889ba6035279a869843729da5c2c1c8d1a6e38dc
                                                        • Opcode Fuzzy Hash: 5db7edf03dd5c6a86733f78c3fc37fecd77a691f09511d684ccae05772ab5e40
                                                        • Instruction Fuzzy Hash: 5E018431A50625EBDB218F50DC09BAEB7F9FB44B11F400526F912A22A0DB789900CA58
                                                        APIs
                                                        • __alloca_probe_16.LIBCMT ref: 00418F38
                                                        • __alloca_probe_16.LIBCMT ref: 00418FF9
                                                        • __freea.LIBCMT ref: 00419060
                                                          • Part of subcall function 00415426: HeapAlloc.KERNEL32(00000000,?,?,?,00407448,?,?,004038E3,0000000C), ref: 00415458
                                                        • __freea.LIBCMT ref: 00419075
                                                        • __freea.LIBCMT ref: 00419085
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                        • String ID:
                                                        • API String ID: 1096550386-0
                                                        • Opcode ID: b34ec7378ed80fdedf5b3cd9fd74b686b7ca20f323847e8b562edae9002d46d2
                                                        • Instruction ID: 5a58541e407446bb28ced3c61191459bbd43b91e1c19ac61a4b7f941500e9d67
                                                        • Opcode Fuzzy Hash: b34ec7378ed80fdedf5b3cd9fd74b686b7ca20f323847e8b562edae9002d46d2
                                                        • Instruction Fuzzy Hash: 1451E572600206AFDB249E65CC81EFB3AA9EF48754B15012EFD05D7250EB39DD81C7A9
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00405A30
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00405A3A
                                                          • Part of subcall function 00401980: std::_Lockit::_Lockit.LIBCPMT ref: 0040199C
                                                          • Part of subcall function 00401980: std::_Lockit::~_Lockit.LIBCPMT ref: 004019B9
                                                        • codecvt.LIBCPMT ref: 00405A74
                                                        • std::_Facet_Register.LIBCPMT ref: 00405A8B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00405AAB
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                        • String ID:
                                                        • API String ID: 712880209-0
                                                        • Opcode ID: 08d409ab8f65cfa251cbcb9404e233e286c333acaa76841f7ef905a91d8db047
                                                        • Instruction ID: b96a9e16e5313ba5d76a5da041c455aafda494eca7322fa8897946df384a052d
                                                        • Opcode Fuzzy Hash: 08d409ab8f65cfa251cbcb9404e233e286c333acaa76841f7ef905a91d8db047
                                                        • Instruction Fuzzy Hash: 7C01AD75A00A168BCB05EB65C881AAF7771EF84354F24052EE414BB3D2CB3CAE058F99
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00401F9D
                                                          • Part of subcall function 00408090: RaiseException.KERNEL32(E06D7363,00000001,00000003,00407FAB,?,?,?,?,00407FAB,0000000C,00432FA4,0000000C), ref: 004080F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise___std_exception_copy
                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                        • API String ID: 3109751735-1866435925
                                                        • Opcode ID: 6db5754c0c3f7c630e456a44fc8a01ec81c9786fca09fcb0a19a2d9224875447
                                                        • Instruction ID: 39c8128b798e2086e3302e8ab46e2dce8cada1f1b911e2d41b88b79c7a5bec65
                                                        • Opcode Fuzzy Hash: 6db5754c0c3f7c630e456a44fc8a01ec81c9786fca09fcb0a19a2d9224875447
                                                        • Instruction Fuzzy Hash: BD1136B29107156BC710DF68D801B86B3E8AF08310F14853FFA54E7291F778E804CBA9
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00407DA8
                                                        • ___raise_securityfailure.LIBCMT ref: 00407E90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor___raise_securityfailure
                                                        • String ID: #7@$@SC
                                                        • API String ID: 3761405300-54278199
                                                        • Opcode ID: be0408e9841c2604ed6c70be4b6810e12912a1b256ed321422f905974070e74f
                                                        • Instruction ID: 0d92a2c854cdd6e88b4d1eeb56e5bf4da0bfe8ec24aca00867b110679a0b03e4
                                                        • Opcode Fuzzy Hash: be0408e9841c2604ed6c70be4b6810e12912a1b256ed321422f905974070e74f
                                                        • Instruction Fuzzy Hash: DA2107B4640A00DBD318CF15F9857943BF4BB68355FA0643AE9088B3B1D3B46485CF1E
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,0040B723,00000000,00000001,0043568C,?,?,?,0040B8C6,00000004,InitializeCriticalSectionEx,00427C38,InitializeCriticalSectionEx), ref: 0040B77F
                                                        • GetLastError.KERNEL32(?,0040B723,00000000,00000001,0043568C,?,?,?,0040B8C6,00000004,InitializeCriticalSectionEx,00427C38,InitializeCriticalSectionEx,00000000,?,0040B67D), ref: 0040B789
                                                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,0040A593), ref: 0040B7B1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID: api-ms-
                                                        • API String ID: 3177248105-2084034818
                                                        • Opcode ID: 22226141dfb546a2f16a4bc61347b62053759e468ff986d8c484c8ccf3c75455
                                                        • Instruction ID: 4a96934300341e5ece3864587fe3feae18b3ac400cb1fe2ce3454729e361f76d
                                                        • Opcode Fuzzy Hash: 22226141dfb546a2f16a4bc61347b62053759e468ff986d8c484c8ccf3c75455
                                                        • Instruction Fuzzy Hash: 29E01A30384208BBEF205B61EC06F5A3E64EB40B85F904031FB0DE91E1E775A9519ACC
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(52949588,00000000,00000000,0040BDB8), ref: 00416525
                                                          • Part of subcall function 0041B08B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00419056,?,00000000,-00000008), ref: 0041B137
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00416780
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004167C8
                                                        • GetLastError.KERNEL32 ref: 0041686B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: 82cd919ffc66cdbec26423ec8f462efebf3297e9721ada9a3fb481d80f0d1854
                                                        • Instruction ID: 1bb8143dd65314e62236f50c93da9e0a6d801424c5e2e01ca8c3ea5794d6433d
                                                        • Opcode Fuzzy Hash: 82cd919ffc66cdbec26423ec8f462efebf3297e9721ada9a3fb481d80f0d1854
                                                        • Instruction Fuzzy Hash: 7DD158B5E002589FCB11DFA9D880AEDBBB5FF48304F19412AE856E7351D734E882CB58
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: 651f461737145a99faeddf7e9cbc434de1019a0abfbd738a44b85bf0bb0bacfa
                                                        • Instruction ID: 639cff4bd66d4eed68713a8ae307c2d2d1180f9e9004782a502f2a6fa8fea26a
                                                        • Opcode Fuzzy Hash: 651f461737145a99faeddf7e9cbc434de1019a0abfbd738a44b85bf0bb0bacfa
                                                        • Instruction Fuzzy Hash: 3D51CF72A00302AFEB29AF52C941B7A73A4EF40304F14853FE805672D1D739EC62C79A
                                                        APIs
                                                          • Part of subcall function 0041B08B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00419056,?,00000000,-00000008), ref: 0041B137
                                                        • GetLastError.KERNEL32 ref: 0041B50B
                                                        • __dosmaperr.LIBCMT ref: 0041B512
                                                        • GetLastError.KERNEL32(?,?,?,?), ref: 0041B54C
                                                        • __dosmaperr.LIBCMT ref: 0041B553
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 1913693674-0
                                                        • Opcode ID: 98539fc020fd00bd43affe0888965e6ed426553bce3dc314c44ab490fe6ade4c
                                                        • Instruction ID: cec987ca27f54d0df3a57789ab5f391b1316bc0051da666ab1eca3c5aeea150a
                                                        • Opcode Fuzzy Hash: 98539fc020fd00bd43affe0888965e6ed426553bce3dc314c44ab490fe6ade4c
                                                        • Instruction Fuzzy Hash: 3221B671600215BFDB20EF66C8418ABB7ADFF043A8710852FF85997251D779ED9087D4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 66e116e2024aada6cab71803717b56169a7abbe351efb3759331a0be8796517d
                                                        • Instruction ID: f8db4804455f599fb5fabd8b5f86bcd1d132503182311fbe19c9dedc91394c0d
                                                        • Opcode Fuzzy Hash: 66e116e2024aada6cab71803717b56169a7abbe351efb3759331a0be8796517d
                                                        • Instruction Fuzzy Hash: 8F21F9B1610205AFEB20AF62CC90DAB776CFF40368710452BF415D7252D7B9EDD097A8
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0041C445
                                                          • Part of subcall function 0041B08B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00419056,?,00000000,-00000008), ref: 0041B137
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041C47D
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041C49D
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 158306478-0
                                                        • Opcode ID: 4d096bac32b07df6f96bbfc29f435c2dddc1c3056e5e13fb52e26ce166ed4541
                                                        • Instruction ID: cd346ceb72f841712861b774b6322b7d2f9c84398f992d5f92ec2fcb375f728e
                                                        • Opcode Fuzzy Hash: 4d096bac32b07df6f96bbfc29f435c2dddc1c3056e5e13fb52e26ce166ed4541
                                                        • Instruction Fuzzy Hash: 091104B2A48515BF672127B25CDACFF6D5CDE99398310402AF802D2102EE2CDD8285BD
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421C44,00000000,00000001,00000000,0040BDB8,?,004168BF,0040BDB8,00000000,00000000), ref: 004241FE
                                                        • GetLastError.KERNEL32(?,00421C44,00000000,00000001,00000000,0040BDB8,?,004168BF,0040BDB8,00000000,00000000,0040BDB8,0040BDB8,?,00416E7D,?), ref: 0042420A
                                                          • Part of subcall function 004241D0: CloseHandle.KERNEL32(FFFFFFFE,0042421A,?,00421C44,00000000,00000001,00000000,0040BDB8,?,004168BF,0040BDB8,00000000,00000000,0040BDB8,0040BDB8), ref: 004241E0
                                                        • ___initconout.LIBCMT ref: 0042421A
                                                          • Part of subcall function 00424192: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004241C1,00421C31,0040BDB8,?,004168BF,0040BDB8,00000000,00000000,0040BDB8), ref: 004241A5
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,00421C44,00000000,00000001,00000000,0040BDB8,?,004168BF,0040BDB8,00000000,00000000,0040BDB8), ref: 0042422F
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: ca09305258c16a54d0dcba451752d25af7c96ee1953d8ec0ee725fe34d53713b
                                                        • Instruction ID: 4f4531f6176a0c5b6c9a7a905856594723a902087f3f8d784f297790ae8fc46e
                                                        • Opcode Fuzzy Hash: ca09305258c16a54d0dcba451752d25af7c96ee1953d8ec0ee725fe34d53713b
                                                        • Instruction Fuzzy Hash: C1F03736200124BBCF222FD5FC0899A7F26FB853B0F414065FA5995130C6319870AB99
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 0041033D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: c0cf26b477ce003e2ec9021a6fbfbc89d90c79d8eb5fc1b2203591be7fd8a1bc
                                                        • Instruction ID: ba283ab10e86f0ff01337ebee0106e11519cd21400a500e12903ed81b54b832b
                                                        • Opcode Fuzzy Hash: c0cf26b477ce003e2ec9021a6fbfbc89d90c79d8eb5fc1b2203591be7fd8a1bc
                                                        • Instruction Fuzzy Hash: CD517EB1A4A6068BCB117714DA413EB37A09B40701F604D6BE8D5413E9EB7D8CF69A4F
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00401F9D
                                                          • Part of subcall function 00408090: RaiseException.KERNEL32(E06D7363,00000001,00000003,00407FAB,?,?,?,?,00407FAB,0000000C,00432FA4,0000000C), ref: 004080F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise___std_exception_copy
                                                        • String ID: ios_base::badbit set$ios_base::failbit set
                                                        • API String ID: 3109751735-1240500531
                                                        • Opcode ID: 093cf63a05e0c9d9e505c411f0024045c7293edf30539a5a4b0b12754ed88584
                                                        • Instruction ID: 797d091bbb829d4e8b0eea89e00af225cce609620468ab5527f299f1bcc47ce9
                                                        • Opcode Fuzzy Hash: 093cf63a05e0c9d9e505c411f0024045c7293edf30539a5a4b0b12754ed88584
                                                        • Instruction Fuzzy Hash: 2D414771504301AFC304DF29C841A9BB7E8EF89310F14862FF994A76A1E778E945CB99
                                                        APIs
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0040A46F
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0040A523
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 3480331319-1018135373
                                                        • Opcode ID: ca5a29bd391d885cd4634227e419514380eff920c463d90092caad24f93c2f58
                                                        • Instruction ID: 2e999a1580a82348229a279466bd0bfc2513c0ac70a5a2249b741fcd72562a23
                                                        • Opcode Fuzzy Hash: ca5a29bd391d885cd4634227e419514380eff920c463d90092caad24f93c2f58
                                                        • Instruction Fuzzy Hash: 2741C834A00318ABCF10DF69C844A9E7BB0FF45314F1481A6E8146B3D2D779E961CB9A
                                                        APIs
                                                        • EncodePointer.KERNEL32(00000000,?), ref: 0040AD62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 2118026453-2084237596
                                                        • Opcode ID: 5b710ab2a9f474c2cc4afd51bace25907f511bb75432380764933eab186ad071
                                                        • Instruction ID: a4c454b0bcb5eef0a2e58a0d06434270c6490fd8828ce8058ef1224e804d7477
                                                        • Opcode Fuzzy Hash: 5b710ab2a9f474c2cc4afd51bace25907f511bb75432380764933eab186ad071
                                                        • Instruction Fuzzy Hash: 4C416E71900209AFCF15DFA4CD81AEEBBB5FF48304F19846AF904B7291D3399960DB95
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00407EAE
                                                        • ___raise_securityfailure.LIBCMT ref: 00407F6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor___raise_securityfailure
                                                        • String ID: @SC
                                                        • API String ID: 3761405300-4053289583
                                                        • Opcode ID: ee42222a1a21f84a104741ef492a216a118de1db3b1281724e16a62be68f0859
                                                        • Instruction ID: 10e33e2e5eb9a3d5286ccbecc20551b6eaee076d59bf9c7ce06d7c1cd455d27c
                                                        • Opcode Fuzzy Hash: ee42222a1a21f84a104741ef492a216a118de1db3b1281724e16a62be68f0859
                                                        • Instruction Fuzzy Hash: 2D11E3B4651A04DBD318CF15F8817883BA4BB28346B50B03AE8088B371E3B09595CF5E
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00401875
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004018BA
                                                          • Part of subcall function 004058AA: _Yarn.LIBCPMT ref: 004058C9
                                                          • Part of subcall function 004058AA: _Yarn.LIBCPMT ref: 004058ED
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                        • String ID: bad locale name
                                                        • API String ID: 1908188788-1405518554
                                                        • Opcode ID: 72551ae77e736be2171b1fcc8d603e91bdd62b17c33b334120392a8c0c99013b
                                                        • Instruction ID: 698a41e2f8890499ec269fe88a942146f7bab7e11b1414401b60b7a9d3f26e65
                                                        • Opcode Fuzzy Hash: 72551ae77e736be2171b1fcc8d603e91bdd62b17c33b334120392a8c0c99013b
                                                        • Instruction Fuzzy Hash: 90F01D71515B408ED370DF3A8404743BEE0AF29714F048E2EE4CAD7A92E379E508CBA9
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1718315778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: H_prolog3
                                                        • String ID: A]@$pdB
                                                        • API String ID: 431132790-1964063989
                                                        • Opcode ID: a80e33e7d8d27686206c715740f2a372a192bd8069830a42d80d814282e980e6
                                                        • Instruction ID: 9708e6e5fcb6faf266b2e239077eb0a834cba51f5faa1665736d4655e106cb5a
                                                        • Opcode Fuzzy Hash: a80e33e7d8d27686206c715740f2a372a192bd8069830a42d80d814282e980e6
                                                        • Instruction Fuzzy Hash: AE01D6B4A00615CFC761DF68C580A5ABBF0FF08344B51896EE489DB751D7B5AA40CF98

                                                        Execution Graph

                                                        Execution Coverage:1.2%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:82.9%
                                                        Total number of Nodes:41
                                                        Total number of Limit Nodes:9
                                                        execution_graph 16637 534200 16638 534246 RtlAllocateHeap 16637->16638 16639 53421a 16637->16639 16639->16638 16640 537600 16646 537624 16640->16646 16641 53797e 16642 537a4e 16641->16642 16645 5379ab 16641->16645 16649 537560 LdrInitializeThunk 16641->16649 16644 537560 LdrInitializeThunk 16642->16644 16642->16645 16644->16642 16646->16641 16646->16642 16646->16645 16648 537560 LdrInitializeThunk 16646->16648 16648->16641 16649->16642 16650 53a7e0 16651 53a7f0 16650->16651 16651->16651 16652 53a93e 16651->16652 16654 537560 LdrInitializeThunk 16651->16654 16654->16652 16655 53ac00 16657 53ac25 16655->16657 16656 53ad3e 16658 53ac8f 16657->16658 16661 537560 LdrInitializeThunk 16657->16661 16658->16656 16662 537560 LdrInitializeThunk 16658->16662 16661->16658 16662->16656 16663 537ede 16665 537d03 16663->16665 16666 537bb0 16663->16666 16664 537cf3 16666->16664 16669 537560 LdrInitializeThunk 16666->16669 16668 537c71 16669->16668 16670 52dacc 16673 52de71 16670->16673 16671 52e0e5 16673->16671 16674 537560 LdrInitializeThunk 16673->16674 16674->16673 16675 4fd2c0 16676 4fd2c9 16675->16676 16677 4fd4ae ExitProcess 16676->16677 16678 4fd2d1 GetInputState 16676->16678 16679 4fd2de 16678->16679 16680 4fd4a4 16679->16680 16681 4fd2e6 GetCurrentThreadId GetCurrentProcessId 16679->16681 16680->16677 16682 4fd311 16681->16682 16682->16680 16683 4fd49f 16682->16683 16685 502290 CoInitialize 16683->16685

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: CurrentProcess$ExitInputStateThread
                                                        • String ID: 'GFA$edgf
                                                        • API String ID: 1029096631-957644222
                                                        • Opcode ID: ebbc75f925856320ad03f6ce7c498b9c5e30680585271db283c9dbd57ede9196
                                                        • Instruction ID: 04534c71aef8d73787e2a4bc56b9c1b3ecd4b73ddb8051c0e0b3dea340a8cd8f
                                                        • Opcode Fuzzy Hash: ebbc75f925856320ad03f6ce7c498b9c5e30680585271db283c9dbd57ede9196
                                                        • Instruction Fuzzy Hash: 7141477480C280ABC301BF68D544A2EFFE6AF52709F148D1DE6C487362C73AD8549B6B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 82 537600-53762a call 537f10 85 5379c2-5379c4 82->85 86 537732-537749 call 53a5f0 82->86 87 537631-53763d 82->87 88 537710 82->88 89 537730 82->89 90 537750-53778f 82->90 91 537716-53772f 82->91 92 5377f6-537836 82->92 93 537644-537661 82->93 94 5379ab-5379ad 82->94 95 5379c9-5379f8 82->95 96 5376ac-5376c2 82->96 107 537d05-537d0c 85->107 86->90 86->92 86->94 86->95 122 537a8b-537a8d 86->122 124 537a92-537ab4 call 537f10 86->124 125 537abb-537adb 86->125 126 537b2f-537b3b 86->126 87->86 87->88 87->89 87->90 87->91 87->92 87->93 87->94 87->95 87->96 88->91 89->86 100 537791 90->100 101 5377ca-5377d3 90->101 91->89 108 53786a-537873 92->108 109 537838 92->109 97 537663 93->97 98 537694-5376a5 93->98 94->85 104 5379c0 94->104 105 5379b4-5379b9 94->105 106 537b4f 94->106 110 537a26-537a31 95->110 111 5379fa 95->111 102 5376f4-537700 96->102 103 5376c4 96->103 118 537670-537692 call 5386a0 97->118 98->86 98->90 98->92 98->94 98->95 98->96 98->122 113 5377a0-5377c8 call 538820 100->113 114 537891-5378a6 call 535ab0 101->114 115 5377d9-5377df 101->115 102->86 123 5376d0-5376f2 call 538720 103->123 105->104 129 537b58 106->129 108->114 119 537875-53787b 108->119 116 537840-537868 call 5387a0 109->116 120 537a33-537a3b 110->120 121 537a7c-537a84 110->121 117 537a00-537a24 call 538890 111->117 113->101 171 5378c1-537925 114->171 172 5378a8-5378ab 114->172 128 5377e0-5377ef 115->128 116->108 117->110 118->98 133 537880-53788f 119->133 134 537a40-537a47 120->134 121->122 121->124 121->125 121->126 137 537b42-537b4a 121->137 138 537b40 121->138 139 537b1f-537b25 121->139 140 537d0d-537d2d 121->140 141 537d9c-537dbc 122->141 123->102 124->125 124->126 124->137 124->138 124->139 124->140 165 537e7a-537e87 124->165 166 537e38-537e45 124->166 144 537b04-537b18 125->144 145 537add-537adf 125->145 126->138 128->128 147 5377f1 128->147 129->107 133->114 133->133 153 537a50-537a56 134->153 154 537a49-537a4c 134->154 137->140 139->126 150 537d56-537d5d 140->150 151 537d2f 140->151 142 537de6-537df0 141->142 143 537dbe-537dbf 141->143 161 537df2-537dff 142->161 162 537e18 142->162 159 537dc0-537de4 call 538890 143->159 144->85 144->104 144->105 144->106 144->129 144->139 144->140 163 537ed0 144->163 164 537eb6-537ebb 144->164 144->165 144->166 160 537ae0-537b02 call 538900 145->160 147->114 150->141 168 537d5f-537d6a 150->168 167 537d30-537d54 call 538890 151->167 153->121 170 537a58-537a74 call 537560 153->170 154->134 169 537a4e 154->169 159->142 160->144 175 537e00-537e07 161->175 162->122 162->124 162->125 162->126 162->129 162->137 162->138 162->139 162->140 162->163 162->164 162->165 162->166 176 537e1f-537e29 call 537560 162->176 164->163 165->166 180 537e89 165->180 177 537e47 166->177 178 537e74 166->178 167->150 181 537d70-537d77 168->181 169->121 198 537a79 170->198 184 537927 171->184 185 537956-537961 171->185 183 5378b0-5378bf 172->183 190 537e10-537e16 175->190 191 537e09-537e0c 175->191 202 537e2e-537e31 176->202 193 537e50-537e72 call 538980 177->193 178->165 195 537e90-537eb2 call 538980 180->195 196 537d80-537d86 181->196 197 537d79-537d7c 181->197 183->171 183->183 199 537930-537954 call 538890 184->199 186 537963-53796b 185->186 187 53799f-5379a4 185->187 200 537970-537977 186->200 187->94 187->95 187->122 187->124 187->125 187->126 187->137 187->138 187->139 187->140 190->162 190->176 191->175 201 537e0e 191->201 193->178 216 537eb4 195->216 196->141 206 537d88-537d94 call 537560 196->206 197->181 205 537d7e 197->205 198->121 199->185 208 537980-537986 200->208 209 537979-53797c 200->209 201->162 202->122 202->124 202->125 202->126 202->129 202->137 202->138 202->139 202->140 202->163 202->164 202->165 202->166 205->141 217 537d99 206->217 208->187 215 537988-537997 call 537560 208->215 209->200 214 53797e 209->214 214->187 219 53799c 215->219 216->166 217->141 219->187
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %sgh$2wS$4`[b$B{S$EBC
                                                        • API String ID: 0-1545865569
                                                        • Opcode ID: 239ed56840dcfff025aba0fd1ab06c0343091fa5a4243e9a2dd9f735627ee503
                                                        • Instruction ID: 04c520ea8ddf455d9ab30c268f0e80c94312e311a953b4864f01bb94dd4ae8ca
                                                        • Opcode Fuzzy Hash: 239ed56840dcfff025aba0fd1ab06c0343091fa5a4243e9a2dd9f735627ee503
                                                        • Instruction Fuzzy Hash: 70228BB5D0420ADFDB24CF94D892ABEBFB1FF1A314F240858E941AB352D7359845DBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 220 537560-537592 LdrInitializeThunk
                                                        APIs
                                                        • LdrInitializeThunk.NTDLL(00534FF1,00000001,00000005,?,00000000,?,?,005114D5), ref: 0053758E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: 7654$7654
                                                        • API String ID: 2994545307-1888865020
                                                        • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                        • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                        • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                        • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 221 53a7e0-53a7eb 222 53a7f0-53a7f9 221->222 222->222 223 53a7fb-53a80f 222->223 224 53a811-53a816 223->224 225 53a818 223->225 226 53a81f-53a847 call 4fcac0 224->226 225->226 229 53a862-53a8e1 226->229 230 53a849-53a84f 226->230 232 53a8e3 229->232 233 53a916-53a921 229->233 231 53a850-53a860 230->231 231->229 231->231 236 53a8f0-53a914 call 53c200 232->236 234 53a923-53a92b 233->234 235 53a975-53a987 call 4fcad0 233->235 237 53a930-53a937 234->237 236->233 241 53a940-53a946 237->241 242 53a939-53a93c 237->242 241->235 245 53a948-53a96b call 537560 241->245 242->237 244 53a93e 242->244 244->235 247 53a970-53a973 245->247 247->235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: @$MNOP
                                                        • API String ID: 2994545307-2234187807
                                                        • Opcode ID: fddd3b3084a6a3a1594481a66cd80efacf819fec0a712af71c8c33b6e1179dab
                                                        • Instruction ID: d529139cd8395f122d8712c14a10f6a194d1de396e2b9005002c192f145f4c75
                                                        • Opcode Fuzzy Hash: fddd3b3084a6a3a1594481a66cd80efacf819fec0a712af71c8c33b6e1179dab
                                                        • Instruction Fuzzy Hash: E641DEB25082049FD710DF58C885B6BBBE5FF85318F09882DE4C5CB261E375D914CB52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 254 53ac00-53ac23 255 53ac25 254->255 256 53ac5b-53ac6b 254->256 257 53ac30-53ac59 call 53c200 255->257 258 53ac6d-53ac7f 256->258 259 53acbc-53acc5 256->259 257->256 261 53ac80-53ac88 258->261 262 53ad66-53ad68 259->262 263 53accb-53ace5 259->263 265 53ac91-53ac97 261->265 266 53ac8a-53ac8d 261->266 267 53ad6a-53ad71 262->267 268 53ad79-53ad80 262->268 269 53ace7 263->269 270 53ad16-53ad22 263->270 265->259 277 53ac99-53acb4 call 537560 265->277 266->261 276 53ac8f 266->276 271 53ad73 267->271 272 53ad77 267->272 273 53acf0-53ad14 call 53c200 269->273 274 53ad24-53ad2f 270->274 275 53ad5e-53ad60 270->275 271->272 272->268 273->270 279 53ad30-53ad37 274->279 275->262 281 53ad62 275->281 276->259 285 53acb9 277->285 283 53ad40-53ad46 279->283 284 53ad39-53ad3c 279->284 281->262 283->275 287 53ad48-53ad5b call 537560 283->287 284->279 286 53ad3e 284->286 285->259 286->275 287->275
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: MNOP
                                                        • API String ID: 0-783613192
                                                        • Opcode ID: 6c18c838f411b530292cd5d5f5b4d579124e92d97f5bb9e82ffce46905ba899a
                                                        • Instruction ID: c640b6a03e824592c386bc5143ac3cf2ddef86cab35fa03368a5579c5853297f
                                                        • Opcode Fuzzy Hash: 6c18c838f411b530292cd5d5f5b4d579124e92d97f5bb9e82ffce46905ba899a
                                                        • Instruction Fuzzy Hash: A4418C38608304AFD7249F14D885B2BBFA5FB96B15F248C2CF9C997251D335EC109B56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 248 534200-534218 249 534246-534260 RtlAllocateHeap 248->249 250 53421a 248->250 251 534220-534244 call 5373f0 250->251 251->249
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00534257
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 41b3e00b31ddd3b54ad9cab8188d48ebf3aef553956a5e689608b6baa9d01e09
                                                        • Instruction ID: 78d75ed1e37f4ed9e5b38f8609e24691a781db1010b9d3b7dc2a945f14ccc3e5
                                                        • Opcode Fuzzy Hash: 41b3e00b31ddd3b54ad9cab8188d48ebf3aef553956a5e689608b6baa9d01e09
                                                        • Instruction Fuzzy Hash: 9BF0177850C2809BD601EB58E945A1EFBE5EB55705F44482CF4C497262C235E824DB62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $+*)$(/.-$-"# $076|$1674$4;:p$7654$<jkh$@GFE$AFGD$DKJI$HFo$L321$PWVU$S=S?$T[ZY$UJKH$Ug0a$X_^]$Xa!m$\CBA$`gfe$eZ[X$honm$i'&%$lSRQ$pwvu$qvw=$t{zy$|cba
                                                        • API String ID: 0-1574315579
                                                        • Opcode ID: 7210e6eda30d98f42701af48799cefd4f7ca9062ce420171aea62b1a3a42c424
                                                        • Instruction ID: dce86a3284dc02c33b89a844d736e88cf7d13c901eed5d3ac5cdbb13cab2acf4
                                                        • Opcode Fuzzy Hash: 7210e6eda30d98f42701af48799cefd4f7ca9062ce420171aea62b1a3a42c424
                                                        • Instruction Fuzzy Hash: C3A253B4600B419FE770CF24C891BABBBE2BB85704F544C2CE5AA9B691DB31B845CF51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                        • String ID: 3$?$e
                                                        • API String ID: 2832541153-3975470078
                                                        • Opcode ID: 07026e4112402cac1f4e983f854593267be134c3828748d7eee95c103254cac3
                                                        • Instruction ID: 2e2d00ed593a56283a63242692ef8c462b143a4d737e7d037e7971dad3be89cf
                                                        • Opcode Fuzzy Hash: 07026e4112402cac1f4e983f854593267be134c3828748d7eee95c103254cac3
                                                        • Instruction Fuzzy Hash: F5416F7040C3918ED311EF3D948872EBFE0AF96314F144A6DE4DA863D2C6758549D7A3
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: String$Free$Variant$ClearInit
                                                        • String ID: 4`[b$7654
                                                        • API String ID: 4205145696-3675246634
                                                        • Opcode ID: 4e1bc9004b2d6ce942eb359ace718d1fdf4a5896e6ed384c1c26f67335757800
                                                        • Instruction ID: 48dad36bf811a6d1968cf775b553d9ba829828855b5d73aaed410c11ea8ac638
                                                        • Opcode Fuzzy Hash: 4e1bc9004b2d6ce942eb359ace718d1fdf4a5896e6ed384c1c26f67335757800
                                                        • Instruction Fuzzy Hash: DCE1FC75A083019FDB04CF68E895BAEBBB1FB89305F14482CE485E7291D735D909DB51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: AllocString
                                                        • String ID: ,/$4`[b$7654
                                                        • API String ID: 2525500382-138038313
                                                        • Opcode ID: c090b6ffad8847001c5a3f7fda7c6102de1ff5cce7e037af5f66181763f6bf4a
                                                        • Instruction ID: 9c3fadba1f03a4414a85aebbbd7fbd75842956469a541723e2594e344c531ee9
                                                        • Opcode Fuzzy Hash: c090b6ffad8847001c5a3f7fda7c6102de1ff5cce7e037af5f66181763f6bf4a
                                                        • Instruction Fuzzy Hash: 33E1DB75A08305EFDB108F68EC85BAEBBB1FB8A305F14482CF585A7291C735D915CB62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 13$58$89$8<$9lji$I1$PQ$w%r'$us$f
                                                        • API String ID: 0-2782953580
                                                        • Opcode ID: f6b0829606f129af945a0ad4bec6688cf4081706a4116d4718fba0fa6a4680b3
                                                        • Instruction ID: 9f428832397a687612c06b0ad80f041230d6799e99c2deed0b6e1b2c34386b17
                                                        • Opcode Fuzzy Hash: f6b0829606f129af945a0ad4bec6688cf4081706a4116d4718fba0fa6a4680b3
                                                        • Instruction Fuzzy Hash: 90429BB4104740DFD3248F25D884B5ABBF5FF8A308F64996CE58A8B2A1D735E80ADF51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: -17E$7654$7654$=I# $?8N$QQ;%$r~Q$E'I
                                                        • API String ID: 0-1005114666
                                                        • Opcode ID: 42be1b2bd8f8ddc6a9ebaaa3e6d1397d4ee521d0a624622f34786315f19278ee
                                                        • Instruction ID: 1c4a633a06849663492c6205f5ca8231c72da3589561d7b18b9d8a1b329e2fc8
                                                        • Opcode Fuzzy Hash: 42be1b2bd8f8ddc6a9ebaaa3e6d1397d4ee521d0a624622f34786315f19278ee
                                                        • Instruction Fuzzy Hash: A542DD79608315DFD714CF28D8806AABBE2FF9A708F48896CE88587391D735DC44DB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 3_]$4`[b$4`[b$7654$8C-A$;[6Y$Vwvu${/}-
                                                        • API String ID: 0-2602927754
                                                        • Opcode ID: 70b16fd379dc429d66a2f9ebc869de221c84966013635e4fa97cd70ac1ca8ad8
                                                        • Instruction ID: 3c412153af55728a240450b8b48ef641837020457336567d2065d06d50241ef2
                                                        • Opcode Fuzzy Hash: 70b16fd379dc429d66a2f9ebc869de221c84966013635e4fa97cd70ac1ca8ad8
                                                        • Instruction Fuzzy Hash: 49129BB4600700DFC764CF24C892BA6BBF2FF56308F24885CE59A8B692D775E855CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: drC$.L6j$>Wv$KJIg$vRTb$~PF<
                                                        • API String ID: 0-2296406947
                                                        • Opcode ID: 3c0866ba8491ddc01819ff91803c9692e71513fc88e649fde970f54960b0c9aa
                                                        • Instruction ID: 11f9662e4fe79356818a9ed25d53f5a3f1ca408080ffc755635aac278e72b2f2
                                                        • Opcode Fuzzy Hash: 3c0866ba8491ddc01819ff91803c9692e71513fc88e649fde970f54960b0c9aa
                                                        • Instruction Fuzzy Hash: 3AD29B74405B908AE7328F35D894BA3BFE1BF1B305F48499DD4EB8B282D739A505CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$7654$HK$cb`d$gzyi$vrhz
                                                        • API String ID: 0-2685429167
                                                        • Opcode ID: 504f530e61fdbb3279a171f038a9da2b03754779cdcdde51dc5fecb4cf2e0857
                                                        • Instruction ID: bfad44f8fd0b2cbeb069b4ae68a51a7b6812593a63f5ce9faf35d945aa39d236
                                                        • Opcode Fuzzy Hash: 504f530e61fdbb3279a171f038a9da2b03754779cdcdde51dc5fecb4cf2e0857
                                                        • Instruction Fuzzy Hash: 0542EBB9508380DFE7019F24D891AAFBBE1FF9A348F14482DE5D58B262D335D944CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ^G$`c$[Z]$su$wy
                                                        • API String ID: 0-2730888924
                                                        • Opcode ID: 2988da92bdab4c1bbdf3d76df03f071b5c0d4159d40f6fac2bf6c13030aa2aaf
                                                        • Instruction ID: d3e504cf21e64dda683e4787946edeaba12aa0ed5910e38ee88c80aa90d854b7
                                                        • Opcode Fuzzy Hash: 2988da92bdab4c1bbdf3d76df03f071b5c0d4159d40f6fac2bf6c13030aa2aaf
                                                        • Instruction Fuzzy Hash: B62287B44083419BE700EF58D881A6EBBF1BF95358F088D1CF4D48B292D37AD995CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %!-0$:g;1$GA$j$yE
                                                        • API String ID: 0-657862259
                                                        • Opcode ID: aca411b9b7aac31a24052d60ea2461692290f42512563979b15b7b570176493e
                                                        • Instruction ID: eea7b14aba043a789fcb70a26beaeb6bdae1155d9a9f5c224cdbcafa5c6342e3
                                                        • Opcode Fuzzy Hash: aca411b9b7aac31a24052d60ea2461692290f42512563979b15b7b570176493e
                                                        • Instruction Fuzzy Hash: B102AD741083858FD321DF14D4806AFBBE1FF9A308F144A6DE5C98B392E3799919CB5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$4`[b$7654$7654$L]
                                                        • API String ID: 0-1286059558
                                                        • Opcode ID: d11bca47a4bfd2ef0943396b863a8aee990ec181336ca56b38793adb843adc5e
                                                        • Instruction ID: 89cbabaf4c1eaebdf24250dad4eaab44ab5117345c78c8510c7f29d2889959d6
                                                        • Opcode Fuzzy Hash: d11bca47a4bfd2ef0943396b863a8aee990ec181336ca56b38793adb843adc5e
                                                        • Instruction Fuzzy Hash: 39E1ADB9508344DFE320DF14D881BAEBBE5FB9A344F548C2CE68887261D736D944CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: s$6$H$M|$rF
                                                        • API String ID: 0-3047902030
                                                        • Opcode ID: 81bfb6b8e75b6afd9ebea2c1e720f5be70c650965b45644092199cbce57488b4
                                                        • Instruction ID: c656bbb131f7bb613208754673b939f8adffe5432eee25eb3f60249344700880
                                                        • Opcode Fuzzy Hash: 81bfb6b8e75b6afd9ebea2c1e720f5be70c650965b45644092199cbce57488b4
                                                        • Instruction Fuzzy Hash: 33D1A97050C3859BD311DF18D494A2FBBE1AF82744F18496EE9D58B342D33AD909CBAB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,+$lk$;9
                                                        • API String ID: 0-1734778162
                                                        • Opcode ID: 2c01eafc1130ae515fc26536b35f4a2a6b731f89b335b825641a85d99546c6ad
                                                        • Instruction ID: f3f9d930d91754c4f9df4cdd0d67500c2f190f5c5c4fc08cb216ece4292ab35b
                                                        • Opcode Fuzzy Hash: 2c01eafc1130ae515fc26536b35f4a2a6b731f89b335b825641a85d99546c6ad
                                                        • Instruction Fuzzy Hash: 6F02B5745093428BE721DF28C480AABBBF2FF95744F58891CE4C58B260E775D984DBA3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$7654$defg
                                                        • API String ID: 0-754973257
                                                        • Opcode ID: 3e2da0fef9aedbb9e5dd99d19858a3045bc5f96fa9cfc2cf3645d58adaadc6f8
                                                        • Instruction ID: 2f9fa9f285f22c8ac2994b7500c0c864f0690fa6a2cc449082bf39d9c065ab3a
                                                        • Opcode Fuzzy Hash: 3e2da0fef9aedbb9e5dd99d19858a3045bc5f96fa9cfc2cf3645d58adaadc6f8
                                                        • Instruction Fuzzy Hash: 2BC1AD755083089BE711EF18D881AABBBF5FF99354F08081CF8D18B251E335E995CBA2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 7654$f
                                                        • API String ID: 0-930265988
                                                        • Opcode ID: ae44eabd4c394d94cf16a17d8a40a58f2ad476ef01930b0e2262e6c7612552fe
                                                        • Instruction ID: ac63e5213c2b7a87f6a588ae5d578b87d464dc33d95db0425c0cfcc50faeaf13
                                                        • Opcode Fuzzy Hash: ae44eabd4c394d94cf16a17d8a40a58f2ad476ef01930b0e2262e6c7612552fe
                                                        • Instruction Fuzzy Hash: A412AB756087419FC715CF18C880B2EBFE6BBD9354F589A2CF8958B2A1E331E844CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$7654
                                                        • API String ID: 0-3675246634
                                                        • Opcode ID: d1c02695cd90b86a503f5cae28e7e1f9dc34b51f131f4e2258c8a797abb135cd
                                                        • Instruction ID: 89b140f34a4d7b332adb9fc321b5aaa9c70f840b8d6279e28b60a43789f338d0
                                                        • Opcode Fuzzy Hash: d1c02695cd90b86a503f5cae28e7e1f9dc34b51f131f4e2258c8a797abb135cd
                                                        • Instruction Fuzzy Hash: C8121274608341DFD724CF28D8807AABBF2BF9A314F15896CE489873A2D771D948DB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #,)$J(Z4
                                                        • API String ID: 0-1033251941
                                                        • Opcode ID: 9223f37d2801a19cf1798b238ef5aba093cd8b274f6746d8fe81b1a83dfa7c95
                                                        • Instruction ID: 44a25a4d020c8ae3fa41bb6ca2a332df9325f2546e91a68790b940fdce1be420
                                                        • Opcode Fuzzy Hash: 9223f37d2801a19cf1798b238ef5aba093cd8b274f6746d8fe81b1a83dfa7c95
                                                        • Instruction Fuzzy Hash: 0BF1DE71604B908BE7658F34D494BE7BBE2BF13304F14886ED5EA87282CB39A505CF61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$7654
                                                        • API String ID: 0-3675246634
                                                        • Opcode ID: 278f4d794d5ced5f37c0f82e328750123d5d8bfc0b3d970b6476b120aa12bede
                                                        • Instruction ID: 788ec2c23bf3ca5a9e0ccedb180fcd5a70e24131568baae357a8e333c5faeeef
                                                        • Opcode Fuzzy Hash: 278f4d794d5ced5f37c0f82e328750123d5d8bfc0b3d970b6476b120aa12bede
                                                        • Instruction Fuzzy Hash: FDA1FF75804208DBC720AF58DC92A7B77B4FFA2368F084428E88987391F735AD54C7A6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b$7654
                                                        • API String ID: 0-3675246634
                                                        • Opcode ID: 570126bd1a829a07e639b5fd39fbedf37c03624331cf43b74e0a694a82222f79
                                                        • Instruction ID: 3deef79b55124abca87f5a92e2c29746de864cf59e5c9e1ea7b0909f1fe93e1b
                                                        • Opcode Fuzzy Hash: 570126bd1a829a07e639b5fd39fbedf37c03624331cf43b74e0a694a82222f79
                                                        • Instruction Fuzzy Hash: 79D12674A08381DFD724CF24D8807AABBF2BFAA318F15496CE489973A1D3719D48DB51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 5S$P
                                                        • API String ID: 0-164877797
                                                        • Opcode ID: fb9079a04a99d42f6b598dd8e4fc53c98ad80bce3f414638b18d964096442139
                                                        • Instruction ID: 77d8ab05b2b00845175652d9df03c925200ed2997845133d5190ca4d54d3ba3f
                                                        • Opcode Fuzzy Hash: fb9079a04a99d42f6b598dd8e4fc53c98ad80bce3f414638b18d964096442139
                                                        • Instruction Fuzzy Hash: 1AD1A4B29082658FC726CE18989071EBBE1FBC5718F158A2CE8B5AB390C7B1DC45D7D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: 7654$e
                                                        • API String ID: 2994545307-2460420260
                                                        • Opcode ID: c0582c18f568c2f36b29d21144d15eaacc8256eff10d68def4b00fd53ccf143a
                                                        • Instruction ID: aac539d7856812032a8b5aecd704ca75fef9696c00d731c83a9ba4e2bacff27e
                                                        • Opcode Fuzzy Hash: c0582c18f568c2f36b29d21144d15eaacc8256eff10d68def4b00fd53ccf143a
                                                        • Instruction Fuzzy Hash: BEA1FF755483458FE714DF18C890ABBBFE2FF95314F14892CE58597252E33AE884CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: J(Z4$O<>5
                                                        • API String ID: 0-1381569939
                                                        • Opcode ID: e54240440999cb06d3e823ec5474e314e41f2ca0186008e6457507ef1147b1cb
                                                        • Instruction ID: be79734e122c3ba1f0b4e88e7cc9e4c12aae337b7ffc8e0fea259332c121b05d
                                                        • Opcode Fuzzy Hash: e54240440999cb06d3e823ec5474e314e41f2ca0186008e6457507ef1147b1cb
                                                        • Instruction Fuzzy Hash: 2CA1A670008B918AE766CF39D060BA3FFE1BF16304F54485ED4EB8B682DB76A405CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,+$;9
                                                        • API String ID: 0-1035581042
                                                        • Opcode ID: f84b49f46518d03c9b64f7b40594a55f3355ac16a61985211282ab312580802d
                                                        • Instruction ID: dfeb2bf20199340f3c41873b871dd33885c16f12ae265d051c28673f4743c3be
                                                        • Opcode Fuzzy Hash: f84b49f46518d03c9b64f7b40594a55f3355ac16a61985211282ab312580802d
                                                        • Instruction Fuzzy Hash: 9E715678409381DAE7258F24C980BABBBF1FF86304F549A1DE9D987221EB35D844DB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,+$;9
                                                        • API String ID: 0-1035581042
                                                        • Opcode ID: 2397affcfe93ec8df7ef763751062344f8f303f251ed03f625a326026d4d1549
                                                        • Instruction ID: 2dc262214535e29141ebc36649e545c1146ec4b15e8203fd2ad3a4ec52e67c4b
                                                        • Opcode Fuzzy Hash: 2397affcfe93ec8df7ef763751062344f8f303f251ed03f625a326026d4d1549
                                                        • Instruction Fuzzy Hash: 64617578009381DAE7258F24C980BABBBF1FF86304F649A1DE5D987221EB35D844DB53
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: @$MNOP
                                                        • API String ID: 2994545307-2234187807
                                                        • Opcode ID: f3069ddb15e8720421a09270459d5b1417719fbec599cb25232acaad3cdd0a3d
                                                        • Instruction ID: b38d303afd9ae436f2fbda224afc46d16c3d6ab7f730aad7d47d3993bf522611
                                                        • Opcode Fuzzy Hash: f3069ddb15e8720421a09270459d5b1417719fbec599cb25232acaad3cdd0a3d
                                                        • Instruction Fuzzy Hash: 3F3145B89083049BD314DF18D884A2BFBF9FF9A318F14992CE6C897251D335D9049BA6
                                                        APIs
                                                        • CoCreateInstance.OLE32(0053EB80,00000000,00000001,0053EB70), ref: 00516CC9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID:
                                                        • API String ID: 542301482-0
                                                        • Opcode ID: a032c05504cc778d3613ce96eab69f4f2d9a780765e749bc5e2e2d3d0524c62f
                                                        • Instruction ID: e8dc9bae32ad741c8bd08d90627dc4f156e72279991f0e8be000b0bc8ff205aa
                                                        • Opcode Fuzzy Hash: a032c05504cc778d3613ce96eab69f4f2d9a780765e749bc5e2e2d3d0524c62f
                                                        • Instruction Fuzzy Hash: 1B61E0B56002049BEB20DB24DC96BB73BB8FF81358F044A58F9468F290F775E885C761
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "
                                                        • API String ID: 0-123907689
                                                        • Opcode ID: ebf93012f695f814ea8beb274b67aa73a9487f93ba687a60f16075264e124bcf
                                                        • Instruction ID: 9821acff46e79e6fc6c0d4fe986edbc4458d22d88e16e9a2b4c692260d88374b
                                                        • Opcode Fuzzy Hash: ebf93012f695f814ea8beb274b67aa73a9487f93ba687a60f16075264e124bcf
                                                        • Instruction Fuzzy Hash: 0BC12472A04B255BD714CE24E48076BBBE9BFE6350F18896DE8968B3C1D734EC04CB95
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: J(Z4
                                                        • API String ID: 0-2186490230
                                                        • Opcode ID: 405294fb29117ab8fe4584bd3fc9c6969d18b272f5481f1204e4113e86cccb46
                                                        • Instruction ID: 074fe630e0f532fb743b7100f395eb8d9d86d9eb2978919577c69fc353c1cb51
                                                        • Opcode Fuzzy Hash: 405294fb29117ab8fe4584bd3fc9c6969d18b272f5481f1204e4113e86cccb46
                                                        • Instruction Fuzzy Hash: 05A16670408B918AE7768F39D090BA3BFE1BF16304F44489DD4EA8B682D776A845CF65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: 4`[b
                                                        • API String ID: 2994545307-3962175265
                                                        • Opcode ID: 44576e2e486db3da04b7dd12b701db24dd430d0626392413d565ddc462f15d90
                                                        • Instruction ID: 26b309458b7ceedcd59d4f4a2260a6a33b3f6de790235544cff3e825634cd592
                                                        • Opcode Fuzzy Hash: 44576e2e486db3da04b7dd12b701db24dd430d0626392413d565ddc462f15d90
                                                        • Instruction Fuzzy Hash: 28918C75608301ABDB28DB14C881BBBBBE6FBD5354F544C1CF99897291EB30E844DB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 7654
                                                        • API String ID: 0-4024152101
                                                        • Opcode ID: 026be2b67953c20b80e0967e47d80ba4db2d61dcf0757a95451455372a70017d
                                                        • Instruction ID: cdc5075bdeb7e90d7b0f1a5c67237ae3cf623a3a491b67c5741cd9c74019a027
                                                        • Opcode Fuzzy Hash: 026be2b67953c20b80e0967e47d80ba4db2d61dcf0757a95451455372a70017d
                                                        • Instruction Fuzzy Hash: 4171E0716087459FD725CE29C880B2ABBE6FFD5314F18A92CE9C587291E330DC45CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4`[b
                                                        • API String ID: 0-3962175265
                                                        • Opcode ID: a1aaf3ff043a6121b783216efa723e6495537043a70cdc1f305e24dacbeebe80
                                                        • Instruction ID: 76b70a406de678b04e56ad74f5d6534a2bde79443b6d86597a7146772b709937
                                                        • Opcode Fuzzy Hash: a1aaf3ff043a6121b783216efa723e6495537043a70cdc1f305e24dacbeebe80
                                                        • Instruction Fuzzy Hash: 3151D275608305ABC7199E18CCA1B3EFBE6FB85724F188A2CF8D597391CB35AC049791
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 7654
                                                        • API String ID: 0-4024152101
                                                        • Opcode ID: 0ab95aca48e35b66f4ba1842e4daba50eeed1e37279f6e4588369a91ec0e57a5
                                                        • Instruction ID: 352b3b4e9dc2b3f7f432587ffaf2d1b73850d477aaec3f9d168ff24fff3c5c29
                                                        • Opcode Fuzzy Hash: 0ab95aca48e35b66f4ba1842e4daba50eeed1e37279f6e4588369a91ec0e57a5
                                                        • Instruction Fuzzy Hash: B751897560C244ABCB249F18D994B2AFFE6FB99709F18881CE5C987251D331EC50DF62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: MNOP
                                                        • API String ID: 0-783613192
                                                        • Opcode ID: 0479d4551ea498b97b698d33a1fc63832f8a9b87c8bfd013e3c1e05e6dd61870
                                                        • Instruction ID: 87efb49e9895d1becd4b3aa413e3f2c9455c5b9fe0f585b24b749ea3add99e5d
                                                        • Opcode Fuzzy Hash: 0479d4551ea498b97b698d33a1fc63832f8a9b87c8bfd013e3c1e05e6dd61870
                                                        • Instruction Fuzzy Hash: 9E416078608344AFD724DE14D881F2BBFAAFB95714F24881CF9C997252D335DC10AB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 80
                                                        • API String ID: 0-1093746208
                                                        • Opcode ID: 3b938ec33b79cb07b324fddb144679aebf8eea7869a4707d11d7253f39b0cd9f
                                                        • Instruction ID: 056456ab1082530534698247a43f59163de0a620ccccae91bca898f370ef1b6f
                                                        • Opcode Fuzzy Hash: 3b938ec33b79cb07b324fddb144679aebf8eea7869a4707d11d7253f39b0cd9f
                                                        • Instruction Fuzzy Hash: D1219FB55082009BE310AF18C841A6BBBF5FF92765F5A590CF4D59B291E338C940CBA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PS
                                                        • API String ID: 0-489029678
                                                        • Opcode ID: 573b00587521d222294b4bc5f5baf3881d7dc7814fdc8f789029d51a15ffa3a0
                                                        • Instruction ID: 98c5f71b69e01a94a1728d837399afda551d6180931086361812e499d4b4d0b0
                                                        • Opcode Fuzzy Hash: 573b00587521d222294b4bc5f5baf3881d7dc7814fdc8f789029d51a15ffa3a0
                                                        • Instruction Fuzzy Hash: 9221D8F0900B40AFD360EF3AC90675BBFE8EB45350F104A1DF8AA87690D371A4058BD6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c84dc163cc3c49e41649ec4ca698097034249f4fc0e626d71a11f795a22b880a
                                                        • Instruction ID: b9e2058edc32edfea5d56f23d95a9485a1b427c39cf1183bcbd5c21744cb3789
                                                        • Opcode Fuzzy Hash: c84dc163cc3c49e41649ec4ca698097034249f4fc0e626d71a11f795a22b880a
                                                        • Instruction Fuzzy Hash: 4D12DC75A08251DFCB04CF28D8946AEBBF1FF8A314F19882DE585D7252E335D918CB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2c71bcd3bb9e8a53968e71587fc4bfeb634880dd02ff28e94598dad06f64446a
                                                        • Instruction ID: 004862680549059e0d4d8c187c9734c828872442f17d5acbb344a959650181c3
                                                        • Opcode Fuzzy Hash: 2c71bcd3bb9e8a53968e71587fc4bfeb634880dd02ff28e94598dad06f64446a
                                                        • Instruction Fuzzy Hash: FA022279A08659CFCB14CF68D8806AEBBB1FF1A318F1449A8D851E7392D331E944DF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0537d3602b05352d162d47d3b37e8bd64bb5caa79fc0b4c4570d86523830f7e
                                                        • Instruction ID: b4142265368e93a6a5c6d504f5a620a96731403476b1c813a752864ce5e8fbb6
                                                        • Opcode Fuzzy Hash: e0537d3602b05352d162d47d3b37e8bd64bb5caa79fc0b4c4570d86523830f7e
                                                        • Instruction Fuzzy Hash: C3F1FF756083458FC724DF29C88063BFBE2AFD9304F08882EE5C987751E679E859CB56
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 00d08f85603ca87d3e1ddb34cb26a64c77bbefebfde8a6128f6fa46cc998501f
                                                        • Instruction ID: 7fbdac6ee44727208a20488c3299d5499499dbc873ea16f3d322eda445d3c453
                                                        • Opcode Fuzzy Hash: 00d08f85603ca87d3e1ddb34cb26a64c77bbefebfde8a6128f6fa46cc998501f
                                                        • Instruction Fuzzy Hash: AAA147B05006819FE3218F29D884B1AFBF5FF5A300F244D1DE5DA87792E336A854CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1942f4fac88b38fd3ab4b40a097851fc7591de249ba2f4ef44b3b64fe7370d0c
                                                        • Instruction ID: 542c062d053952e8706aebee437ced1a8e0e4340b2771047f44b63b9d680e489
                                                        • Opcode Fuzzy Hash: 1942f4fac88b38fd3ab4b40a097851fc7591de249ba2f4ef44b3b64fe7370d0c
                                                        • Instruction Fuzzy Hash: D9916D749006419FD725CF28D880B2AFBFAFF96304F24491DD49A87392E735E945CB94
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8780f4132df6fa53c8f78823ccf45832734a0569ecd0f62527ef1b13f6a6269
                                                        • Instruction ID: 3f31ab89dc94698284a95d6d115cac4892ab9cc93d3d5926ef7207e69b5ebabe
                                                        • Opcode Fuzzy Hash: a8780f4132df6fa53c8f78823ccf45832734a0569ecd0f62527ef1b13f6a6269
                                                        • Instruction Fuzzy Hash: 78818AB4A00A01DFD321DF29D880A2BBBF5FF9A304F14491DE58687792E735E855CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3fdc577f74a6e05371dcd5b63f229eff325bed8fc8107d70147d47fda5614830
                                                        • Instruction ID: e47fb7f3625996194a482ff0ece9c3010f993bee3331cd0494b658efc342c110
                                                        • Opcode Fuzzy Hash: 3fdc577f74a6e05371dcd5b63f229eff325bed8fc8107d70147d47fda5614830
                                                        • Instruction Fuzzy Hash: 18717BB81083518BE720EF18C890B6ABBF0FF96344F141D1CE4D59B2A1E379D945CB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9dbc45808b30e6fa3db3aa9c258438acafcf36f73bc8f78da09728321f052cbe
                                                        • Instruction ID: 22d4916db5ecfc233750a6e25f4f981edebe6ece89220ab90430b6be8b03b6cc
                                                        • Opcode Fuzzy Hash: 9dbc45808b30e6fa3db3aa9c258438acafcf36f73bc8f78da09728321f052cbe
                                                        • Instruction Fuzzy Hash: 8D61C1B5900B01DFD7259F35E880A27BBF5FB55318F144A2CE18687AA2E771F884CB85
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: da4315b43ef7fcd122fe05b4bf651397eeb99478655ea21026eccc6ad8bb353e
                                                        • Instruction ID: fbb91685d2ea1fb4bc1875e80fa525b487b5d229761d083c21230c5cfcef4bf8
                                                        • Opcode Fuzzy Hash: da4315b43ef7fcd122fe05b4bf651397eeb99478655ea21026eccc6ad8bb353e
                                                        • Instruction Fuzzy Hash: D851E6759046099FC714DF18C48093BBBA1FF85324F19466EFA958B392D734EC42CB9A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 08c903a2774bc6df5269ec9394e4d2b4249a1b345d6e6f96374d041045904a8a
                                                        • Instruction ID: 05cf065d2e99cf3c1fb4e756df20ac5fd19b9ccb8ee8b492044bea60d59097d6
                                                        • Opcode Fuzzy Hash: 08c903a2774bc6df5269ec9394e4d2b4249a1b345d6e6f96374d041045904a8a
                                                        • Instruction Fuzzy Hash: 0E310A306052489BD7109E59D8C093BB7E1EFC5318F1A993EE99AC7351DB39DC42CB4A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                        • Instruction ID: c0e677af2e3a7c479a1ff78ec79fcec749961dd80f1706acb8e251997b8da6dd
                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                        • Instruction Fuzzy Hash: A111C633B051E40ED3168D3C9480565BFE31E97735F1D4399E4B89F2D2E7228D8A8754
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 280971b818c92cda73003084fe35fa709fc308098d1831b144d262705e9ce05f
                                                        • Instruction ID: 5f5d547feabcd67f010ff072108fa14054916ccec0c9806df44ccf66075cfabe
                                                        • Opcode Fuzzy Hash: 280971b818c92cda73003084fe35fa709fc308098d1831b144d262705e9ce05f
                                                        • Instruction Fuzzy Hash: 6701F1F1A0231947E720DE11A5C0B3BFAA9BF82318F18152CE909672C3DBB9FC15C695
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ba806809778c19953ac0a2dfb69ae2c54a95d2828d67140244f0c5282ef7af9
                                                        • Instruction ID: 8082f58c41aff677a1afd9aa6f895085e9c39b84eb4eef4cca2472f1b31d5d1e
                                                        • Opcode Fuzzy Hash: 3ba806809778c19953ac0a2dfb69ae2c54a95d2828d67140244f0c5282ef7af9
                                                        • Instruction Fuzzy Hash: 561134B4518380AFD304DF689448A1FFBE8BB96708F50982CF4D487242E735D909CB56
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b9cf59fee9e0ef29fe80cc11bb054a4cf5ef83a9304f2cd08d63badaad85c0b
                                                        • Instruction ID: 07daf8d6993372a4d65729e8ca94de5d00d6f1736d774af90b590ce8e6ec24ec
                                                        • Opcode Fuzzy Hash: 0b9cf59fee9e0ef29fe80cc11bb054a4cf5ef83a9304f2cd08d63badaad85c0b
                                                        • Instruction Fuzzy Hash: 4FF02B3676821A0BE718CD56ECD0D77B377D7D6255B09103EDA42D3341C968E80AE264
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a262c98f02bee36f9e7b41f4a9b905533450b75733afa39f2542f44ca0caaf6
                                                        • Instruction ID: 6714b73fbfbf4692ad59c699e468258131d04c0480774c9c83004c9c77b749a6
                                                        • Opcode Fuzzy Hash: 7a262c98f02bee36f9e7b41f4a9b905533450b75733afa39f2542f44ca0caaf6
                                                        • Instruction Fuzzy Hash: D8F027B1A0421027EB2299449C80B7BBF9CEF86314F090415E840571C2E2715C4183E7
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                        • Instruction ID: 0301f9b3e8e1e81f4a8901530123be484c128a1bd1b924a9b5f39e7ec3a30523
                                                        • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                        • Instruction Fuzzy Hash: 60D0A73560872146AB788E19A800977FBF0FEC7B11F89955EF582E3148D630DC41C2A9
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: MetricsSystem
                                                        • String ID: 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$ 9T$@AT$HAT$PAT$XAT$`AT$hAT$pAT$xAT$AT$AT
                                                        • API String ID: 4116985748-1672365463
                                                        • Opcode ID: 7b930825331fb1c4761206d92d4202e45d8c890fa8eff8f7e17cdba08252b2b5
                                                        • Instruction ID: b5f90eae336d387d3bcc58f67e9103bf7e9daa706a62021ea4f9bd89ad234a79
                                                        • Opcode Fuzzy Hash: 7b930825331fb1c4761206d92d4202e45d8c890fa8eff8f7e17cdba08252b2b5
                                                        • Instruction Fuzzy Hash: E86131B44497819AE3B49F14E888BCFBEE0BB9530CF51AD1CD5896A350CBB55588CF82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: !$#$($-$0$2$4$7$8$9$?$?$H$V$e
                                                        • API String ID: 2610073882-164105402
                                                        • Opcode ID: 8e8c8c174750e2c20a27c658743d462d17eab5d4cd26e93a3f5349cfd5fbfc56
                                                        • Instruction ID: 7e35ceff986f869d943b4eaaf1eb5de7d59d4b332c5f62b8cfc7b38ae6b178fe
                                                        • Opcode Fuzzy Hash: 8e8c8c174750e2c20a27c658743d462d17eab5d4cd26e93a3f5349cfd5fbfc56
                                                        • Instruction Fuzzy Hash: 5741F9600087C1CED726CF298488606BFA1AF16224F488ADDD8E54F7DBC775D519C7A6
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: !$#$($-$0$2$4$7$8$9$?$?$H$V$e
                                                        • API String ID: 2610073882-164105402
                                                        • Opcode ID: f7dadb894d6df3ef0b20a3ca8127cd61282e919bbe5f88a6130b8e5ae3a753d3
                                                        • Instruction ID: 7ecdb03911f84c6684e513ee825ff621f95bb5c12cc5721ad20935a2c1ae6b27
                                                        • Opcode Fuzzy Hash: f7dadb894d6df3ef0b20a3ca8127cd61282e919bbe5f88a6130b8e5ae3a753d3
                                                        • Instruction Fuzzy Hash: 2641D6601087C1CED726CF288488616BFA16F26224F488ADDD8E54F7DBC375E519CBA2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: 2$a$c$e$f$g$i$q$s$u$w$y${$}
                                                        • API String ID: 2610073882-100263010
                                                        • Opcode ID: 1176002ba606681c395935ce2a51cc97cf37c060c4ebd76c7dbcff0460936c95
                                                        • Instruction ID: 724cad5064af8c78832bafaecad91cbd50bf8e172bbccce055dae3c0c6d3f187
                                                        • Opcode Fuzzy Hash: 1176002ba606681c395935ce2a51cc97cf37c060c4ebd76c7dbcff0460936c95
                                                        • Instruction Fuzzy Hash: 8941F330508B818ED715DF28C488616BFA1AF16314F088A8CD8EA4F797C375E519CBA2
                                                        APIs
                                                        • VariantClear.OLEAUT32(04EC839E), ref: 0052733D
                                                        • VariantInit.OLEAUT32 ref: 0052734C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: 2$a$c$e$f$g$i$q$s$u$w$y${$}
                                                        • API String ID: 2610073882-100263010
                                                        • Opcode ID: 869a3955a04cc5ca8adba8f8054f601161e58253b9b17f89021d7a3bd0635965
                                                        • Instruction ID: fcabf3c3eed3f953be7eda13d52191e5bcc53919f4194a0450df5257834f1ee4
                                                        • Opcode Fuzzy Hash: 869a3955a04cc5ca8adba8f8054f601161e58253b9b17f89021d7a3bd0635965
                                                        • Instruction Fuzzy Hash: 1B41D630508B818ED715DF28C588716BFE1AF16314F088A8CD8EA4F797C375E519CBA2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8U!W$AK$D^$I\$L!_#$dE;G
                                                        • API String ID: 0-1822214113
                                                        • Opcode ID: 63ec8e3044ac19b86380273e18d86e639f0e22a612f1d86e46fa0cdfe2cd02d4
                                                        • Instruction ID: 18690bc522601e6b2a26e65ecd42a0d7374d818ccb03195957eb44a394ad115c
                                                        • Opcode Fuzzy Hash: 63ec8e3044ac19b86380273e18d86e639f0e22a612f1d86e46fa0cdfe2cd02d4
                                                        • Instruction Fuzzy Hash: 13E15FB4108340ABE320DF55E980A6BBBF0FF86B48F54491CF5849B261D738D949DBA7
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: AllocString
                                                        • String ID: -$.$/$0$1$3
                                                        • API String ID: 2525500382-387867814
                                                        • Opcode ID: d0890c032e22df8ecc8e41fda34c2cd6b2caaac0e26a2a10cfdaf8dc0a940bfa
                                                        • Instruction ID: 381943281ae7dcb0ff1e3410791764a58a3295e67d1dc550df626ecc63f44e2c
                                                        • Opcode Fuzzy Hash: d0890c032e22df8ecc8e41fda34c2cd6b2caaac0e26a2a10cfdaf8dc0a940bfa
                                                        • Instruction Fuzzy Hash: 03918260508BC38AC326CB3C9888605FFA17B67234B4887D9E5F54F7E7D260D586C7A6
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2945377054.00000000004F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004F0000, based on PE: true
                                                        • Associated: 00000003.00000002.2945354266.00000000004F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945415334.000000000053D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945433997.0000000000540000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                        • Associated: 00000003.00000002.2945454337.0000000000550000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_4f0000_saLBqUuaxl.jbxd
                                                        Similarity
                                                        • API ID: AllocString
                                                        • String ID: 9T$ 9T$0
                                                        • API String ID: 2525500382-1169922966
                                                        • Opcode ID: 1a10c0b21ce3d728314ece6d49f2d051e4f973d0385166936d32e862ebcd0720
                                                        • Instruction ID: 81d3994823775d35bcb253a4582f6fc3f3fa448c546f3bd3eb2bae77048cef02
                                                        • Opcode Fuzzy Hash: 1a10c0b21ce3d728314ece6d49f2d051e4f973d0385166936d32e862ebcd0720
                                                        • Instruction Fuzzy Hash: 8DA1A760508BC38EC326CB3C9888645FFA17B27224B4887DDE5F54E3E3D7649586C7A6

                                                        Execution Graph

                                                        Execution Coverage:9.4%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:88
                                                        Total number of Limit Nodes:9
                                                        execution_graph 40876 9bd0b8 40877 9bd0fe GetCurrentProcess 40876->40877 40879 9bd149 40877->40879 40880 9bd150 GetCurrentThread 40877->40880 40879->40880 40881 9bd18d GetCurrentProcess 40880->40881 40882 9bd186 40880->40882 40883 9bd1c3 40881->40883 40882->40881 40884 9bd1eb GetCurrentThreadId 40883->40884 40885 9bd21c 40884->40885 40886 9b4668 40887 9b4684 40886->40887 40888 9b4696 40887->40888 40892 9b47a0 40887->40892 40897 9b3e10 40888->40897 40893 9b47c5 40892->40893 40901 9b48b0 40893->40901 40905 9b48a1 40893->40905 40898 9b3e1b 40897->40898 40913 9b5c54 40898->40913 40900 9b46b5 40902 9b48d7 40901->40902 40903 9b49b4 40902->40903 40909 9b4248 40902->40909 40907 9b48d7 40905->40907 40906 9b49b4 40906->40906 40907->40906 40908 9b4248 CreateActCtxA 40907->40908 40908->40906 40910 9b5940 CreateActCtxA 40909->40910 40912 9b5a03 40910->40912 40914 9b5c5f 40913->40914 40917 9b5c64 40914->40917 40916 9b709d 40916->40900 40918 9b5c6f 40917->40918 40921 9b5c94 40918->40921 40920 9b717a 40920->40916 40922 9b5c99 40921->40922 40925 9b5cc4 40922->40925 40924 9b726d 40924->40920 40926 9b5ccf 40925->40926 40927 9b8653 40926->40927 40931 9bad01 40926->40931 40928 9b8691 40927->40928 40935 9bcde0 40927->40935 40928->40924 40940 9bad38 40931->40940 40944 9bad28 40931->40944 40932 9bad16 40932->40927 40936 9bce11 40935->40936 40937 9bce35 40936->40937 40959 9bcf90 40936->40959 40963 9bcfa0 40936->40963 40937->40928 40949 9bae30 40940->40949 40954 9bae20 40940->40954 40941 9bad47 40941->40932 40945 9bad38 40944->40945 40947 9bae30 GetModuleHandleW 40945->40947 40948 9bae20 GetModuleHandleW 40945->40948 40946 9bad47 40946->40932 40947->40946 40948->40946 40950 9bae64 40949->40950 40951 9bae41 40949->40951 40950->40941 40951->40950 40952 9bb068 GetModuleHandleW 40951->40952 40953 9bb095 40952->40953 40953->40941 40955 9bae41 40954->40955 40956 9bae64 40954->40956 40955->40956 40957 9bb068 GetModuleHandleW 40955->40957 40956->40941 40958 9bb095 40957->40958 40958->40941 40960 9bcfa0 40959->40960 40961 9bcfe7 40960->40961 40967 9bc8d8 40960->40967 40961->40937 40964 9bcfad 40963->40964 40965 9bcfe7 40964->40965 40966 9bc8d8 2 API calls 40964->40966 40965->40937 40966->40965 40968 9bc8dd 40967->40968 40970 9bd8f8 40968->40970 40971 9bca04 40968->40971 40970->40970 40972 9bca0f 40971->40972 40973 9b5cc4 2 API calls 40972->40973 40974 9bd967 40973->40974 40974->40970 40861 73c4979 40862 73c4914 40861->40862 40862->40861 40863 73c4986 40862->40863 40866 73c5a18 40862->40866 40864 73c4935 40868 73c5a60 40866->40868 40867 73c5a69 40867->40864 40868->40867 40870 73c55e0 40868->40870 40871 73c5b60 LoadLibraryW 40870->40871 40873 73c5bd5 40871->40873 40873->40867 40874 9bd300 DuplicateHandle 40875 9bd396 40874->40875
                                                        Strings
                                                        • :\Users\user\AppData\Roaming\Adobe\*, xrefs: 05E9A566
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: :\Users\user\AppData\Roaming\Adobe\*
                                                        • API String ID: 0-155104036
                                                        • Opcode ID: 96bd4906e19be35d8cb4f9a10632c1e4541f478c9540fe796e0397e43dab7f6b
                                                        • Instruction ID: 4106ad9f2450d93e9bffaecc579dfc0b103b13cb441c4764601c38ee7f286631
                                                        • Opcode Fuzzy Hash: 96bd4906e19be35d8cb4f9a10632c1e4541f478c9540fe796e0397e43dab7f6b
                                                        • Instruction Fuzzy Hash: 8DD1F670D00318CFDB18EFB4D84869DBBB2FF8A301F5095A9E55AAB295DB315989CF01
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a47e886906b8a77ee6002da2729dd2284d60ace7c754cef0d067b270e7f20d3
                                                        • Instruction ID: 78df468377aa6e4a2891605ef1f9484c3b9e7a9cc2b3bb32629d4faf453d4d4e
                                                        • Opcode Fuzzy Hash: 4a47e886906b8a77ee6002da2729dd2284d60ace7c754cef0d067b270e7f20d3
                                                        • Instruction Fuzzy Hash: 00F1AE31A002199FDB15DF68D880B9EBBF2FF84304F15856AE449EB291DB30ED45CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 983 5e81298-5e812af 985 5e812b1-5e812b7 983->985 986 5e812c7-5e812e9 983->986 987 5e812b9 985->987 988 5e812bb-5e812bd 985->988 991 5e812ec-5e812f0 986->991 987->986 988->986 992 5e812f9-5e812fe 991->992 993 5e812f2-5e812f7 991->993 994 5e81304-5e81307 992->994 993->994 995 5e814f8-5e81500 994->995 996 5e8130d-5e81322 994->996 996->991 998 5e81324 996->998 999 5e81498 998->999 1000 5e8132b-5e81350 998->1000 1001 5e813e0-5e81405 998->1001 1002 5e814a2-5e814b9 999->1002 1013 5e81352-5e81354 1000->1013 1014 5e81356-5e8135a 1000->1014 1011 5e8140b-5e8140f 1001->1011 1012 5e81407-5e81409 1001->1012 1005 5e814bf-5e814f3 1002->1005 1005->991 1015 5e81430-5e81453 1011->1015 1016 5e81411-5e8142e 1011->1016 1020 5e8146d-5e81493 1012->1020 1021 5e813b8-5e813db 1013->1021 1017 5e8137b-5e8139e 1014->1017 1018 5e8135c-5e81379 1014->1018 1035 5e8146b 1015->1035 1036 5e81455-5e8145b 1015->1036 1016->1020 1037 5e813a0-5e813a6 1017->1037 1038 5e813b6 1017->1038 1018->1021 1020->991 1021->991 1035->1020 1039 5e8145d 1036->1039 1040 5e8145f-5e81461 1036->1040 1041 5e813a8 1037->1041 1042 5e813aa-5e813ac 1037->1042 1038->1021 1039->1035 1040->1035 1041->1038 1042->1038
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                        • API String ID: 0-3823777903
                                                        • Opcode ID: df5aae2784b8834d16156c2e3867df9b6c51e31034f8d0230b3724b69a953135
                                                        • Instruction ID: 3bbc7ec2161980eb2a2e36d8e196ffa506fd226477bfa844fcca4b6fa56e1b4f
                                                        • Opcode Fuzzy Hash: df5aae2784b8834d16156c2e3867df9b6c51e31034f8d0230b3724b69a953135
                                                        • Instruction Fuzzy Hash: C061DF707002049FEB59EBA98858A3A77E7BF88705B129419E64E8F396DF71DC02C791

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1126 9bd0a8-9bd147 GetCurrentProcess 1130 9bd149-9bd14f 1126->1130 1131 9bd150-9bd184 GetCurrentThread 1126->1131 1130->1131 1132 9bd18d-9bd1c1 GetCurrentProcess 1131->1132 1133 9bd186-9bd18c 1131->1133 1135 9bd1ca-9bd1e5 call 9bd289 1132->1135 1136 9bd1c3-9bd1c9 1132->1136 1133->1132 1139 9bd1eb-9bd21a GetCurrentThreadId 1135->1139 1136->1135 1140 9bd21c-9bd222 1139->1140 1141 9bd223-9bd285 1139->1141 1140->1141
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 009BD136
                                                        • GetCurrentThread.KERNEL32 ref: 009BD173
                                                        • GetCurrentProcess.KERNEL32 ref: 009BD1B0
                                                        • GetCurrentThreadId.KERNEL32 ref: 009BD209
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 61cc630d4659dfba0188d013f4d3f63a15fd0a8583bfdcdfbbc431035f183df1
                                                        • Instruction ID: 3c8f6f272c46ea6750bb016b56dff90e0e93561fb18c6e72964da09be4404ab7
                                                        • Opcode Fuzzy Hash: 61cc630d4659dfba0188d013f4d3f63a15fd0a8583bfdcdfbbc431035f183df1
                                                        • Instruction Fuzzy Hash: D85167B09013498FDB18DFA9D948BDEBBF1EF88314F248459E019A73A0DB749984CB65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1148 9bd0b8-9bd147 GetCurrentProcess 1152 9bd149-9bd14f 1148->1152 1153 9bd150-9bd184 GetCurrentThread 1148->1153 1152->1153 1154 9bd18d-9bd1c1 GetCurrentProcess 1153->1154 1155 9bd186-9bd18c 1153->1155 1157 9bd1ca-9bd1e5 call 9bd289 1154->1157 1158 9bd1c3-9bd1c9 1154->1158 1155->1154 1161 9bd1eb-9bd21a GetCurrentThreadId 1157->1161 1158->1157 1162 9bd21c-9bd222 1161->1162 1163 9bd223-9bd285 1161->1163 1162->1163
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 009BD136
                                                        • GetCurrentThread.KERNEL32 ref: 009BD173
                                                        • GetCurrentProcess.KERNEL32 ref: 009BD1B0
                                                        • GetCurrentThreadId.KERNEL32 ref: 009BD209
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: c00a1166fe4fe10f1c10cd33a6c8422f734dcc970be278bf3422a96f7f269a32
                                                        • Instruction ID: 20e9563d86c3151fb77bf756ee49394e88f376eda55bbe32065d063d47ffac7c
                                                        • Opcode Fuzzy Hash: c00a1166fe4fe10f1c10cd33a6c8422f734dcc970be278bf3422a96f7f269a32
                                                        • Instruction Fuzzy Hash: 235178B09013498FDB14DFA9D948BDEBBF1EF48314F208419E019A73A0DB749984CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1443 5e810d0-5e810d3 1444 5e810dd 1443->1444 1445 5e810e7-5e810fe 1444->1445 1446 5e81104-5e81106 1445->1446 1447 5e81108-5e8110e 1446->1447 1448 5e8111e-5e81127 1446->1448 1449 5e81110 1447->1449 1450 5e81112-5e81114 1447->1450 1452 5e81174-5e8117e 1448->1452 1449->1448 1450->1448 1453 5e810c0-5e810cf 1452->1453 1454 5e81184 1452->1454 1453->1443 1457 5e81129-5e8112d 1453->1457 1455 5e81247-5e81250 1454->1455 1458 5e8113c 1457->1458 1459 5e8112f-5e8113a 1457->1459 1460 5e81141-5e81144 1458->1460 1459->1460 1460->1455 1462 5e8114a-5e8114e 1460->1462 1463 5e8115d 1462->1463 1464 5e81150-5e8115b 1462->1464 1465 5e8115f-5e81161 1463->1465 1464->1465 1466 5e81253-5e81294 1465->1466 1467 5e81167-5e81171 1465->1467 1474 5e812c4 1466->1474 1475 5e81296-5e812af 1466->1475 1467->1452 1477 5e812c7-5e812e9 1474->1477 1475->1477 1479 5e812b1-5e812b7 1475->1479 1484 5e812ec-5e812f0 1477->1484 1481 5e812b9 1479->1481 1482 5e812bb-5e812bd 1479->1482 1481->1477 1482->1477 1485 5e812f9-5e812fe 1484->1485 1486 5e812f2-5e812f7 1484->1486 1487 5e81304-5e81307 1485->1487 1486->1487 1488 5e814f8-5e81500 1487->1488 1489 5e8130d-5e81322 1487->1489 1489->1484 1491 5e81324 1489->1491 1492 5e81498 1491->1492 1493 5e8132b-5e81350 1491->1493 1494 5e813e0-5e81405 1491->1494 1495 5e814a2-5e814b9 1492->1495 1506 5e81352-5e81354 1493->1506 1507 5e81356-5e8135a 1493->1507 1504 5e8140b-5e8140f 1494->1504 1505 5e81407-5e81409 1494->1505 1498 5e814bf-5e814f3 1495->1498 1498->1484 1508 5e81430-5e81453 1504->1508 1509 5e81411-5e8142e 1504->1509 1513 5e8146d-5e81493 1505->1513 1514 5e813b8-5e813db 1506->1514 1510 5e8137b-5e8139e 1507->1510 1511 5e8135c-5e81379 1507->1511 1528 5e8146b 1508->1528 1529 5e81455-5e8145b 1508->1529 1509->1513 1530 5e813a0-5e813a6 1510->1530 1531 5e813b6 1510->1531 1511->1514 1513->1484 1514->1484 1528->1513 1532 5e8145d 1529->1532 1533 5e8145f-5e81461 1529->1533 1534 5e813a8 1530->1534 1535 5e813aa-5e813ac 1530->1535 1531->1514 1532->1528 1533->1528 1534->1531 1535->1531
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q
                                                        • API String ID: 0-355816377
                                                        • Opcode ID: f80483ee915c11c7d3436dc3084a88799378bfd22b931811f4973d2dc85690c8
                                                        • Instruction ID: 502e66bbcfe10126d2520e1e4a3698787d0abf84def48cc5f7365ad44dfebd9c
                                                        • Opcode Fuzzy Hash: f80483ee915c11c7d3436dc3084a88799378bfd22b931811f4973d2dc85690c8
                                                        • Instruction Fuzzy Hash: 9D71C0707002009FDB59ABA8C854B7A7BE7AF89705F11942AE64ECF3A2DE75DC02C751

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1735 9bae30-9bae3f 1736 9bae6b-9bae6f 1735->1736 1737 9bae41-9bae4e call 9b9838 1735->1737 1738 9bae83-9baec4 1736->1738 1739 9bae71-9bae7b 1736->1739 1742 9bae50 1737->1742 1743 9bae64 1737->1743 1746 9baed1-9baedf 1738->1746 1747 9baec6-9baece 1738->1747 1739->1738 1792 9bae56 call 9bb0b8 1742->1792 1793 9bae56 call 9bb0c8 1742->1793 1743->1736 1749 9baf03-9baf05 1746->1749 1750 9baee1-9baee6 1746->1750 1747->1746 1748 9bae5c-9bae5e 1748->1743 1753 9bafa0-9bafb7 1748->1753 1754 9baf08-9baf0f 1749->1754 1751 9baee8-9baeef call 9ba814 1750->1751 1752 9baef1 1750->1752 1756 9baef3-9baf01 1751->1756 1752->1756 1768 9bafb9-9bb018 1753->1768 1757 9baf1c-9baf23 1754->1757 1758 9baf11-9baf19 1754->1758 1756->1754 1760 9baf30-9baf39 call 9ba824 1757->1760 1761 9baf25-9baf2d 1757->1761 1758->1757 1766 9baf3b-9baf43 1760->1766 1767 9baf46-9baf4b 1760->1767 1761->1760 1766->1767 1769 9baf69-9baf76 1767->1769 1770 9baf4d-9baf54 1767->1770 1786 9bb01a-9bb060 1768->1786 1777 9baf99-9baf9f 1769->1777 1778 9baf78-9baf96 1769->1778 1770->1769 1771 9baf56-9baf66 call 9ba834 call 9ba844 1770->1771 1771->1769 1778->1777 1787 9bb068-9bb093 GetModuleHandleW 1786->1787 1788 9bb062-9bb065 1786->1788 1789 9bb09c-9bb0b0 1787->1789 1790 9bb095-9bb09b 1787->1790 1788->1787 1790->1789 1792->1748 1793->1748
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 009BB086
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: b2bcf9bd1841dd64a8b7842e6c4bdd67de839ae080304db5bba0b232ee61595f
                                                        • Instruction ID: 444ce0432889310bf7e95a2463f8829443df96376d1cf507d859b4ad6e9fc275
                                                        • Opcode Fuzzy Hash: b2bcf9bd1841dd64a8b7842e6c4bdd67de839ae080304db5bba0b232ee61595f
                                                        • Instruction Fuzzy Hash: 668166B0A00B058FD724DF29D5457AABBF5FF88310F00892DE48AC7A50DB75E849CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q
                                                        • API String ID: 0-388095546
                                                        • Opcode ID: a826eb5780c469a767eed26c6b0cb0a298561e4aa672b0f8161225292f185811
                                                        • Instruction ID: 852331fbdb570d0bcb7b3d7eb23bd720b6f6b01ba3d3ff78cf6514087cd86dec
                                                        • Opcode Fuzzy Hash: a826eb5780c469a767eed26c6b0cb0a298561e4aa672b0f8161225292f185811
                                                        • Instruction Fuzzy Hash: B3E15D74B002158FDF18DF69C454AAEBBF2FF88604B149569D946EB3A5DB30DC02CBA1
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 009B59F1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 2afe47bd9bd61b39950d12cb2e5397723378058c5321c6a53523a1ce4aac6d61
                                                        • Instruction ID: 9231a95ba3ef3c4e1f28c1a38acdfb3eea84df192173873304bf10f4b6af201f
                                                        • Opcode Fuzzy Hash: 2afe47bd9bd61b39950d12cb2e5397723378058c5321c6a53523a1ce4aac6d61
                                                        • Instruction Fuzzy Hash: D641EDB0C00719CFDB24DFA9C884BCDBBB5BF49314F20816AD408AB251DBB5694ACF90
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 009B59F1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 8101e1f782f27f4c762b87a8aa99d8cab0dd7da6c126e9d8c1d26ece04ac2afa
                                                        • Instruction ID: a6b5837de2b56847bb7f6acc3a864a10e1121c880c622cae14e3185da66deed8
                                                        • Opcode Fuzzy Hash: 8101e1f782f27f4c762b87a8aa99d8cab0dd7da6c126e9d8c1d26ece04ac2afa
                                                        • Instruction Fuzzy Hash: 8641D0B0D00719CEDB24DFAAC984BDDBBB5FF48314F20816AD409AB251DB756945CF90
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 009BD387
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 5fcf77356274f8bfe29e7c0ad7428ece7bcd62666131427be4bd8ccb29136de9
                                                        • Instruction ID: 54bf6764e6e0a37a1a5e21f48709a6bf61d740253c0e0435829b9517dfd390e9
                                                        • Opcode Fuzzy Hash: 5fcf77356274f8bfe29e7c0ad7428ece7bcd62666131427be4bd8ccb29136de9
                                                        • Instruction Fuzzy Hash: BB21E4B59003489FDB10CFAAD984ADEBBF9EB48320F14841AE918A3351D375A954CFA1
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 009BD387
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 3a1e90e493390ed79c243efbdc18e56c36e1517d09c4302aa1c8e85aa6a5466b
                                                        • Instruction ID: 6757f658e0e5e2345061bdf643d4eeae9cf9f0287b5076c9b0a6f4ed42552bfe
                                                        • Opcode Fuzzy Hash: 3a1e90e493390ed79c243efbdc18e56c36e1517d09c4302aa1c8e85aa6a5466b
                                                        • Instruction Fuzzy Hash: D52112B59003099FDB10CFA9E584ADEFBF9FB48324F10841AE918B7250D378AA40CF60
                                                        APIs
                                                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,073C5ABE), ref: 073C5BC6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1873925691.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_73c0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 40e23c4fee7ef41332676c9fe0e952fa1fbd3b9e68b1d48af90052d726fbdc9a
                                                        • Instruction ID: 2ad7ae6acc79b4e541be5a2fa592a6d0371a654d1824a887f315fea5dfd31847
                                                        • Opcode Fuzzy Hash: 40e23c4fee7ef41332676c9fe0e952fa1fbd3b9e68b1d48af90052d726fbdc9a
                                                        • Instruction Fuzzy Hash: E21126B5C003498FDB10DF9AD844ADEFBF5EB88324F10841AD459A7650C375A946CFA1
                                                        APIs
                                                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,073C5ABE), ref: 073C5BC6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1873925691.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_73c0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: f8fae4f42d91cd536d74b8fbf3bdc12e2f07b2a3b11448013cea4dfff81fffbb
                                                        • Instruction ID: f720ec62dbcf6cd5d6a377213c9d670bddd460d8e8dc9db753216623e4d7b51d
                                                        • Opcode Fuzzy Hash: f8fae4f42d91cd536d74b8fbf3bdc12e2f07b2a3b11448013cea4dfff81fffbb
                                                        • Instruction Fuzzy Hash: 1C1123B5D003498FDB10DF9AD444ADEFBF5EB88320F24841AD419B7610D375A945CFA4
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 009BB086
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859436627.00000000009B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_9b0000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: d0beff512d7c66251ec10a9f496e25a5e301e6d536c6362111e0db815cbf54fa
                                                        • Instruction ID: cb2860179280aafef7514a64b4d2ba5f3657af85b8547017c869cdc1cc0e3b08
                                                        • Opcode Fuzzy Hash: d0beff512d7c66251ec10a9f496e25a5e301e6d536c6362111e0db815cbf54fa
                                                        • Instruction Fuzzy Hash: DC11E0B5C003498FCB20DF9AD944ADEFBF9EB88324F10841AD469B7650C3B5A545CFA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: d
                                                        • API String ID: 0-2564639436
                                                        • Opcode ID: 50a833dd2a599ce96c3200885c44341224a1e3948ebfc4c198dd6b50b2d00835
                                                        • Instruction ID: a95f37ce29b655e711645503fa2c844c7cda73a9b510222724c25571b880c703
                                                        • Opcode Fuzzy Hash: 50a833dd2a599ce96c3200885c44341224a1e3948ebfc4c198dd6b50b2d00835
                                                        • Instruction Fuzzy Hash: 82C15B35600602CFCB29CF19C580D6ABBF2FF89314B26C95AD59A9B665D730FC46CB80
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c19a2e5d8ab3afe6b6915ca2c1dc440b0158cfd5bf555888c0d3b2b8a5802726
                                                        • Instruction ID: ef40fa962353ae9a90af0ec3f800ade25c4d456c3a2e3db1a5713eff5aeb3d0d
                                                        • Opcode Fuzzy Hash: c19a2e5d8ab3afe6b6915ca2c1dc440b0158cfd5bf555888c0d3b2b8a5802726
                                                        • Instruction Fuzzy Hash: F8C26F74B001189FDB14DFA4C955AADBBF6FF88704F108099E60AAB3A1DB31AD45CF91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: d0731ab69a9ab7fcef04055f936927a98bd9249fb14602f18b81b81b56f8f18d
                                                        • Instruction ID: 2631eedab90eb409b331d7fc55bdafa3a5309ee0e30c18b04dcb71c1f8f2107b
                                                        • Opcode Fuzzy Hash: d0731ab69a9ab7fcef04055f936927a98bd9249fb14602f18b81b81b56f8f18d
                                                        • Instruction Fuzzy Hash: E03158317043508FD719A73CA4506AE7BE6EFCA31570548AEE489CB341DE35EC0787A2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: 71e1b0d8676e1652034466ffaa1ef6a6df99c440444bb70096f61702c398c0e3
                                                        • Instruction ID: 4ac5214d3bcdaa0b08061cc7f67be046e6627bac0a8143d67118c425845b2015
                                                        • Opcode Fuzzy Hash: 71e1b0d8676e1652034466ffaa1ef6a6df99c440444bb70096f61702c398c0e3
                                                        • Instruction Fuzzy Hash: 58319A317002088BEB09AB79E4946AE77E7AFC8211B508839D51BCB385EE75DD4687D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: cdf15cfa63e517b47b9339eebe5f3681af5717efe7bb32e33ae491bb11467afb
                                                        • Instruction ID: 604b0b5a220af9b388827a6504c9d134d2dbd19918d1d3f09efd4a2948fb1da6
                                                        • Opcode Fuzzy Hash: cdf15cfa63e517b47b9339eebe5f3681af5717efe7bb32e33ae491bb11467afb
                                                        • Instruction Fuzzy Hash: CE218B317102148BEB09AB7894A467E37E3AFC8211750483DD51BDB386EE79DD4A87D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: 618b1f5ed1f561c1c4d8558bd71d5b1e123ade693e44b9e503c57eed1244dac0
                                                        • Instruction ID: ccc9b189feaa0c45382855370a873c68064b00d9ce52055b73b18f36119d14dd
                                                        • Opcode Fuzzy Hash: 618b1f5ed1f561c1c4d8558bd71d5b1e123ade693e44b9e503c57eed1244dac0
                                                        • Instruction Fuzzy Hash: 2201B130915349EFCB00EFB8E4A458CBFF5FF45301B2048AAD985D7251DB341A89CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: 35cfa444584f2888357dc64e2f015fc09d9f458218e087f84f6ac43bfac2f661
                                                        • Instruction ID: 84fe55294bca7abd514947487fab2787adfb42cbe5c0ca57b52d567db9310744
                                                        • Opcode Fuzzy Hash: 35cfa444584f2888357dc64e2f015fc09d9f458218e087f84f6ac43bfac2f661
                                                        • Instruction Fuzzy Hash: 77F090313006118BC208EB2DE490AAF77EAEBC92513104D2DE44EDB345EF74AD4A87E2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: 4df96254bab511358ac07b6f3ae148322019fbfdcad06fa7197d961ee862507d
                                                        • Instruction ID: eb632dcfbb603d9f33473645f74c389f709431048a88ceca3aff7b54a4a967ce
                                                        • Opcode Fuzzy Hash: 4df96254bab511358ac07b6f3ae148322019fbfdcad06fa7197d961ee862507d
                                                        • Instruction Fuzzy Hash: 16F08C70E11208EFCB04EFB8E49865CBBF6FB44301F1085A9E90AD7214EE301A488B81
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7d60b6a7901c5fb5f1e86e3a14916528099c9c2a28850bac31ff08f8dc888f4e
                                                        • Instruction ID: f5a4a4219892987179f97de4896d6b5ddf5fe2df399945c890f0cb9eb063d89a
                                                        • Opcode Fuzzy Hash: 7d60b6a7901c5fb5f1e86e3a14916528099c9c2a28850bac31ff08f8dc888f4e
                                                        • Instruction Fuzzy Hash: 364298307007288FCB24AF789454A2EB6E2FFC5705B51495CD54B9B392CF79ED098B82
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8972224ef3120c39cb724285654fc5ee82b62222c021e30536365aa59d3db4a1
                                                        • Instruction ID: 127bb95687441b0768c71bb2297c0ea7169a924f7241b96ba1b65ec5a1078c8f
                                                        • Opcode Fuzzy Hash: 8972224ef3120c39cb724285654fc5ee82b62222c021e30536365aa59d3db4a1
                                                        • Instruction Fuzzy Hash: D6027A307007148FDB24AB64C858A3E77E6FF85705F519858E54A9B3A2CF79ED098B82
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c24ed160d27de52748238cf0effb6ba678756458d74e6965e65bb10eed639c56
                                                        • Instruction ID: 3a6b33e8ee22ad7067aab058dac1d11c905d0a6083311d35cbdb6436104f55da
                                                        • Opcode Fuzzy Hash: c24ed160d27de52748238cf0effb6ba678756458d74e6965e65bb10eed639c56
                                                        • Instruction Fuzzy Hash: D6C1A1307003009FEB04EBA4C859B7A7BEABF89704F119455E60A9B3A2DF75EC45CB91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 701f150f951d556d1da809a86770b56f45ec7f833e66e038b2f0864902a63e7e
                                                        • Instruction ID: b37050e37469d24af59f46baff45b22517932d195d7ace1f256bc604b6a5691d
                                                        • Opcode Fuzzy Hash: 701f150f951d556d1da809a86770b56f45ec7f833e66e038b2f0864902a63e7e
                                                        • Instruction Fuzzy Hash: 12C171307003009FEB04ABA4C858B7A77EBBF89705F119455E60A9B3A2CF75ED45CB91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45ef9d8e7277ffa87309fb5070d0bfd58360ddd21c33dad7088ce6f36d284ce2
                                                        • Instruction ID: 5cfd95724d12b90564044f880f754c10b8b5e06216a986781c326d6cef6af4ed
                                                        • Opcode Fuzzy Hash: 45ef9d8e7277ffa87309fb5070d0bfd58360ddd21c33dad7088ce6f36d284ce2
                                                        • Instruction Fuzzy Hash: A2C14974700605CFDB15DF29C484AAABBF2FF88305B1585A9E546DB3A6DB30EC45CB60
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39d6ef2c1fd745d142def6354d234464374eefd8077d3052bba533678e2674e1
                                                        • Instruction ID: 1e653a23201036546663167c42a1a601f63352d036b89d5a99be348b7eadc3bc
                                                        • Opcode Fuzzy Hash: 39d6ef2c1fd745d142def6354d234464374eefd8077d3052bba533678e2674e1
                                                        • Instruction Fuzzy Hash: 41B10974B002148FCB44DF68C894EAABBF6FF89714F118099E54ADB3A2DA71EC45CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5fb38cfd50fdf7cabd54861c4d60856bfd5d811a8b96fdea899f7f282138d817
                                                        • Instruction ID: d5108e55d0c20bc903d67e5944ab9114aecac5e7231a76a0d830c9eadb2422b0
                                                        • Opcode Fuzzy Hash: 5fb38cfd50fdf7cabd54861c4d60856bfd5d811a8b96fdea899f7f282138d817
                                                        • Instruction Fuzzy Hash: 465127B0E102188BDF18CFA9D885BDEBBB6FF89314F14942DE455AB250DB749846CF80
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e44901b178984e883cbcb643a61c5408ff9188a6310d9df1bdc9c41bca2b64b5
                                                        • Instruction ID: c9dc34051d3669df406defa06ca45b210cff9494205bf0349a245a5648716648
                                                        • Opcode Fuzzy Hash: e44901b178984e883cbcb643a61c5408ff9188a6310d9df1bdc9c41bca2b64b5
                                                        • Instruction Fuzzy Hash: E95125B0D202588BDF18CFA9D985BDEBBF1FB49304F14942DE455AB280DB749849CF80
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b727a0076ea8bb3863c0e75a8b1ae18d6d37d48c0830fbdce96dfb252c72bb22
                                                        • Instruction ID: ad5d91bfbb7a3788b804f4e60070a88d93322e4ee2f42befdbeaea1570ef6abc
                                                        • Opcode Fuzzy Hash: b727a0076ea8bb3863c0e75a8b1ae18d6d37d48c0830fbdce96dfb252c72bb22
                                                        • Instruction Fuzzy Hash: 8531C074B042448FDB18AB64C854A7EBBE6EF85304F15942AD58BC73A2EE34CC02CB51
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02e8556c60a81a7f825e5c9a80b63cd1ee08f73ebdb8cd360822c3ca5ccda566
                                                        • Instruction ID: 79ebf1855f8af88cc7e9e81b372f41bb92bbd0847ba27bcdd538b8988db5a129
                                                        • Opcode Fuzzy Hash: 02e8556c60a81a7f825e5c9a80b63cd1ee08f73ebdb8cd360822c3ca5ccda566
                                                        • Instruction Fuzzy Hash: F0318E757002109FDB15DF38D8849AE7BB6FF89301B048469E949CB356DB34ED05CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 539adb089af72bf3b6f0874ac7babe77c14b25bf494b2f2130d12fae609d62f9
                                                        • Instruction ID: ce622f242647fbaf01ba14982cab70799295e50d9357650cc3e0a9b4be8bb71f
                                                        • Opcode Fuzzy Hash: 539adb089af72bf3b6f0874ac7babe77c14b25bf494b2f2130d12fae609d62f9
                                                        • Instruction Fuzzy Hash: A6318D75700210AFDB15DF38D8849AEBBB6FF89301B40846AE909CB356DB31ED05CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93516a550ab3581bb70bdf7c823c7ebca9bf4b299ac8d00cd19d6d6a86d55c94
                                                        • Instruction ID: 341edb1501c08adc5cc06a7fc223d193b3193acf39bcc1028d09de7daa204b6c
                                                        • Opcode Fuzzy Hash: 93516a550ab3581bb70bdf7c823c7ebca9bf4b299ac8d00cd19d6d6a86d55c94
                                                        • Instruction Fuzzy Hash: 47316F35E105199FCB05DFA9D8809EEFBF6FF89314B15806AE919B7310EB31A845CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c7a36ba38db15fda5b812776ea111adaf87d7e05ba9710741d2ecdea6eba0b98
                                                        • Instruction ID: d1d8f924acc00af3fb2070c855f70e42d5bf7128abde685747edec1beff4e9da
                                                        • Opcode Fuzzy Hash: c7a36ba38db15fda5b812776ea111adaf87d7e05ba9710741d2ecdea6eba0b98
                                                        • Instruction Fuzzy Hash: 9D4105B1D012489FDF18DFAAD944ADEFBF6AF88314F10802AE415B7250DB35A945CF90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 108415c995bfbd1a0dff416bc821bfd26701d8b39f140452e0d3b5ecad6fb4fd
                                                        • Instruction ID: d79f0fdb91137a0bebe7af44f96dc3618e04169e3944a41f6dbb99926eaab854
                                                        • Opcode Fuzzy Hash: 108415c995bfbd1a0dff416bc821bfd26701d8b39f140452e0d3b5ecad6fb4fd
                                                        • Instruction Fuzzy Hash: 87316035E106199FCB05DFA9D8848DEFBF6FF89314B15806AE949B7351DB30A805CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870053005.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e80000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fcb520c5831b85ddf065f5231be751ab1afca71603a11a25b0252dd5934e6726
                                                        • Instruction ID: 36b1d62b6bd196e7ebc958c90d0240bdc137ad96a144ad1fb5fb57955ce0aa7b
                                                        • Opcode Fuzzy Hash: fcb520c5831b85ddf065f5231be751ab1afca71603a11a25b0252dd5934e6726
                                                        • Instruction Fuzzy Hash: 7D215E35B000049FDB54DF69C894EAABBB2FF88715F1180A9F9099F3A2DA31EC05CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d36f2209d608e9b05095e4a0cc2de98cbfa36ffed84b2efe909d45cee32aaef5
                                                        • Instruction ID: 93dbe2ca36695da487172b9b908d1d094f45f542eaf29d14a8ece48034000d79
                                                        • Opcode Fuzzy Hash: d36f2209d608e9b05095e4a0cc2de98cbfa36ffed84b2efe909d45cee32aaef5
                                                        • Instruction Fuzzy Hash: 293124B1D102489FDF28CFA9D994ADEBFF6AF48304F14802AE415B7250DB349945CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a13c5510a5b1630a11599b0edcefc9bd82b641ec3cbd96fe044eb628026a81b9
                                                        • Instruction ID: 4a41cebc46f9414302350f771a8fff194ccddba60626c889760e5ad73ab83a47
                                                        • Opcode Fuzzy Hash: a13c5510a5b1630a11599b0edcefc9bd82b641ec3cbd96fe044eb628026a81b9
                                                        • Instruction Fuzzy Hash: E23132B5D052489FCF14CFA9D880ADEBBFAAF48310F14802AE409A7250DB34A846CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5bd1de6b19286eb2510e0e7710c60e649b99e11bbb66131ea3a38c4674477dc3
                                                        • Instruction ID: 2b763ea39ff545d83e020c298af71252f9a54dfbb6e41bb5cba45ff4f9a01fb3
                                                        • Opcode Fuzzy Hash: 5bd1de6b19286eb2510e0e7710c60e649b99e11bbb66131ea3a38c4674477dc3
                                                        • Instruction Fuzzy Hash: 8B21057160D351CFDF2FCA7958140AA7BE3BF8120A31898AFD4C6C666BE535D885C391
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859117559.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_87d000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3203949736b1186b4dfcefa37ba58542fc9e4943732535e8cda2bb5a2a6030da
                                                        • Instruction ID: a7c6432343c608bd31bb234970503b2f6609e4f5a9b032faa295bbc13628312b
                                                        • Opcode Fuzzy Hash: 3203949736b1186b4dfcefa37ba58542fc9e4943732535e8cda2bb5a2a6030da
                                                        • Instruction Fuzzy Hash: 2821CF756047049FCB14DF14D984B26BBB5FB94318F24C969D80E8B29AC33AD807CA61
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: af9f3e60955a181d7527d082de2402b52c562eb4b2792aff951f4f1c59ada0d5
                                                        • Instruction ID: b032ea96ecf026d58383b6c1f47ea209b531e8088cd80f77b9a9009d79a881c2
                                                        • Opcode Fuzzy Hash: af9f3e60955a181d7527d082de2402b52c562eb4b2792aff951f4f1c59ada0d5
                                                        • Instruction Fuzzy Hash: A82144B1D042489FDF18CFA9C895BDEBFFAAF48310F18841AE045B7290DB349946CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8eb33b17ddc21f9702c93cbd0c29bc4a90ba2806bef7d159b2e163097676683
                                                        • Instruction ID: f8d84ea2dc10c01cf8a6fc8de842dbfd7ee626601c97a11d79169ac5918594ff
                                                        • Opcode Fuzzy Hash: a8eb33b17ddc21f9702c93cbd0c29bc4a90ba2806bef7d159b2e163097676683
                                                        • Instruction Fuzzy Hash: 1F1102302102014FC799AB38A8106AF7BE7EFC1342715182DE686C7A41DF30AA8B87D2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1859117559.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_87d000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                        • Instruction ID: 27c699737864fda83f46b4f6431ccf622e69834ca301892dc3bbe72cff962022
                                                        • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                        • Instruction Fuzzy Hash: C511BE75504780CFCB11CF14D5C4B15BB72FB44314F24C6A9D80D8B65AC33AD80ACB61
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c54cf97dbefcbe8968df39e840f7f71e606d3752614eb7f253276c0ba93005
                                                        • Instruction ID: 9ea70e406ebf01d46ecf794b2418857c6a7e25ef22adedbc142e8fd9aeeccf77
                                                        • Opcode Fuzzy Hash: d6c54cf97dbefcbe8968df39e840f7f71e606d3752614eb7f253276c0ba93005
                                                        • Instruction Fuzzy Hash: 6801D431B001199BEF10DEA9EC45ABFBBFAFBC4211B148036F615D3241DF70A90587A1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 49a2e0d4f33615b98ee61f7568f18d27405415c1991e01c98d9e9ef7d5cbb27b
                                                        • Instruction ID: 926004bf4a04c796f93cb284f28cf653e81b3f9fa09ae2933e07576514f0d9de
                                                        • Opcode Fuzzy Hash: 49a2e0d4f33615b98ee61f7568f18d27405415c1991e01c98d9e9ef7d5cbb27b
                                                        • Instruction Fuzzy Hash: 5B11A1302043148FD325AF74D41866E7BE3FFC5312F118A2DD58A87685CF74A94ACB92
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9bf7d186b56db799cbdd9a68f4b80b811e93e295be818a4154224fa221b06fd7
                                                        • Instruction ID: 541933ce8d3d53f39af3621b93c3469eb958dc1b60c13a5ec3822f69322263c6
                                                        • Opcode Fuzzy Hash: 9bf7d186b56db799cbdd9a68f4b80b811e93e295be818a4154224fa221b06fd7
                                                        • Instruction Fuzzy Hash: 32019E352106014B8688A738E45466F7AA7FFC43527455828E20BCBA40DF30BA8A87D6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac02e01e03c7c19288b006e6d28deb54fa08b06a25928e8e1cabba35424bdd20
                                                        • Instruction ID: ab5f22fe7ebb4dcf72d5150f6df1a04341682f32cf1164414e5b4a4b9bcd52fd
                                                        • Opcode Fuzzy Hash: ac02e01e03c7c19288b006e6d28deb54fa08b06a25928e8e1cabba35424bdd20
                                                        • Instruction Fuzzy Hash: 1AF062632041D83FDF554EAA5C11EFB3FEDDB8D161B094096FAD8D2242C429C91197B1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1e15649172e337f4c6c4a007ac189ede2a16d09979d76c229f331fb676c205f
                                                        • Instruction ID: 305d90abda4412e7b429d1df5438c2567a2699489391ebbc83805e478601ffce
                                                        • Opcode Fuzzy Hash: e1e15649172e337f4c6c4a007ac189ede2a16d09979d76c229f331fb676c205f
                                                        • Instruction Fuzzy Hash: 5F01D6346183489FCB02DF74D81486A7FBAEF9A300B1489EDE685CB362DA36DD11D791
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cc242b807c75f1c294b6dd2b2be00ddec0410db90b28d0939daf0f56b4000407
                                                        • Instruction ID: 965b3af50f7d7b89d0eacee1a5511b33172ba4d1a58b6d4f231bce1d5ef2c478
                                                        • Opcode Fuzzy Hash: cc242b807c75f1c294b6dd2b2be00ddec0410db90b28d0939daf0f56b4000407
                                                        • Instruction Fuzzy Hash: 6F019E702007048FD324EF69D01865E77E7FFC5316F118A29E54A87685CF74A90A8B92
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9aa1f6d931c1d37a53fab003cc2a4641cedfe98c77283d22e60f67c058923404
                                                        • Instruction ID: d9d397dffb40513cd6eaf1d97bdda299bb0ab4e5e86c7c6168a149052ebf3b9e
                                                        • Opcode Fuzzy Hash: 9aa1f6d931c1d37a53fab003cc2a4641cedfe98c77283d22e60f67c058923404
                                                        • Instruction Fuzzy Hash: 8F018635E002288BCF09CFA8E9046ECBBF5FB8C320F00A06AE404B3240C7305904CFA4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83bf036c85f0f5fa157b850708ffbfbd6435b76a8e8819aaa9985e87cf0e837e
                                                        • Instruction ID: cc329d3fe1fad4450f73c0032bf0ed4c964d1453f3f83da2d9565161afcda17f
                                                        • Opcode Fuzzy Hash: 83bf036c85f0f5fa157b850708ffbfbd6435b76a8e8819aaa9985e87cf0e837e
                                                        • Instruction Fuzzy Hash: 3301C4B4C08259EFDB04DFA4D9446EEBBF5BB09301F2464A9E895A3351E7744A81CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3a2eb1175e556c95e650f1231c79699fab087b730bd66f6a4bbd9740b273df6
                                                        • Instruction ID: 12698d84a1c1613430cd9ee1df08e04700a145d670beeb343ea1babd755f8631
                                                        • Opcode Fuzzy Hash: e3a2eb1175e556c95e650f1231c79699fab087b730bd66f6a4bbd9740b273df6
                                                        • Instruction Fuzzy Hash: 2EF0E9312093519FD3215B79B858A9A7FEAEFCB311F04046EF549C7253C975184987A3
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b70185a18f356edf81ee4176db960e6a22463a3612a07f33523aac721754c7c0
                                                        • Instruction ID: 4af8c1698bc0c49c3bdd7c65c96b144f90395dc48f744cb4c370ac17a34f7ce9
                                                        • Opcode Fuzzy Hash: b70185a18f356edf81ee4176db960e6a22463a3612a07f33523aac721754c7c0
                                                        • Instruction Fuzzy Hash: 7B01C4B4D0821DEFCB04DFA9D9446AEBBF5BB49301F10A4A99455A3351E7744A40CF90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c80e517468a5ecaecdae84d85cd8524d88e0b1399cfc9959585851a6cdc832d8
                                                        • Instruction ID: f32c0de65d6e81d1388ca16fafd2ec15f37b91df5f6644801f9e33d4d6e60291
                                                        • Opcode Fuzzy Hash: c80e517468a5ecaecdae84d85cd8524d88e0b1399cfc9959585851a6cdc832d8
                                                        • Instruction Fuzzy Hash: EE01A2318057428FD7229F25E418052BBF6FF89301710CA2ED6C6C2611DB74A589CFC5
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e4253d5033ffe56771caa4e11689858b9ac263f3dfa07a45ff1fb5bc26f96d21
                                                        • Instruction ID: 2d233be3d2d2abfc2a3c18492e5227dc73ee60f3ee161d63455b4e9b6ed98d3a
                                                        • Opcode Fuzzy Hash: e4253d5033ffe56771caa4e11689858b9ac263f3dfa07a45ff1fb5bc26f96d21
                                                        • Instruction Fuzzy Hash: 11F03C35E041289BCF08CFA9E8046DDBBF5FB8D310F00902AE415B3350D7345804CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 700ba6266b64fbded9b974d06ae9a18667629336c10c0d97f16d982b49449b14
                                                        • Instruction ID: 8d9dca7383aaca855ad06c84426dce463a29a79f8f1e03f3b293bf0fdd65d9aa
                                                        • Opcode Fuzzy Hash: 700ba6266b64fbded9b974d06ae9a18667629336c10c0d97f16d982b49449b14
                                                        • Instruction Fuzzy Hash: 84F0B46260D3A05FC716172868180AE7FA5DADA652348049AE5C7CB253DA54550A87E2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 772c672d2032d22cb7ead1a083e758eef38a41364bd9cfc073a62c97187a45c8
                                                        • Instruction ID: 0ff171d63a8e980b27ec172f7b0a95414b55691e32ad87e82202764b813ab487
                                                        • Opcode Fuzzy Hash: 772c672d2032d22cb7ead1a083e758eef38a41364bd9cfc073a62c97187a45c8
                                                        • Instruction Fuzzy Hash: 5CF012632041E83F8B558E9A5C10DFB7FEDDA8E1617094196FF98D2141C429C925ABB1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c0aa116fcbd7430e9abe8f22e1644093d299cd717e6d9e7cb6d9ebf79adc25bf
                                                        • Instruction ID: 9db05f4928e82fd8f047824ee484c9143c9668d4504539554d171f51f877e6c2
                                                        • Opcode Fuzzy Hash: c0aa116fcbd7430e9abe8f22e1644093d299cd717e6d9e7cb6d9ebf79adc25bf
                                                        • Instruction Fuzzy Hash: 37F02431700300AFDB308A28AC00FA13FE9EB41719F04C5A7F294CB1E2D6B1EC058340
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6901f7cd97d65ebabbd64c574d64609fa17bfbf2b2aa67f51c9d72bb58b21ac
                                                        • Instruction ID: f43a63c46b3296a3b26f767b30ce1c385ccb80210716c1745fa48e2f6f2afc1f
                                                        • Opcode Fuzzy Hash: f6901f7cd97d65ebabbd64c574d64609fa17bfbf2b2aa67f51c9d72bb58b21ac
                                                        • Instruction Fuzzy Hash: 56F096311057518FDB2ACE61D4007ABBBB3FF80315F04986ED4C646556D675E585CB80
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48b90ca6c58ca7ef7c2030f20eee89c6b755a041458a4e17f00067b7b6350641
                                                        • Instruction ID: c7db43b23f2ebe5bc9ac40ca6d2a3ef66d3272912b95924455cfe9904c019b5a
                                                        • Opcode Fuzzy Hash: 48b90ca6c58ca7ef7c2030f20eee89c6b755a041458a4e17f00067b7b6350641
                                                        • Instruction Fuzzy Hash: B9F0F6302057E14FC322DB28E81469A7FF6DF82305B04085EE286C7642C6A56849CBD2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b38859af0558b855fa32124250411f02e6cb50d8995217fd692adcb1159f0a8
                                                        • Instruction ID: 92c301eeb764dcaa08ca78802084fbf8d984d1d0842265c90f88f17a9d0bd73c
                                                        • Opcode Fuzzy Hash: 0b38859af0558b855fa32124250411f02e6cb50d8995217fd692adcb1159f0a8
                                                        • Instruction Fuzzy Hash: 02F0AFB0C0C169AFDB04CFA4C4440ADBFB1EB1A201F04618AE486E7362E6348A41CB00
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 59753ac22fa7f9105362bf0737d932163cee44cf62f2672718f7717d868f21e0
                                                        • Instruction ID: 12166b15c567e88af50ea1d6573c945bd82102c7a8f847b7bc14b0588e9aa80b
                                                        • Opcode Fuzzy Hash: 59753ac22fa7f9105362bf0737d932163cee44cf62f2672718f7717d868f21e0
                                                        • Instruction Fuzzy Hash: B7F0A032B141195BAF15DAB9AC449FFBBFEEB89660B084436E954C3141EB30981587A1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ab9ab8292ebcfe1c8bf1550d873ee728a0229531aeb03cd28ef1da7d2ff3002
                                                        • Instruction ID: 17bd1bdefc408083587b0b20dd3fbb16e02ee4fc83bce972e5c871fd0fc1442d
                                                        • Opcode Fuzzy Hash: 3ab9ab8292ebcfe1c8bf1550d873ee728a0229531aeb03cd28ef1da7d2ff3002
                                                        • Instruction Fuzzy Hash: 1CF082626193E51FC3175B2868280EE7F66DBC6611309049BD5C6C7283C9540A49CBEA
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e8df0f7ec99a3ce08e28ed583607821e01376a53ee13c0ae8c71a7e853ab6f2
                                                        • Instruction ID: c60be68a31174ca8b30d72358675cecb9592faa5cdb77278ec84f5bfa0b27ca1
                                                        • Opcode Fuzzy Hash: 6e8df0f7ec99a3ce08e28ed583607821e01376a53ee13c0ae8c71a7e853ab6f2
                                                        • Instruction Fuzzy Hash: 7DF08230501711CFDB29CA55D400977B3F7FF80219B04A82AD4C642916D671F485CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 33a68f93464996d4d5b235cf3b53f936d304da0f2cbb4536ad68c321a9201ac4
                                                        • Instruction ID: d37bcb8a99a75c3910ab2457066339121a917a3cb8f3b1d6601d8be992174428
                                                        • Opcode Fuzzy Hash: 33a68f93464996d4d5b235cf3b53f936d304da0f2cbb4536ad68c321a9201ac4
                                                        • Instruction Fuzzy Hash: B0E09231300210ABD3246B5AB449B9F7ADAEBC9351F40452CF60EC3243CA71580947A6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 733c206e0aa10f98bc0fa6c5ef7541b0f9fbafb271ff6e4cabd6126ad926b058
                                                        • Instruction ID: 7cf385ae9fc3d93ed2225a87863e6c8b033235323b4762acb3d1158aaba30292
                                                        • Opcode Fuzzy Hash: 733c206e0aa10f98bc0fa6c5ef7541b0f9fbafb271ff6e4cabd6126ad926b058
                                                        • Instruction Fuzzy Hash: E8F03075901B058FD725DF26E448566FBFAFB88311B00C62EEA4B83A14DB70A549CFC4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b37d090cb3aa27f7cddb883eb6c73862ac24392af470c452e5a0e73cd05e9b2e
                                                        • Instruction ID: cbd37a7a304ec3c77e89f83667863fe6b9a6141c8e10d91ecae2cef7ea94c979
                                                        • Opcode Fuzzy Hash: b37d090cb3aa27f7cddb883eb6c73862ac24392af470c452e5a0e73cd05e9b2e
                                                        • Instruction Fuzzy Hash: 84F03935D0120CEFCB01DFB4D9589CEBBB9EB48300F2042AAD945E3240EA305B45CF91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e9542437a233415f4f8778ef3ea6036da4cb4756aad2686a85819c5a7d9262a8
                                                        • Instruction ID: 448a88f2a8f9256177159d15d94770cd8513f8289c1946118a1a6538434cc03c
                                                        • Opcode Fuzzy Hash: e9542437a233415f4f8778ef3ea6036da4cb4756aad2686a85819c5a7d9262a8
                                                        • Instruction Fuzzy Hash: 3FE065312007A44FC721E72DE41879E7BEAEF85315F04092DE24AC7641DBB568458BD1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b970acb74ec00e13e2bc93a82e9b1411148c6665d24b82b370c903696f033ae3
                                                        • Instruction ID: 039b886234e309b6040dc388cb37db373523e13a4d6a9c449931e2f560f6fad1
                                                        • Opcode Fuzzy Hash: b970acb74ec00e13e2bc93a82e9b1411148c6665d24b82b370c903696f033ae3
                                                        • Instruction Fuzzy Hash: 24E09231102250CFC722BF24F8906A97BE1FB92765B019469D084D7605CA7818C6CBD2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a834e46467b85191d5a6e77e447eacd409d9d723f57930f76a0c0edbf8ced0a
                                                        • Instruction ID: aa682997a2dea5eb37e7dbb9a445fe297f85522ffcc4f22bc568d68c3becb7af
                                                        • Opcode Fuzzy Hash: 0a834e46467b85191d5a6e77e447eacd409d9d723f57930f76a0c0edbf8ced0a
                                                        • Instruction Fuzzy Hash: A7E04FB220E3804FE306D664B8085C62B94EB62361F558CAFE144CB097E639D987C65A
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9de78e8160f6ec51d17f183bffef86d290459ba6bd9da6a97502d08726e6bb1e
                                                        • Instruction ID: 183fff51ac33acc19aab0cdad6c631965dabd46f29bfc22988b0dbfa17fb151a
                                                        • Opcode Fuzzy Hash: 9de78e8160f6ec51d17f183bffef86d290459ba6bd9da6a97502d08726e6bb1e
                                                        • Instruction Fuzzy Hash: 12E0D872005711CFD716F724FD515443BA6F75BB08B025055E500AB6B9CB382E478BD2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61ad7be02e6d881aa2b0e713b0cc6ba346254a7326317cbf85cbabaad7069844
                                                        • Instruction ID: b62611396cf9cfbe982d664076c18041655d7e6500560ed075ee42752bfe4a32
                                                        • Opcode Fuzzy Hash: 61ad7be02e6d881aa2b0e713b0cc6ba346254a7326317cbf85cbabaad7069844
                                                        • Instruction Fuzzy Hash: FCE068B0001350EFD722FF20F484A943BF1EF4B304B014459D8C1D7905CAB86C81C781
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 25c9726dfbbf8ddbfe6fc8bc55d4b8d7997bcf998fbd69afd6c062cfc0c665e8
                                                        • Instruction ID: f9f1d5d8fba1095f0dd147bb2b43fc874a91e64ee6e33f97462df0dd2c0c17a7
                                                        • Opcode Fuzzy Hash: 25c9726dfbbf8ddbfe6fc8bc55d4b8d7997bcf998fbd69afd6c062cfc0c665e8
                                                        • Instruction Fuzzy Hash: DEE0DFB1A05214EFCB01CF68A841AED7BB5DB82301B2041DAE909E7251D5701F14C7D2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e858291884ee5155f2cfe91116950e3186dd924ea20e3b86318976f2a84c6ce0
                                                        • Instruction ID: cec0bd16f6f972fe6bc39ca514efb5cb82c9f3aefbf4b89cf8d472645e103a09
                                                        • Opcode Fuzzy Hash: e858291884ee5155f2cfe91116950e3186dd924ea20e3b86318976f2a84c6ce0
                                                        • Instruction Fuzzy Hash: 36D05E317107295B9A05276DB41C4AEBBABEBC9662344052AFA0BC3343CE651D4A8BD6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e4e78851c14d331d9e0cef87eb4521df20576eeda010e01ba8e7021e00bfc548
                                                        • Instruction ID: 725176debc2ce9e9065b60c8b638dea1d656cea1ce001af27083efa74873bb2b
                                                        • Opcode Fuzzy Hash: e4e78851c14d331d9e0cef87eb4521df20576eeda010e01ba8e7021e00bfc548
                                                        • Instruction Fuzzy Hash: 39E0EC39158345DFC7129F64D8508547FF5BF5A61131444DEF5C08B2B3D23198A5DB51
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40940b740623e37641c65f6055fdb917bd1ef81a62a377b1063f1bc8f8555c46
                                                        • Instruction ID: 83c96a10a9ebffc50a7f5dcd422fd3d5e03e854ce0cbc23afe757ca730200288
                                                        • Opcode Fuzzy Hash: 40940b740623e37641c65f6055fdb917bd1ef81a62a377b1063f1bc8f8555c46
                                                        • Instruction Fuzzy Hash: 10E09275D0020CEFCB40DFE4E9559DEBBB9EB48300F1082AADA09A3200EB306B55DF80
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa3dfb0eb1cad5528324ad96ccca41cd399e0b0484277dd2e1baecd7323344ea
                                                        • Instruction ID: 0bcd0f119b4ccb9df85bbe2b1128caa2b6e6c6992e5abb88ea3afa72fb80a5d5
                                                        • Opcode Fuzzy Hash: aa3dfb0eb1cad5528324ad96ccca41cd399e0b0484277dd2e1baecd7323344ea
                                                        • Instruction Fuzzy Hash: 06D017B2A00218FF8B40EFA8E94199DB7B9EB45315B1095A9E509E3201EA312F009B91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7de9fa7d524fcde3971826e5aef29c45ffb9960d91644e222e772d6fdab23769
                                                        • Instruction ID: 3e8952f40cbc73512eefff14f35c498169a1c5437fcf7c7bb4320b97aa1781e6
                                                        • Opcode Fuzzy Hash: 7de9fa7d524fcde3971826e5aef29c45ffb9960d91644e222e772d6fdab23769
                                                        • Instruction Fuzzy Hash: 4DC012327001200B0284BA6C70101AE66DBE3CC3B3786012AE70EC3348CE708C4643C6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a31631765f347f9ce19e99bc2016521471e95a34c55edac6dce0363b08667251
                                                        • Instruction ID: 0347db7afd1864a4d0f8df3b515d1112030107f59aec17a2b8dfff58a3ee5653
                                                        • Opcode Fuzzy Hash: a31631765f347f9ce19e99bc2016521471e95a34c55edac6dce0363b08667251
                                                        • Instruction Fuzzy Hash: 07B092AB90908057E70513206C51FF6171393B9458E1F098193D442342A524890B81A4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ba4421c08d8e8d404194a76021e67d421f5438ac7827c5d4b92933abab08aa53
                                                        • Instruction ID: b6d38ba2cb7de870254eae65dcce36c1c1938e2c3eddf7db73bb91b55da81e7d
                                                        • Opcode Fuzzy Hash: ba4421c08d8e8d404194a76021e67d421f5438ac7827c5d4b92933abab08aa53
                                                        • Instruction Fuzzy Hash: 5FC04C3558A3909EEB525F60C8598443F656F4272076614CAD381CA166C6714405CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-3050091760
                                                        • Opcode ID: 3696e6adad63c8f86db7fa7cbc3c7cdf86a3ae866fe7f2ca577f7662e787c067
                                                        • Instruction ID: f884e56c548e75d43f6c5ec9f5b7015e5cf87eca158eb75cb9b89a749a992a14
                                                        • Opcode Fuzzy Hash: 3696e6adad63c8f86db7fa7cbc3c7cdf86a3ae866fe7f2ca577f7662e787c067
                                                        • Instruction Fuzzy Hash: C8D1B131310B01ABC206F7A99C52BADAAD3FBC6305B828838E6084F795DF753D195797
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-3050091760
                                                        • Opcode ID: 35c30f4c236b4cdbae0d8880c69c92c145c979205122218dd16a588f170e359e
                                                        • Instruction ID: 4d374e7f45604c1a3b5e7e916f9b8abc489a8481e429e215ab7fbed7df878344
                                                        • Opcode Fuzzy Hash: 35c30f4c236b4cdbae0d8880c69c92c145c979205122218dd16a588f170e359e
                                                        • Instruction Fuzzy Hash: 46D1C231310B01ABC206F7A99C52BADAAD3FBCA305B818838E6084F795DF753D195797
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-1192847946
                                                        • Opcode ID: 246dcccdb52cb42c9049dfe8b180bcd70b13899aca3549bf0dc177ea5202fa3e
                                                        • Instruction ID: 222e27f3450f8aa1fd651da4e396c1f3d000a115ff9725da7c58dd3b5b3ccd6a
                                                        • Opcode Fuzzy Hash: 246dcccdb52cb42c9049dfe8b180bcd70b13899aca3549bf0dc177ea5202fa3e
                                                        • Instruction Fuzzy Hash: FC41D531310700ABC302EAA9988176D7FD3FBC6301B818838E6084F786CF7A2D594797
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-1192847946
                                                        • Opcode ID: 5a369649e40df57182a0d7be69241593d53ba92fe1c683cfb66e309a4facfe3e
                                                        • Instruction ID: 0fc590ed14d7def45ba9d0ea3c27e2bd3f96e4c0aac5345fd38c0600d3985866
                                                        • Opcode Fuzzy Hash: 5a369649e40df57182a0d7be69241593d53ba92fe1c683cfb66e309a4facfe3e
                                                        • Instruction Fuzzy Hash: B341C6313107006BD206F6A9988576D6ED3FBC6305B818838E6084F786CF7A3D194397
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-2670367415
                                                        • Opcode ID: 72e43d41b43cbea0b3e26d0392f7bf29cb7b85c76194e0e5619d37813bdf9288
                                                        • Instruction ID: 48bf5d8497f325046e90e79d000c1df897ec803a262dc1afcb329ac7e0e2adce
                                                        • Opcode Fuzzy Hash: 72e43d41b43cbea0b3e26d0392f7bf29cb7b85c76194e0e5619d37813bdf9288
                                                        • Instruction Fuzzy Hash: 463194713007116BC702EAA99C91B6DBED3FBC6305B814838E6088F786DF752D598797
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-2670367415
                                                        • Opcode ID: c051e90c1db5470720957a28f9de00a8a9fa32a27e28d310a3df9b48c0bba582
                                                        • Instruction ID: 11ce1302a3f37f87c550ba45fddf87e11ad7f149d1b87225279d950fef75835c
                                                        • Opcode Fuzzy Hash: c051e90c1db5470720957a28f9de00a8a9fa32a27e28d310a3df9b48c0bba582
                                                        • Instruction Fuzzy Hash: 9621B1313107116BC606EAA99881B6DAED3FBC6705B818838E6084FB85CF753D594397
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-1309597825
                                                        • Opcode ID: de76df8ac7ee84f7fbfaa5184513fcef09c81cd5aa83fa4352eec3a568e77f4b
                                                        • Instruction ID: 6416b12243a8a834702dee11e351a5180f3c0af044d7ec2e63fe2ad8f3e6f613
                                                        • Opcode Fuzzy Hash: de76df8ac7ee84f7fbfaa5184513fcef09c81cd5aa83fa4352eec3a568e77f4b
                                                        • Instruction Fuzzy Hash: 8331F6313007526FDB01ABA8AC55AAD7FA3FB86305741482CE609CF695CE741E8AC783
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-1309597825
                                                        • Opcode ID: d7bf45a8d266f20c0c6b84a6cba661c19d06909c6ca85bbd70b9ef7eed8a10ab
                                                        • Instruction ID: 1b031357f1b1c180a4b86b5d5d56b6c9e0ec2a99395ed216f388c524dcb8c3db
                                                        • Opcode Fuzzy Hash: d7bf45a8d266f20c0c6b84a6cba661c19d06909c6ca85bbd70b9ef7eed8a10ab
                                                        • Instruction Fuzzy Hash: 1021D8313006116BDB05BBA9EC55A6D7BA3FB86301741483CF609CF695CE741E8A8783
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (_^q$(_^q$(_^q$(_^q$(_^q$(_^q
                                                        • API String ID: 0-2896069617
                                                        • Opcode ID: 6eccf3d60bbf5ba02b88af53069fb5055cb9783a292e4093784c9ba2efba8f1a
                                                        • Instruction ID: 8f2619f8067ca12f160a51fdf40570539c3f77b13f2e26f29d570cd43e3c0378
                                                        • Opcode Fuzzy Hash: 6eccf3d60bbf5ba02b88af53069fb5055cb9783a292e4093784c9ba2efba8f1a
                                                        • Instruction Fuzzy Hash: D4D1AD39B042449FDB09DF78C4145AE7BB6FF85300F2485AAEA46DB381DA359E06CBD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-23703227
                                                        • Opcode ID: c80bf16566d93703220a01d2545e4ac853e31f6718dc184d20adbccb55cee8ae
                                                        • Instruction ID: b27896c1826cff438a5d5849032da6567e0811f15a00109f855ad0fa1015fc67
                                                        • Opcode Fuzzy Hash: c80bf16566d93703220a01d2545e4ac853e31f6718dc184d20adbccb55cee8ae
                                                        • Instruction Fuzzy Hash: C621C4313007406FC702EAA99891B5DBFD3FB86704B818938E6088F785CF752D5983A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1870081593.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5e90000_aqYlLZ8hwJ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DTj$DTj$DTj$DTj$DTj$DTj
                                                        • API String ID: 0-23703227
                                                        • Opcode ID: 7d5b2812ee343278a00a20bc609f1107cf62cc160fa6ed10cfbc141acc5dbec0
                                                        • Instruction ID: 06b9c2aeea2ce8d0ccb7472583f3c9f6f3d5c976c978519c305df2f629e66483
                                                        • Opcode Fuzzy Hash: 7d5b2812ee343278a00a20bc609f1107cf62cc160fa6ed10cfbc141acc5dbec0
                                                        • Instruction Fuzzy Hash: DD11D2313007106BC602EAA99881B6DAED3FBC6704B818938E6084F785CF766E694397