Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OPyF68i97j.exe

Overview

General Information

Sample name:OPyF68i97j.exe
renamed because original name is a hash value
Original sample name:84f6d402fc4b76b949a893344b73ae1b4abb21dc9989745728cd18c92991e0ae.exe
Analysis ID:1524406
MD5:048fe750e586bce2fe5c5f0c77dd208f
SHA1:cc82bb9ec77116cdea64b52aed1417ff2389b925
SHA256:84f6d402fc4b76b949a893344b73ae1b4abb21dc9989745728cd18c92991e0ae
Tags:exewww-uvfr4ep-comuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Schtasks Creation Or Modification With SYSTEM Privileges
Uses schtasks.exe or at.exe to add and modify task schedules
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • OPyF68i97j.exe (PID: 6472 cmdline: "C:\Users\user\Desktop\OPyF68i97j.exe" MD5: 048FE750E586BCE2FE5C5F0C77DD208F)
    • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7140 cmdline: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f MD5: 48C2FE20575769DE916F48EF0676A965)
    • schtasks.exe (PID: 940 cmdline: schtasks /run /tn "TabletPCInputServices" MD5: 48C2FE20575769DE916F48EF0676A965)
  • OPyF68i97j.exe (PID: 432 cmdline: "C:\Users\user\Desktop\OPyF68i97j.exe" -service MD5: 048FE750E586BCE2FE5C5F0C77DD208F)
    • brcc.exe (PID: 6516 cmdline: "C:\Windows\Logs\logs\brcc.exe" askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG MD5: 9D2AE725D41B1F9BF384D2F573DF9443)
      • conhost.exe (PID: 3556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • OPyF68i97j.exe (PID: 6544 cmdline: C:\Users\user\Desktop\OPyF68i97j.exe MD5: 048FE750E586BCE2FE5C5F0C77DD208F)
    • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4760 cmdline: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f MD5: 48C2FE20575769DE916F48EF0676A965)
    • schtasks.exe (PID: 3364 cmdline: schtasks /run /tn "TabletPCInputServices" MD5: 48C2FE20575769DE916F48EF0676A965)
  • OPyF68i97j.exe (PID: 7116 cmdline: C:\Users\user\Desktop\OPyF68i97j.exe MD5: 048FE750E586BCE2FE5C5F0C77DD208F)
    • conhost.exe (PID: 6004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 652 cmdline: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f MD5: 48C2FE20575769DE916F48EF0676A965)
    • schtasks.exe (PID: 7108 cmdline: schtasks /run /tn "TabletPCInputServices" MD5: 48C2FE20575769DE916F48EF0676A965)
  • svchost.exe (PID: 1128 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f, CommandLine: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\OPyF68i97j.exe", ParentImage: C:\Users\user\Desktop\OPyF68i97j.exe, ParentProcessId: 6472, ParentProcessName: OPyF68i97j.exe, ProcessCommandLine: schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f, ProcessId: 7140, ProcessName: schtasks.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 114.55.25.226, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\Logs\logs\brcc.exe, Initiated: true, ProcessId: 6516, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49708
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 1128, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: OPyF68i97j.exeAvira: detected
Source: C:\Windows\Logs\logs\rw32core.dllAvira: detection malicious, Label: TR/Agent.zottn
Source: C:\Windows\Logs\logs\Secur32.dllReversingLabs: Detection: 78%
Source: C:\Windows\Logs\logs\rw32core.dllReversingLabs: Detection: 87%
Source: OPyF68i97j.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Windows\Logs\logs\Secur32.dllJoe Sandbox ML: detected
Source: C:\Windows\Logs\logs\rw32core.dllJoe Sandbox ML: detected
Source: OPyF68i97j.exeJoe Sandbox ML: detected
Source: OPyF68i97j.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: OPyF68i97j.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: consent.pdb source: OPyF68i97j.exe, 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmp, consent.exe.4.dr
Source: Binary string: consent.pdbW3 source: OPyF68i97j.exe, 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmp, consent.exe.4.dr
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00492AF0 FindFirstFileW,FindClose,0_2_00492AF0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004929F0 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,FindClose,0_2_004929F0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_00492AF0 FindFirstFileW,FindClose,4_2_00492AF0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004929F0 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,FindClose,4_2_004929F0
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_004113F4 FindFirstFileA,FindNextFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,14_2_004113F4
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040B703 FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindClose,14_2_0040B703
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01225BB6 FindFirstFileExW,14_2_01225BB6
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013392EB FindFirstFileExW,14_2_013392EB
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01322760 SHGetValueA,CoCreateGuid,wsprintfA,SHSetValueA,GetComputerNameA,GetUserNameA,lstrlenA,GlobalMemoryStatusEx,__aulldiv,GetLogicalDriveStringsA,GetDriveTypeA,GetDiskFreeSpaceExA,RegOpenKeyExA,RegQueryValueExA,GetNativeSystemInfo,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,14_2_01322760

Networking

barindex
Source: global trafficTCP traffic: 114.55.25.226 ports 8443,8080,1,2,443,80,53,21
Source: global trafficTCP traffic: 192.168.2.5:49708 -> 114.55.25.226:8080
Source: global trafficTCP traffic: 192.168.2.5:49705 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49749 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49736 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49723 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49767 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49755 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49743 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49717 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49730 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49773 -> 114.55.25.226:53
Source: global trafficTCP traffic: 192.168.2.5:49761 -> 114.55.25.226:53
Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132AEF0 Sleep,recv,recv,14_2_0132AEF0
Source: global trafficDNS traffic detected: DNS query: www.uvfr4ep.com
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drString found in binary or memory: http://ocsp.thawte.com0
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01323700 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,WTSEnumerateSessionsA,WTSQuerySessionInformationA,lstrcpyA,WTSFreeMemory,lstrcmpA,WTSFreeMemory,GetCurrentProcess,WTSQueryUserToken,DuplicateTokenEx,SetTokenInformation,CreateProcessAsUserA,CreateThread,14_2_01323700
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\Jump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\brcc.exeJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\rw32core.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\consent.exeJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\Secur32.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004A321C0_2_004A321C
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004975630_2_00497563
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004A4B220_2_004A4B22
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004A333C0_2_004A333C
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_0049FD300_2_0049FD30
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004A01C80_2_004A01C8
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004977950_2_00497795
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004A321C4_2_004A321C
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004975634_2_00497563
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004A4B224_2_004A4B22
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004A333C4_2_004A333C
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_0049FD304_2_0049FD30
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004A01C84_2_004A01C8
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004977954_2_00497795
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0041300014_2_00413000
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0122167014_2_01221670
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0122100014_2_01221000
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0122BB8114_2_0122BB81
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132ACB014_2_0132ACB0
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013329E514_2_013329E5
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132A88014_2_0132A880
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0133BB2014_2_0133BB20
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013403FD14_2_013403FD
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132624014_2_01326240
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0133ED9C14_2_0133ED9C
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0133EC7C14_2_0133EC7C
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013327B314_2_013327B3
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0133BFB814_2_0133BFB8
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0134164014_2_01341640
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01325ED014_2_01325ED0
Source: C:\Windows\Logs\logs\brcc.exeCode function: String function: 0132EA20 appears 37 times
Source: C:\Windows\Logs\logs\brcc.exeCode function: String function: 0041A7D4 appears 70 times
Source: OPyF68i97j.exe, 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameconsent.exej% vs OPyF68i97j.exe
Source: OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBRCC32.EXE. vs OPyF68i97j.exe
Source: OPyF68i97j.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal100.troj.evad.winEXE@23/4@2/1
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01322760 SHGetValueA,CoCreateGuid,wsprintfA,SHSetValueA,GetComputerNameA,GetUserNameA,lstrlenA,GlobalMemoryStatusEx,__aulldiv,GetLogicalDriveStringsA,GetDriveTypeA,GetDiskFreeSpaceExA,RegOpenKeyExA,RegQueryValueExA,GetNativeSystemInfo,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,14_2_01322760
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: wsprintfW,OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CreateServiceW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,RegOpenKeyExW,lstrcpyW,lstrlenW,lstrlenW,lstrcpyW,RegSetValueExW,RegSetValueExW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,RegSetValueExW,RegCloseKey,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_004921C0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: wsprintfW,OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CreateServiceW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,RegOpenKeyExW,lstrcpyW,lstrlenW,lstrlenW,lstrcpyW,RegSetValueExW,RegSetValueExW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,RegSetValueExW,RegCloseKey,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_004921C0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491DA0 CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,TerminateProcess,Process32Next,CloseHandle,CloseHandle,0_2_00491DA0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491B20 GetModuleFileNameW,ExitProcess,OpenSCManagerW,OpenServiceW,StartServiceW,CloseServiceHandle,CloseServiceHandle,ExitProcess,0_2_00491B20
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00492B40 StartServiceCtrlDispatcherW,0_2_00492B40
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_00492B40 StartServiceCtrlDispatcherW,4_2_00492B40
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3556:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_03
Source: C:\Users\user\Desktop\OPyF68i97j.exeMutant created: \Sessions\1\BaseNamedObjects\userResideVirtual1
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7160:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6004:120:WilError_03
Source: C:\Windows\Logs\logs\brcc.exeMutant created: \BaseNamedObjects\askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
Source: C:\Users\user\Desktop\OPyF68i97j.exeMutant created: \BaseNamedObjects\SYSTEMResideVirtual0
Source: OPyF68i97j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\OPyF68i97j.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: OPyF68i97j.exeReversingLabs: Detection: 60%
Source: unknownProcess created: C:\Users\user\Desktop\OPyF68i97j.exe "C:\Users\user\Desktop\OPyF68i97j.exe"
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"
Source: unknownProcess created: C:\Users\user\Desktop\OPyF68i97j.exe "C:\Users\user\Desktop\OPyF68i97j.exe" -service
Source: unknownProcess created: C:\Users\user\Desktop\OPyF68i97j.exe C:\Users\user\Desktop\OPyF68i97j.exe
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"
Source: unknownProcess created: C:\Users\user\Desktop\OPyF68i97j.exe C:\Users\user\Desktop\OPyF68i97j.exe
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\Logs\logs\brcc.exe "C:\Windows\Logs\logs\brcc.exe" askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
Source: C:\Windows\Logs\logs\brcc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /fJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"Jump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\Logs\logs\brcc.exe "C:\Windows\Logs\logs\brcc.exe" askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWGJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /fJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"Jump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /fJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /run /tn "TabletPCInputServices"Jump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: rw32core.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\Logs\logs\brcc.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: OPyF68i97j.exeStatic file information: File size 4323328 > 1048576
Source: OPyF68i97j.exeStatic PE information: Raw size of .Net is bigger than: 0x100000 < 0x200000
Source: OPyF68i97j.exeStatic PE information: Raw size of .Fun is bigger than: 0x100000 < 0x200000
Source: OPyF68i97j.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: OPyF68i97j.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: consent.pdb source: OPyF68i97j.exe, 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmp, consent.exe.4.dr
Source: Binary string: consent.pdbW3 source: OPyF68i97j.exe, 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmp, consent.exe.4.dr
Source: brcc.exe.4.drStatic PE information: 0x9CE02625 [Tue May 27 05:12:05 2053 UTC]
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040A155 LoadLibraryA,GetProcAddress,14_2_0040A155
Source: OPyF68i97j.exeStatic PE information: section name: .Config
Source: OPyF68i97j.exeStatic PE information: section name: .Net
Source: OPyF68i97j.exeStatic PE information: section name: .Fun
Source: rw32core.dll.4.drStatic PE information: section name: .pe
Source: consent.exe.4.drStatic PE information: section name: consent
Source: Secur32.dll.4.drStatic PE information: section name: .pe
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_00421BC5 push eax; ret 14_2_00421C01
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_00422D95 push ebp; retf 14_2_00422DA4
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040E6CA push eax; ret 14_2_0040E7B3
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012226C6 push ecx; ret 14_2_012226D9
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132EA66 push ecx; ret 14_2_0132EA79

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\OPyF68i97j.exeExecutable created and started: C:\Windows\Logs\logs\brcc.exeJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\rw32core.dllJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\Secur32.dllJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\brcc.exeJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\consent.exeJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\rw32core.dllJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\Secur32.dllJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\brcc.exeJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeFile created: C:\Windows\Logs\logs\consent.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
Source: C:\Users\user\Desktop\OPyF68i97j.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DISMsrvJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491B20 GetModuleFileNameW,ExitProcess,OpenSCManagerW,OpenServiceW,StartServiceW,CloseServiceHandle,CloseServiceHandle,ExitProcess,0_2_00491B20

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\OPyF68i97j.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_4-6377
Source: C:\Windows\Logs\logs\brcc.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_14-36018
Source: C:\Windows\Logs\logs\brcc.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_14-36744
Source: C:\Users\user\Desktop\OPyF68i97j.exeDropped PE file which has not been started: C:\Windows\Logs\logs\Secur32.dllJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exeDropped PE file which has not been started: C:\Windows\Logs\logs\consent.exeJump to dropped file
Source: C:\Users\user\Desktop\OPyF68i97j.exe TID: 1488Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exe TID: 1488Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\Logs\logs\brcc.exe TID: 1476Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\Logs\logs\brcc.exe TID: 1220Thread sleep count: 78 > 30Jump to behavior
Source: C:\Windows\Logs\logs\brcc.exe TID: 1220Thread sleep time: -78000s >= -30000sJump to behavior
Source: C:\Windows\Logs\logs\brcc.exe TID: 1220Thread sleep count: 63 > 30Jump to behavior
Source: C:\Windows\Logs\logs\brcc.exe TID: 1476Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\OPyF68i97j.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\Logs\logs\brcc.exeLast function: Thread delayed
Source: C:\Windows\Logs\logs\brcc.exeLast function: Thread delayed
Source: C:\Windows\Logs\logs\brcc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00492AF0 FindFirstFileW,FindClose,0_2_00492AF0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004929F0 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,FindClose,0_2_004929F0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_00492AF0 FindFirstFileW,FindClose,4_2_00492AF0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004929F0 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,FindClose,4_2_004929F0
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_004113F4 FindFirstFileA,FindNextFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,14_2_004113F4
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040B703 FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindClose,14_2_0040B703
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01225BB6 FindFirstFileExW,14_2_01225BB6
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013392EB FindFirstFileExW,14_2_013392EB
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01322760 SHGetValueA,CoCreateGuid,wsprintfA,SHSetValueA,GetComputerNameA,GetUserNameA,lstrlenA,GlobalMemoryStatusEx,__aulldiv,GetLogicalDriveStringsA,GetDriveTypeA,GetDiskFreeSpaceExA,RegOpenKeyExA,RegQueryValueExA,GetNativeSystemInfo,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,14_2_01322760
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_00405918 GetSystemInfo,14_2_00405918
Source: C:\Users\user\Desktop\OPyF68i97j.exeThread delayed: delay time: 60000Jump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeThread delayed: delay time: 60000Jump to behavior
Source: C:\Windows\Logs\logs\brcc.exeThread delayed: delay time: 60000Jump to behavior
Source: C:\Windows\Logs\logs\brcc.exeThread delayed: delay time: 60000Jump to behavior
Source: brcc.exe, 0000000E.00000002.3890021723.00000000004FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_0-6788
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_0-6239
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_0-6179
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_0-6171
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_4-6179
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_4-6310
Source: C:\Users\user\Desktop\OPyF68i97j.exeAPI call chain: ExitProcess graph end nodegraph_4-6184
Source: C:\Windows\Logs\logs\brcc.exeAPI call chain: ExitProcess graph end nodegraph_14-36847
Source: C:\Windows\Logs\logs\brcc.exeAPI call chain: ExitProcess graph end nodegraph_14-36024
Source: C:\Windows\Logs\logs\brcc.exeAPI call chain: ExitProcess graph end nodegraph_14-35839
Source: C:\Windows\Logs\logs\brcc.exeAPI call chain: ExitProcess graph end nodegraph_14-35842
Source: C:\Windows\Logs\logs\brcc.exeAPI call chain: ExitProcess graph end nodegraph_14-36848
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004983A8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004983A8
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040A155 LoadLibraryA,GetProcAddress,14_2_0040A155
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_0049D843 mov eax, dword ptr fs:[00000030h]0_2_0049D843
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_0049901C mov eax, dword ptr fs:[00000030h]0_2_0049901C
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_0049D843 mov eax, dword ptr fs:[00000030h]4_2_0049D843
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_0049901C mov eax, dword ptr fs:[00000030h]4_2_0049901C
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_00406F0A mov eax, dword ptr fs:[00000030h]14_2_00406F0A
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0122431D mov eax, dword ptr fs:[00000030h]14_2_0122431D
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012254CD mov eax, dword ptr fs:[00000030h]14_2_012254CD
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_013377BD mov eax, dword ptr fs:[00000030h]14_2_013377BD
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01337801 mov eax, dword ptr fs:[00000030h]14_2_01337801
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01333CD4 mov eax, dword ptr fs:[00000030h]14_2_01333CD4
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012270E0 GetProcessHeap,14_2_012270E0
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00492DDF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00492DDF
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004983A8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004983A8
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_00492DDF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00492DDF
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 4_2_004983A8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004983A8
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01221CBF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_01221CBF
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012224F8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_012224F8
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012254FE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_012254FE
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132E972 SetUnhandledExceptionFilter,14_2_0132E972
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132E810 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0132E810
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0132DF42 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_0132DF42
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_01331654 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_01331654
Source: C:\Users\user\Desktop\OPyF68i97j.exeProcess created: C:\Windows\Logs\logs\brcc.exe "C:\Windows\Logs\logs\brcc.exe" askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWGJump to behavior
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491930 ImpersonateSelf,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,OpenProcessToken,GetCurrentProcess,OpenProcessToken,AllocateAndInitializeSid,LocalAlloc,LocalAlloc,InitializeSecurityDescriptor,GetLengthSid,LocalAlloc,InitializeAcl,AddAccessAllowedAce,SetSecurityDescriptorDacl,SetSecurityDescriptorGroup,SetSecurityDescriptorOwner,IsValidSecurityDescriptor,AccessCheck,RevertToSelf,LocalFree,LocalFree,FreeSid,0_2_00491930
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491930 ImpersonateSelf,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,OpenProcessToken,GetCurrentProcess,OpenProcessToken,AllocateAndInitializeSid,LocalAlloc,LocalAlloc,InitializeSecurityDescriptor,GetLengthSid,LocalAlloc,InitializeAcl,AddAccessAllowedAce,SetSecurityDescriptorDacl,SetSecurityDescriptorGroup,SetSecurityDescriptorOwner,IsValidSecurityDescriptor,AccessCheck,RevertToSelf,LocalFree,LocalFree,FreeSid,0_2_00491930
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_012226DC cpuid 14_2_012226DC
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_004935E1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004935E1
Source: C:\Users\user\Desktop\OPyF68i97j.exeCode function: 0_2_00491E90 GetCurrentProcessId,ProcessIdToSessionId,GetUserNameA,lstrcatA,lstrcpyA,ReleaseMutex,CloseHandle,CreateMutexA,GetModuleFileNameA,WinExec,WinExec,WinExec,GetCurrentProcessId,ExitProcess,0_2_00491E90
Source: C:\Windows\Logs\logs\brcc.exeCode function: 14_2_0040596F GetVersion,14_2_0040596F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts11
Native API
1
Valid Accounts
1
Valid Accounts
2
Obfuscated Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media12
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Scheduled Task/Job
13
Windows Service
1
Access Token Manipulation
1
Timestomp
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts2
Service Execution
1
Scheduled Task/Job
13
Windows Service
1
DLL Side-Loading
NTDS26
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Process Injection
12
Masquerading
LSA Secrets121
Security Software Discovery
SSHKeylogging2
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
1
Valid Accounts
Cached Domain Credentials11
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Access Token Manipulation
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
Virtualization/Sandbox Evasion
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524406 Sample: OPyF68i97j.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 100 48 www.uvfr4ep.com 2->48 50 edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->50 52 default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->52 56 Antivirus detection for dropped file 2->56 58 Antivirus / Scanner detection for submitted sample 2->58 60 Multi AV Scanner detection for dropped file 2->60 62 6 other signatures 2->62 8 OPyF68i97j.exe 5 2->8         started        12 OPyF68i97j.exe 1 1 2->12         started        14 OPyF68i97j.exe 1 2->14         started        16 2 other processes 2->16 signatures3 process4 file5 40 C:\Windows\Logs\logs\rw32core.dll, PE32 8->40 dropped 42 C:\Windows\Logs\logs\consent.exe, PE32 8->42 dropped 44 C:\Windows\Logs\logs\brcc.exe, PE32 8->44 dropped 46 C:\Windows\Logs\logs\Secur32.dll, PE32 8->46 dropped 66 Drops executables to the windows directory (C:\Windows) and starts them 8->66 18 brcc.exe 1 1 8->18         started        68 Found evasive API chain (may stop execution after checking mutex) 12->68 70 Uses schtasks.exe or at.exe to add and modify task schedules 12->70 22 conhost.exe 12->22         started        36 2 other processes 12->36 24 conhost.exe 14->24         started        26 schtasks.exe 1 14->26         started        28 schtasks.exe 1 14->28         started        30 conhost.exe 16->30         started        32 schtasks.exe 1 16->32         started        34 schtasks.exe 1 16->34         started        signatures6 process7 dnsIp8 54 www.uvfr4ep.com 114.55.25.226, 21, 443, 49704 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 18->54 64 Found evasive API chain (may stop execution after checking mutex) 18->64 38 conhost.exe 18->38         started        signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
OPyF68i97j.exe61%ReversingLabsWin32.Trojan.Malgent
OPyF68i97j.exe100%AviraTR/Agent.ltlye
OPyF68i97j.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Windows\Logs\logs\rw32core.dll100%AviraTR/Agent.zottn
C:\Windows\Logs\logs\Secur32.dll100%Joe Sandbox ML
C:\Windows\Logs\logs\rw32core.dll100%Joe Sandbox ML
C:\Windows\Logs\logs\Secur32.dll78%ReversingLabsWin32.Trojan.Malgent
C:\Windows\Logs\logs\brcc.exe4%ReversingLabs
C:\Windows\Logs\logs\consent.exe0%ReversingLabs
C:\Windows\Logs\logs\rw32core.dll88%ReversingLabsWin32.Trojan.CrypterX
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.27
truefalse
    unknown
    www.uvfr4ep.com
    114.55.25.226
    truetrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.thawte.com/ThawteTimestampingCA.crl0OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drfalse
      • URL Reputation: safe
      unknown
      http://ocsp.thawte.com0OPyF68i97j.exe, 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmp, brcc.exe.4.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      114.55.25.226
      www.uvfr4ep.comChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1524406
      Start date and time:2024-10-02 19:10:00 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 35s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:19
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:OPyF68i97j.exe
      renamed because original name is a hash value
      Original Sample Name:84f6d402fc4b76b949a893344b73ae1b4abb21dc9989745728cd18c92991e0ae.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@23/4@2/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 90%
      • Number of executed functions: 56
      • Number of non-executed functions: 156
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.85.23.86, 88.221.110.121, 88.221.110.106, 40.69.42.241, 52.165.164.15
      • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: OPyF68i97j.exe
      TimeTypeDescription
      19:10:50Task SchedulerRun new task: TabletPCInputServices path: C:\Users\user\Desktop\OPyF68i97j.exe
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      114.55.25.226sample.exeGet hashmaliciousGh0stCringe, GhostRat, RunningRATBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comhttps://trello.com/c/2T5XVROVGet hashmaliciousHTMLPhisherBrowse
        • 217.20.57.39
        https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-LwGet hashmaliciousHTMLPhisherBrowse
        • 217.20.57.23
        Translink_rishi.vasandani_Advice81108.pdfGet hashmaliciousUnknownBrowse
        • 217.20.57.37
        http://innerglowjourney.comGet hashmaliciousUnknownBrowse
        • 217.20.57.27
        bWrRSlOThY.exeGet hashmaliciousAsyncRAT, NeshtaBrowse
        • 217.20.57.34
        https://swissquotech.com/swissquote-2024.zipGet hashmaliciousPhisherBrowse
        • 217.20.57.24
        VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
        • 217.20.57.42
        tr5jscSEwo.exeGet hashmaliciousScreenConnect ToolBrowse
        • 217.20.57.18
        sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
        • 84.201.210.35
        https://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
        • 217.20.57.18
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdyakov.m68k.elfGet hashmaliciousMiraiBrowse
        • 8.173.5.16
        yakov.mpsl.elfGet hashmaliciousMiraiBrowse
        • 8.153.219.75
        novo.mpsl.elfGet hashmaliciousMirai, MoobotBrowse
        • 140.205.153.117
        novo.x86.elfGet hashmaliciousMirai, MoobotBrowse
        • 8.145.200.55
        yakov.sh4.elfGet hashmaliciousMiraiBrowse
        • 47.96.183.136
        yakov.spc.elfGet hashmaliciousMiraiBrowse
        • 8.190.175.88
        setup.ic19.exeGet hashmaliciousGhostRat, NitolBrowse
        • 118.178.60.61
        7kSftA4Eoh.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 8.130.42.227
        mtgjyX9gHF.exeGet hashmaliciousQuasarBrowse
        • 39.102.36.209
        No context
        No context
        Process:C:\Users\user\Desktop\OPyF68i97j.exe
        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):448000
        Entropy (8bit):5.888794800317783
        Encrypted:false
        SSDEEP:6144:frkQvCcpytrBOvwGjKgeR0hJ4mze9qAQ6uz9GXTrapA7xEPDimGzMHy:zQcctibjxeORmu8XTS8xlmBy
        MD5:B25511C04B4A3345EF7F228C73924714
        SHA1:46A4CCAE40E66C0527BFB848D2A1FA5A556E9FC0
        SHA-256:66B7983831CBB952CEEB1FFFF608880F1805F1DF0B062CEF4C17B258B7F478CE
        SHA-512:097E10AB41DBD7D45A1E2599A1F551BDD1553249F8B14E3B9CA95A8CBCC8A70227DAEB387AD1F7ECBA46445205E39EF96BE5CF75817BF4583A64A031776883BB
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 78%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........=...\...\...\...7...\...7..@\...7...\...4...\...4...\...4...\...7...\...\...\..i5...\..i5...\..i5...\..Rich.\..................PE..L...)~b`...........!.........&............................................................@..........................!..T....!..(.......................................8...............................@............................................text.............................. ..`.rdata..@X.......Z..................@..@.data....<...0...2..................@....pe.....@~...p.......H..............@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\OPyF68i97j.exe
        File Type:PE32 executable (console) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):175528
        Entropy (8bit):6.164528854224287
        Encrypted:false
        SSDEEP:3072:le+COG4lWVKQuCOZx4UdmWDXpjU1DAC8d+RgE/+n2cRkddUTO6gU7xDgtdOk6amP:ljlQKQuCO3dLDXpjUXp/+n2cRYUCy
        MD5:9D2AE725D41B1F9BF384D2F573DF9443
        SHA1:B9FA17D3B0A8184B8BD1BCED16F953B46AF97CBE
        SHA-256:2AACF66D78E284729C3CA0DA6C260FA3A95FF61AAE6527D6DC4500AD7DAA1E63
        SHA-512:BA162A3797DD87BC704F9EFFC04C1396E3625AFBCBC9186207DD253C005F8771C999728834AD0CAC5B0A70CF51DDDFB1DA8A8A0273CE975B0F19269DA17813C0
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 4%
        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...%&......................q.....................@.......................... .......Y........... ......................W................F..........0...x...........................................................................................CODE................................`...DATA.............`..................@....tls.........p....... ..............@....rdata..............."..............@..P.idata...............$..............@....edata..............................@..@.reloc... ...........2..............@..P.rsrc...0F......0F...N..............@....debug....... ..qp..................@..P........................................................................................................................................
        Process:C:\Users\user\Desktop\OPyF68i97j.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):101968
        Entropy (8bit):5.814112583624504
        Encrypted:false
        SSDEEP:768:YEau+nTNe8/BQK9A/obyD8qcJzuGqy1Z832H86OdFero6ZU9QZU97wYgZHix3udL:YbEhKq/StqyzuGP8mHVqFqzkwAqt
        MD5:FD97EB722401938AD9C3E4BFAB1519A4
        SHA1:8616FEBC20CE5905F38690302156428EF9C2CDB8
        SHA-256:33BFAA84E7543C9504B16113E0E0B16FAF3F117FC92FE4017F682E8E7D13B4FD
        SHA-512:24D458FB627C38AAE70A08AA0DF1E55E1150A84CA02D616215035B72145EE8F0F48FDA843AF7B4E02A37904EFDCA001FD274E72EF1B37BB7BAD957A72284596E
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../v.]N..]N..]N..T6.._N..T6..|N..]N...N..T6..VN..T6..KN..T6..\N..T6..\N..Rich]N..........................PE..L...n.[J............................Y=........................................................... .............................T....................r..P.......P... ...8...........................pj..@.......H....................................text............................... ..`.data...p...........................@...consent.b...........................@....rsrc...............................@..@.reloc..P............h..............@..B~.[J......[J......[J..../.[J....o.[J......[J......[J......[J......[J....C.[J....B.[J....1.[J....N.[J....9.[J....k.[J(...v.[J9...........ADVAPI32.dll.KERNEL32.dll.GDI32.dll.USER32.dll.msvcrt.dll.ntdll.dll.ole32.dll.MSIMG32.dll.WMsgAPI.dll.WTSAPI32.dll.WINMM.dll.USERENV.dll.WINSTA.dll.CRYPT32.dll.MsCtfMonitor.DLL.COMCTL3
        Process:C:\Users\user\Desktop\OPyF68i97j.exe
        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):988160
        Entropy (8bit):2.8230010982146707
        Encrypted:false
        SSDEEP:6144:7sxLJfLy/ZqLltXaB+WdqJZsgaUe/7WoyNpD+2RF:o/L+m3xWMZKTWoMT
        MD5:8CCB9E82A89352C0B271032B6B9EDC0B
        SHA1:FE165F91E033D1822E2705FBB90BA5A11688C362
        SHA-256:A08E0D1839B86D0D56A52D07123719211A3C3D43A6AA05AA34531A72ED1207DC
        SHA-512:10717A64DDAE9A99008D086B18DA81F8E793C8823F21AB054593AF618EC6A108A00FD62530E136D5BDEB2696A3F5FAB8B05BABE116051C2D94E12725803470A3
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 88%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......H../...|...|...|...}...|...}...|...}...|^..}...|^..}...|^..}...|...}...|...|Y..|...}...|...}...|...}...|Rich...|........................PE..L...)~b`...........!.........`.......!.......................................@............@..........................!..T...."..(............................0..........8...............................@............................................text...'........................... ..`.rdata..PX.......Z..................@..@.data....;...0...2..................@....pe..........p.......J..............@....reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (console) Intel 80386, for MS Windows
        Entropy (8bit):3.72525154374232
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:OPyF68i97j.exe
        File size:4'323'328 bytes
        MD5:048fe750e586bce2fe5c5f0c77dd208f
        SHA1:cc82bb9ec77116cdea64b52aed1417ff2389b925
        SHA256:84f6d402fc4b76b949a893344b73ae1b4abb21dc9989745728cd18c92991e0ae
        SHA512:dc4031cc1de6a6a455a2799247b78eb8379ce4409b09954f64bb918fd031e9ff4f97ea8c17b5643125e892613f0c10de410cecd2dc2b8fc4b42811910165dcd1
        SSDEEP:24576:y5qN8uQ+0EAVj21SRMQEMvwQ+AJuplwAi6qAu2j:yAN8uQqAI1/CwQDd
        TLSH:5A16FC62A96021DBC21B07710E325CA00A1DD239B77FD89BAB874FF5D5B366304FD85A
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........]..q...q...q...r...q...t.w.q...u...q...t...q...u...q...r...q...p...q...p.w.q.[.y...q.[.q...q.[.s...q.Rich..q................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x403221
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6088D03C [Wed Apr 28 03:02:20 2021 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:32bedc5101920e7f51069b91650d54c1
        Instruction
        call 00007F3C48B985EDh
        jmp 00007F3C48B98059h
        jmp 00007F3C48B9E285h
        push ebp
        mov ebp, esp
        push esi
        push dword ptr [ebp+08h]
        mov esi, ecx
        call 00007F3C48B9823Dh
        mov dword ptr [esi], 0041626Ch
        mov eax, esi
        pop esi
        pop ebp
        retn 0004h
        and dword ptr [ecx+04h], 00000000h
        mov eax, ecx
        and dword ptr [ecx+08h], 00000000h
        mov dword ptr [ecx+04h], 00416274h
        mov dword ptr [ecx], 0041626Ch
        ret
        push ebp
        mov ebp, esp
        push esi
        push dword ptr [ebp+08h]
        mov esi, ecx
        call 00007F3C48B9820Ah
        mov dword ptr [esi], 00416288h
        mov eax, esi
        pop esi
        pop ebp
        retn 0004h
        and dword ptr [ecx+04h], 00000000h
        mov eax, ecx
        and dword ptr [ecx+08h], 00000000h
        mov dword ptr [ecx+04h], 00416290h
        mov dword ptr [ecx], 00416288h
        ret
        push ebp
        mov ebp, esp
        push esi
        mov esi, ecx
        lea eax, dword ptr [esi+04h]
        mov dword ptr [esi], 0041624Ch
        and dword ptr [eax], 00000000h
        and dword ptr [eax+04h], 00000000h
        push eax
        mov eax, dword ptr [ebp+08h]
        add eax, 04h
        push eax
        call 00007F3C48B99193h
        pop ecx
        pop ecx
        mov eax, esi
        pop esi
        pop ebp
        retn 0004h
        lea eax, dword ptr [ecx+04h]
        mov dword ptr [ecx], 0041624Ch
        push eax
        call 00007F3C48B991DEh
        pop ecx
        ret
        push ebp
        mov ebp, esp
        push esi
        mov esi, ecx
        lea eax, dword ptr [esi+04h]
        mov dword ptr [esi], 0041624Ch
        push eax
        call 00007F3C48B991C7h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x1cdd00x5c.rdata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1ce2c0x78.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4220000x1284.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x1c1400x38.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c1780x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x160000x1f4.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x148a30x14a00172a96b89f510dec6ef68534c8fbc5b1False0.5868726325757576data6.607133995032096IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x160000x79800x7a00d783ef718c19e3a38488025eaeffb391False0.4516841700819672data5.062425612563753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x1e0000x14040xa000183e6cfb10cff55d0a9de4ebc9891dbFalse0.198828125data2.6176267194866742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .Config0x200000x11000x120086d3089f14de3fc709be753e5d2db603False0.18033854166666666data2.096154985354179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .Net0x220000x2000000x200000d83d1f77a08246d6324f6604d195c41dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .Fun0x2220000x2000000x200000d0110a2c999e4380c4d3cb900cc5e19dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .reloc0x4220000x12840x1400240f66ded465c56fd78129b998898c5eFalse0.75859375data6.41016014574849IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        DLLImport
        KERNEL32.dllCreateMutexA, ReleaseMutex, lstrcpyA, GetCommandLineW, ExitProcess, CreateProcessW, Process32First, GetCurrentProcess, TerminateProcess, LocalAlloc, OpenProcess, lstrcmpW, ProcessIdToSessionId, GetCurrentThread, Process32Next, LocalFree, GetCurrentProcessId, WinExec, CreateThread, WriteConsoleW, HeapReAlloc, lstrcpyW, SetFilePointerEx, lstrcatW, GetLastError, Sleep, CreateFileW, FindClose, GetModuleFileNameW, lstrlenW, FindNextFileW, FindFirstFileW, CloseHandle, lstrcatA, GetModuleFileNameA, LeaveCriticalSection, WriteFile, EnterCriticalSection, CreateToolhelp32Snapshot, HeapSize, GetFileSizeEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, RaiseException, SetLastError, EncodePointer, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, GetModuleHandleExW, GetCommandLineA, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetFileType, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, GetProcessHeap, DecodePointer
        USER32.dllwsprintfW
        ADVAPI32.dllSetSecurityDescriptorDacl, SetServiceStatus, RegisterServiceCtrlHandlerW, StartServiceCtrlDispatcherW, RevertToSelf, CreateServiceW, RegCloseKey, AccessCheck, SetSecurityDescriptorOwner, CloseServiceHandle, OpenSCManagerW, AllocateAndInitializeSid, GetUserNameA, ImpersonateSelf, RegSetValueExW, IsValidSecurityDescriptor, OpenProcessToken, FreeSid, StartServiceW, InitializeSecurityDescriptor, InitializeAcl, RegOpenKeyExW, OpenServiceW, GetLengthSid, AddAccessAllowedAce, OpenThreadToken, SetSecurityDescriptorGroup
        SHELL32.dllCommandLineToArgvW, SHCreateDirectoryExW
        SHLWAPI.dllSHSetValueW
        NameOrdinalAddress
        CEFProcessForkHandlerEx10x401340
        TimestampSource PortDest PortSource IPDest IP
        Oct 2, 2024 19:10:55.034523964 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:55.039623022 CEST2149704114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:55.039700985 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:55.039815903 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:55.044764042 CEST2149704114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:55.044837952 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:55.050808907 CEST2149704114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:57.316348076 CEST2149704114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:57.316543102 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:57.316612959 CEST4970421192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:57.321610928 CEST2149704114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:58.320128918 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:58.842994928 CEST5349705114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:58.843354940 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:58.843354940 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:58.848407030 CEST5349705114.55.25.226192.168.2.5
        Oct 2, 2024 19:10:58.848476887 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:10:58.853425026 CEST5349705114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:01.156474113 CEST5349705114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:01.156913996 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:01.156914949 CEST4970553192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:01.162209988 CEST5349705114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:02.164010048 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:02.169157028 CEST8049706114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:02.169265985 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:02.169312000 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:02.174490929 CEST8049706114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:02.174696922 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:02.179498911 CEST8049706114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:03.256690979 CEST8049706114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:03.256863117 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:03.257083893 CEST8049706114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:03.257137060 CEST4970680192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:04.257685900 CEST49707443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:04.257791042 CEST44349707114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:04.257874012 CEST49707443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:04.257941008 CEST49707443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:04.257957935 CEST44349707114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:04.258017063 CEST49707443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:04.258028030 CEST44349707114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:04.258261919 CEST44349707114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:05.288820028 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:05.294228077 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:05.294346094 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:05.294392109 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:05.299670935 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:05.299742937 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:05.304699898 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:06.386709929 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:06.386790991 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:06.386907101 CEST808049708114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:06.386917114 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:06.386962891 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:06.387012959 CEST497088080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:07.398284912 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:07.403356075 CEST844349713114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:07.403527975 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:07.403527975 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:07.408792973 CEST844349713114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:07.408869982 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:07.413856030 CEST844349713114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:09.631220102 CEST844349713114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:09.631433010 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:09.631433964 CEST497138443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:09.636739016 CEST844349713114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:11.648529053 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:11.653920889 CEST2149716114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:11.654011965 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:11.654098034 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:11.659153938 CEST2149716114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:11.659266949 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:11.664165974 CEST2149716114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:13.934391975 CEST2149716114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:13.934479952 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:13.934545040 CEST4971621192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:13.939491987 CEST2149716114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:14.945472956 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:14.950917959 CEST5349717114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:14.951092958 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:14.951195002 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:14.955996037 CEST5349717114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:14.956085920 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:14.960916996 CEST5349717114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:17.185420036 CEST5349717114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:17.185693026 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:17.185693026 CEST4971753192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:17.191096067 CEST5349717114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:18.195321083 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:18.203111887 CEST8049718114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:18.203233957 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:18.203319073 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:18.209994078 CEST8049718114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:18.210129023 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:18.217360020 CEST8049718114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:19.307996035 CEST8049718114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:19.308120966 CEST8049718114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:19.308161020 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:19.308248043 CEST4971880192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:20.320312023 CEST49719443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:20.320367098 CEST44349719114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:20.320553064 CEST49719443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:20.320597887 CEST49719443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:20.320604086 CEST44349719114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:20.320664883 CEST49719443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:20.320669889 CEST44349719114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:20.320760965 CEST44349719114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:21.351507902 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:21.356838942 CEST808049720114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:21.356960058 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:21.357078075 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:21.362232924 CEST808049720114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:21.362297058 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:21.367366076 CEST808049720114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:22.280061007 CEST808049720114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:22.280220032 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:22.280323982 CEST808049720114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:22.280550957 CEST497208080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:23.289057970 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:23.294523954 CEST844349721114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:23.294732094 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:23.298099041 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:23.303002119 CEST844349721114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:23.303159952 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:23.308334112 CEST844349721114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:25.405535936 CEST844349721114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:25.405733109 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:25.405822992 CEST497218443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:25.411464930 CEST844349721114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:27.429636002 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:27.435085058 CEST2149722114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:27.435278893 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:27.435410023 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:27.440416098 CEST2149722114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:27.440470934 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:27.445638895 CEST2149722114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:29.483273029 CEST2149722114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:29.483374119 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:29.483428955 CEST4972221192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:29.489684105 CEST2149722114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:30.492402077 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:30.497437954 CEST5349723114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:30.497545004 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:30.497659922 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:30.502599955 CEST5349723114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:30.502660036 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:30.507421970 CEST5349723114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:32.701313972 CEST5349723114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:32.701527119 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:32.701527119 CEST4972353192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:32.706449032 CEST5349723114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:33.711107969 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:33.716006041 CEST8049724114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:33.716083050 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:33.716331959 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:33.721155882 CEST8049724114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:33.721210957 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:33.725981951 CEST8049724114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:34.730340958 CEST8049724114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:34.730465889 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:34.730556011 CEST8049724114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:34.730731010 CEST4972480192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:35.742204905 CEST49725443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:35.742255926 CEST44349725114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:35.742352009 CEST49725443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:35.742429972 CEST49725443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:35.742439032 CEST44349725114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:35.742481947 CEST49725443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:35.742491007 CEST44349725114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:35.742496014 CEST44349725114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:36.773463011 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:36.778315067 CEST808049726114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:36.778708935 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:36.778796911 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:36.783595085 CEST808049726114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:36.783646107 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:36.788471937 CEST808049726114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:37.800400972 CEST808049726114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:37.800595045 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:37.800745010 CEST808049726114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:37.800781012 CEST497268080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:38.805041075 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:38.810003042 CEST844349727114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:38.812508106 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:38.813829899 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:38.819272995 CEST844349727114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:38.820481062 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:38.828080893 CEST844349727114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:41.028652906 CEST844349727114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:41.028703928 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:41.028768063 CEST497278443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:41.034436941 CEST844349727114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:43.054778099 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:43.059840918 CEST2149728114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:43.059932947 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:43.060004950 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:43.064816952 CEST2149728114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:43.064862013 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:43.069667101 CEST2149728114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:45.378277063 CEST2149728114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:45.378390074 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:45.378437996 CEST4972821192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:45.383287907 CEST2149728114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:46.382831097 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:46.388221979 CEST5349730114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:46.388324976 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:46.388410091 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:46.393306971 CEST5349730114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:46.393376112 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:46.398549080 CEST5349730114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:48.682929993 CEST5349730114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:48.682996988 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:48.683058023 CEST4973053192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:48.687843084 CEST5349730114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:49.695415020 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:49.700294018 CEST8049731114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:49.701627016 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:49.701627016 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:49.706496954 CEST8049731114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:49.707411051 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:49.712198019 CEST8049731114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:50.716917038 CEST8049731114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:50.716969967 CEST8049731114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:50.717019081 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:50.726202011 CEST4973180192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:51.742249966 CEST49732443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:51.742352009 CEST44349732114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:51.742463112 CEST49732443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:51.742536068 CEST49732443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:51.742554903 CEST44349732114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:51.742620945 CEST49732443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:51.742633104 CEST44349732114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:51.742924929 CEST44349732114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:52.773487091 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:52.778712034 CEST808049733114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:52.780597925 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:52.780693054 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:52.786017895 CEST808049733114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:52.788573027 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:52.793473005 CEST808049733114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:53.766402006 CEST808049733114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:53.766649008 CEST808049733114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:53.766658068 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:53.766731024 CEST497338080192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:54.773498058 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:54.778683901 CEST844349734114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:54.778799057 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:54.778872013 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:54.783734083 CEST844349734114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:54.783804893 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:54.788664103 CEST844349734114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:56.960781097 CEST844349734114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:56.961108923 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:56.961110115 CEST497348443192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:56.966232061 CEST844349734114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:58.992386103 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:58.997275114 CEST2149735114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:58.997370005 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:58.997462988 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:59.002204895 CEST2149735114.55.25.226192.168.2.5
        Oct 2, 2024 19:11:59.002263069 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:11:59.007016897 CEST2149735114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:01.315126896 CEST2149735114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:01.315191984 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:01.315232038 CEST4973521192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:01.320070028 CEST2149735114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:02.320415974 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:02.325467110 CEST5349736114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:02.325545073 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:02.325615883 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:02.330547094 CEST5349736114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:02.330611944 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:02.335426092 CEST5349736114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:04.655927896 CEST5349736114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:04.656044960 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:04.657779932 CEST4973653192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:04.663296938 CEST5349736114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:05.664145947 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:05.670362949 CEST8049737114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:05.670459032 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:05.670519114 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:05.676343918 CEST8049737114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:05.676397085 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:05.682120085 CEST8049737114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:07.262792110 CEST8049737114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:07.262872934 CEST8049737114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:07.262993097 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:07.262993097 CEST4973780192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:08.273639917 CEST49738443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:08.273683071 CEST44349738114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:08.273818016 CEST49738443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:08.273940086 CEST49738443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:08.273947954 CEST44349738114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:08.274000883 CEST49738443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:08.274004936 CEST44349738114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:08.274219036 CEST44349738114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:09.304847956 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:09.309964895 CEST808049740114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:09.310081959 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:09.310163975 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:09.315366983 CEST808049740114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:09.315423965 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:09.320310116 CEST808049740114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:10.705073118 CEST808049740114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:10.705100060 CEST808049740114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:10.705156088 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:10.705208063 CEST497408080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:11.711244106 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:11.716301918 CEST844349741114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:11.716455936 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:11.716645956 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:11.721407890 CEST844349741114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:11.721484900 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:11.726350069 CEST844349741114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:14.100837946 CEST844349741114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:14.101006985 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:14.101006985 CEST497418443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:14.106163025 CEST844349741114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:16.118201017 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:16.123156071 CEST2149742114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:16.123224020 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:16.126435995 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:16.131185055 CEST2149742114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:16.131247997 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:16.136194944 CEST2149742114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:18.463104963 CEST2149742114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:18.463327885 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:18.484064102 CEST4974221192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:18.489383936 CEST2149742114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:19.492522955 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:19.499481916 CEST5349743114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:19.499586105 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:19.499699116 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:19.506077051 CEST5349743114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:19.506149054 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:19.512480974 CEST5349743114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:21.838073969 CEST5349743114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:21.838155985 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:21.838243008 CEST4974353192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:21.843369007 CEST5349743114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:22.851735115 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:22.958069086 CEST8049744114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:22.958163023 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:22.958273888 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:22.963135958 CEST8049744114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:22.963186979 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:22.968247890 CEST8049744114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:24.060487032 CEST8049744114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:24.060535908 CEST8049744114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:24.060694933 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:24.060743093 CEST4974480192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:25.070521116 CEST49745443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:25.070570946 CEST44349745114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:25.070677996 CEST49745443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:25.070725918 CEST49745443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:25.070732117 CEST44349745114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:25.070789099 CEST49745443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:25.070795059 CEST44349745114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:25.070914030 CEST44349745114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:26.101963043 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:26.106981039 CEST808049746114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:26.107230902 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:26.107364893 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:26.112294912 CEST808049746114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:26.112390995 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:26.117202044 CEST808049746114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:27.191003084 CEST808049746114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:27.191118002 CEST808049746114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:27.191250086 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:27.191344976 CEST497468080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:28.195792913 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:28.200979948 CEST844349747114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:28.201097012 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:28.201169014 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:28.205985069 CEST844349747114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:28.206069946 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:28.211035013 CEST844349747114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:30.397106886 CEST844349747114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:30.397253990 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:30.399796963 CEST497478443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:30.405484915 CEST844349747114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:39.550226927 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:39.555442095 CEST2149748114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:39.555547953 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:39.555639982 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:39.560717106 CEST2149748114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:39.560779095 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:39.565840006 CEST2149748114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:41.789344072 CEST2149748114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:41.789433956 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:41.789479971 CEST4974821192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:41.794559002 CEST2149748114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:42.804932117 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:42.809883118 CEST5349749114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:42.809983969 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:42.812762022 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:42.817549944 CEST5349749114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:42.817629099 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:42.822427034 CEST5349749114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:45.165263891 CEST5349749114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:45.165337086 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:45.165390015 CEST4974953192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:45.170244932 CEST5349749114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:46.180198908 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:46.185406923 CEST8049750114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:46.185590982 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:46.185731888 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:46.190812111 CEST8049750114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:46.190953016 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:46.195979118 CEST8049750114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:47.262811899 CEST8049750114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:47.262865067 CEST8049750114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:47.262916088 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:47.262994051 CEST4975080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:48.276707888 CEST49751443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:48.276822090 CEST44349751114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:48.276916027 CEST49751443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:48.279817104 CEST49751443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:48.279855013 CEST44349751114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:48.279912949 CEST49751443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:48.279926062 CEST44349751114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:48.279980898 CEST44349751114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:49.320686102 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:49.325930119 CEST808049752114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:49.326025963 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:49.326258898 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:49.331274033 CEST808049752114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:49.331413031 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:49.336299896 CEST808049752114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:50.404556036 CEST808049752114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:50.404607058 CEST808049752114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:50.404869080 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:50.404869080 CEST497528080192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:51.414990902 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:51.420918941 CEST844349753114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:51.421410084 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:51.421813965 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:51.427145004 CEST844349753114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:51.427501917 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:51.432545900 CEST844349753114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:53.667176008 CEST844349753114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:53.667268038 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:53.669425011 CEST497538443192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:53.678559065 CEST844349753114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:55.695619106 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:55.700475931 CEST2149754114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:55.700560093 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:55.700653076 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:55.705881119 CEST2149754114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:55.705940008 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:55.710742950 CEST2149754114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:57.998763084 CEST2149754114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:57.998981953 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:57.999074936 CEST4975421192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:58.003868103 CEST2149754114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:59.008259058 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:59.013276100 CEST5349755114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:59.013382912 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:59.013470888 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:59.018301964 CEST5349755114.55.25.226192.168.2.5
        Oct 2, 2024 19:12:59.018376112 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:12:59.023468018 CEST5349755114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:01.220983982 CEST5349755114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:01.221110106 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:01.221268892 CEST4975553192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:01.226109028 CEST5349755114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:02.227161884 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:02.232180119 CEST8049756114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:02.232326984 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:02.232494116 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:02.237497091 CEST8049756114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:02.237561941 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:02.242326021 CEST8049756114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:03.242086887 CEST8049756114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:03.242120028 CEST8049756114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:03.242352009 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:03.251465082 CEST4975680192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:04.258321047 CEST49757443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:04.258379936 CEST44349757114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:04.258462906 CEST49757443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:04.258620977 CEST49757443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:04.258631945 CEST44349757114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:04.258800983 CEST44349757114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:04.258848906 CEST49757443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:04.258860111 CEST44349757114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:05.289593935 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:05.294703960 CEST808049758114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:05.294795036 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:05.294900894 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:05.299767017 CEST808049758114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:05.299839973 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:05.304655075 CEST808049758114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:06.361156940 CEST808049758114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:06.361249924 CEST808049758114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:06.361418962 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:06.361555099 CEST497588080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:07.367857933 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:07.373492002 CEST844349759114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:07.373616934 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:07.373716116 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:07.378645897 CEST844349759114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:07.378710985 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:07.383780003 CEST844349759114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:09.681777954 CEST844349759114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:09.681978941 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:09.682044029 CEST497598443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:09.687015057 CEST844349759114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:11.711536884 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:11.716517925 CEST2149760114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:11.716618061 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:11.716708899 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:11.721762896 CEST2149760114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:11.721837044 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:11.726727962 CEST2149760114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:14.041316032 CEST2149760114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:14.041445017 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:14.041528940 CEST4976021192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:14.046343088 CEST2149760114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:15.055269957 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:15.061414003 CEST5349761114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:15.061512947 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:15.061577082 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:15.068722010 CEST5349761114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:15.068778038 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:15.074784040 CEST5349761114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:17.386607885 CEST5349761114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:17.386703014 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:17.386745930 CEST4976153192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:17.391731977 CEST5349761114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:18.399046898 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:18.404000998 CEST8049762114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:18.404135942 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:18.404220104 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:18.409056902 CEST8049762114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:18.409137011 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:18.413958073 CEST8049762114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:22.552242994 CEST8049762114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:22.552491903 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:22.552613020 CEST8049762114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:22.552805901 CEST4976280192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:23.555345058 CEST49763443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:23.555412054 CEST44349763114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:23.555672884 CEST49763443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:23.555672884 CEST49763443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:23.555743933 CEST44349763114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:23.555811882 CEST49763443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:23.555821896 CEST44349763114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:23.555965900 CEST44349763114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:24.586937904 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:24.592142105 CEST808049764114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:24.592526913 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:24.592803955 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:24.597889900 CEST808049764114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:24.598066092 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:24.603065968 CEST808049764114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:25.706309080 CEST808049764114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:25.706329107 CEST808049764114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:25.706532001 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:25.706532001 CEST497648080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:26.711442947 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:26.716525078 CEST844349765114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:26.716739893 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:26.716739893 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:26.722757101 CEST844349765114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:26.722939968 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:26.727829933 CEST844349765114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:29.093740940 CEST844349765114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:29.093947887 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:29.094044924 CEST497658443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:29.098835945 CEST844349765114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:31.120459080 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:31.125644922 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:31.125783920 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:31.125953913 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:31.130976915 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:31.131061077 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:31.135871887 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:33.817843914 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:33.817941904 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:33.818033934 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:33.818180084 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:33.818240881 CEST4976621192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:33.823148966 CEST2149766114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:34.820976019 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:35.043606043 CEST5349767114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:35.043838978 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:35.043967962 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:35.048969030 CEST5349767114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:35.049194098 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:35.054117918 CEST5349767114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:37.410007000 CEST5349767114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:37.410361052 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:37.410361052 CEST4976753192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:37.415433884 CEST5349767114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:38.414753914 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:38.420186043 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:38.420531988 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:38.420531988 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:38.425487995 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:38.425753117 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:38.430633068 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:39.566139936 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:39.566189051 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:39.566217899 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:39.566580057 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:39.566677094 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.571050882 CEST49769443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.571146965 CEST44349769114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.571508884 CEST49769443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.571589947 CEST49769443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.571604967 CEST44349769114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.571785927 CEST49769443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.571814060 CEST44349769114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.571939945 CEST44349769114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.607445002 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.607852936 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:40.607939959 CEST8049768114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:40.608216047 CEST4976880192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:41.602041006 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:41.607180119 CEST808049770114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:41.607350111 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:41.607350111 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:41.612289906 CEST808049770114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:41.612405062 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:41.617259979 CEST808049770114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:42.619282007 CEST808049770114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:42.619627953 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:42.620148897 CEST808049770114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:42.620407104 CEST497708080192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:43.633430958 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:43.639651060 CEST844349771114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:43.639905930 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:43.641299009 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:43.646508932 CEST844349771114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:43.646667957 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:43.651520967 CEST844349771114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:46.103487015 CEST844349771114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:46.103802919 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:46.103842020 CEST497718443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:46.110207081 CEST844349771114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:48.133424044 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:48.138310909 CEST2149772114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:48.138397932 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:48.138468981 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:48.143332005 CEST2149772114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:48.143390894 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:48.148222923 CEST2149772114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:50.490430117 CEST2149772114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:50.490700006 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:50.490700006 CEST4977221192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:50.495806932 CEST2149772114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:51.543158054 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:51.979924917 CEST5349773114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:51.980169058 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:51.980170012 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:51.986911058 CEST5349773114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:51.987148046 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:51.994357109 CEST5349773114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:54.317300081 CEST5349773114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:54.317421913 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:54.586102009 CEST4977353192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:54.832678080 CEST5349773114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:55.586925983 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:55.592127085 CEST8049774114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:55.592446089 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:55.592446089 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:55.597534895 CEST8049774114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:55.597620010 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:55.602473021 CEST8049774114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:56.702287912 CEST8049774114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:56.702475071 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:56.702738047 CEST8049774114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:56.702795029 CEST4977480192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:57.836651087 CEST49775443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:57.836750984 CEST44349775114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:57.836833954 CEST49775443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:57.837146044 CEST49775443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:57.837182999 CEST44349775114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:57.837248087 CEST49775443192.168.2.5114.55.25.226
        Oct 2, 2024 19:13:57.837265015 CEST44349775114.55.25.226192.168.2.5
        Oct 2, 2024 19:13:57.837270975 CEST44349775114.55.25.226192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Oct 2, 2024 19:10:52.874509096 CEST5904253192.168.2.51.1.1.1
        Oct 2, 2024 19:10:53.867113113 CEST5904253192.168.2.51.1.1.1
        Oct 2, 2024 19:10:54.009879112 CEST53590421.1.1.1192.168.2.5
        Oct 2, 2024 19:10:54.014725924 CEST53590421.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Oct 2, 2024 19:10:52.874509096 CEST192.168.2.51.1.1.10x496Standard query (0)www.uvfr4ep.comA (IP address)IN (0x0001)false
        Oct 2, 2024 19:10:53.867113113 CEST192.168.2.51.1.1.10x496Standard query (0)www.uvfr4ep.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 2, 2024 19:10:54.009879112 CEST1.1.1.1192.168.2.50x496No error (0)www.uvfr4ep.com114.55.25.226A (IP address)IN (0x0001)false
        Oct 2, 2024 19:10:54.014725924 CEST1.1.1.1192.168.2.50x496No error (0)www.uvfr4ep.com114.55.25.226A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.27A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.37A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.34A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.43A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.26A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.22A (IP address)IN (0x0001)false
        Oct 2, 2024 19:12:08.384399891 CEST1.1.1.1192.168.2.50x1e68No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.40A (IP address)IN (0x0001)false
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.549706114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:02.169312000 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:11:02.174696922 CEST110OUTData Raw: fb fa 6b 8e 87 39 c7 fb a8 5b e0 4a b6 ed 2b 6b 06 a5 cb fc f6 f1 2d a0 84 5d 90 65 14 15 f4 7a e3 c5 00 92 61 b2 9e 3e 67 94 2e 89 7c 21 d0 c3 a4 0d 64 42 40 0a e7 62 4d 88 5a a8 d7 c0 3d af 2d 3e c3 49 dd 0b 65 f4 65 98 35 84 6d 51 92 b0 d2 7e
        Data Ascii: k9[J+k-]eza>g.|!dB@bMZ=->Iee5mQ~5>${8kkoMXi5<cy
        Oct 2, 2024 19:11:03.256690979 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:03 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.549708114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:06.386709929 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:06 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.549718114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:18.203319073 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:11:18.210129023 CEST110OUTData Raw: 8c 8d 1c f9 f0 4e b0 8c 2d 72 85 b8 33 a2 92 cd 7c 43 56 fc f0 93 d8 85 51 36 09 3f e5 3e 8a a3 be 6d 97 ca a7 f2 7d 8c 95 ca 3c 0c 8e 19 1e 12 a9 9c 8e 35 31 1f 65 30 ef 94 b4 85 51 9c 34 01 07 e1 23 66 6c 3c f1 31 97 c6 27 01 9f 69 5c 61 df ef
        Data Ascii: N-r3|CVQ6?>m}<51e0Q4#fl<1'i\aBO1a)b@E;w^rq.
        Oct 2, 2024 19:11:19.307996035 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:19 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.549720114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:22.280061007 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:22 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.549724114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:33.716331959 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:11:33.721210957 CEST110OUTData Raw: 93 92 03 e6 ef 51 af 93 98 75 53 b7 07 8f 75 07 4e 29 7a a8 8b 20 aa 44 4d 47 57 3d bf 22 89 b0 38 4c 5c 14 a7 f0 b2 a2 3f d2 f5 1c a5 2b e6 c7 84 e9 bd 7e 55 b3 08 ee ec fa f5 98 14 9f 28 0d 9e df f7 a7 73 21 21 00 3d de ee 11 b4 5b a4 b4 f2 9a
        Data Ascii: QuSuN)z DMGW="8L\?+~U(s!!=[+E~LCqCd
        Oct 2, 2024 19:11:34.730340958 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:34 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.549726114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:37.800400972 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:37 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.549731114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:49.701627016 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:11:49.707411051 CEST110OUTData Raw: 94 95 04 e1 e8 56 a8 94 fd 29 dd 55 65 50 07 69 bd 0c 75 62 4f 78 7f 9a a7 df 43 f7 b4 63 2f de 69 64 c9 6d e5 c7 a9 17 5d 89 7c f9 c0 f3 93 ae 70 cb b5 b3 96 ec da 37 01 65 e6 55 18 d9 89 64 c8 f0 65 d9 36 11 3d b2 5f 85 67 f4 d1 83 d1 dd 06 b8
        Data Ascii: V)UePiubOxCc/idm]|p7eUde6=_g.t4I%}Asm1
        Oct 2, 2024 19:11:50.716917038 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:50 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.549733114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:11:53.766402006 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:11:53 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.549737114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:05.670519114 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:12:05.676397085 CEST110OUTData Raw: 05 04 95 70 79 c7 39 05 b3 57 fe b3 ca 52 3d 5c 1f 18 30 bd 32 4b 3a fa 7c 8f ce d9 a7 10 59 d0 e8 c9 a2 db 57 5b f0 2e 82 66 ce 8e fe 60 38 0a 43 4e 61 fd 7a 4e 0e c6 4b a4 fa ea 9a 3b 6e fb d8 cc 9f fe 15 1c f5 1a 80 6a d5 83 ef 10 7a 79 35 3d
        Data Ascii: py9WR=\02K:|YW[.f`8CNazNK;njzy5=`>{8b~YRW
        Oct 2, 2024 19:12:07.262792110 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:07 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        9192.168.2.549740114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:10.705073118 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:10 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        10192.168.2.549744114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:22.958273888 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:12:22.963186979 CEST110OUTData Raw: 0f 0e 9f 7a 73 cd 33 0f 95 b8 77 91 ef 25 84 50 e5 6f 21 ea 46 bc 2d 70 53 18 52 d7 7b a4 5d 27 3a 81 7d a4 4f fb fc 5c ae 83 4d a6 d1 1d 8b 0c b3 33 7a a0 04 b3 13 46 6e 39 6c ee 4c 85 60 06 00 8e 4a 8b 07 b6 f3 62 ac 8f 56 ab c0 6d c9 7f c5 40
        Data Ascii: zs3w%Po!F-pSR{]':}O\M3zFn9lL`JbVm@z_U]6GBRp!*
        Oct 2, 2024 19:12:24.060487032 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:23 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        11192.168.2.549746114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:27.191003084 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:27 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        12192.168.2.549750114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:46.185731888 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:12:46.190953016 CEST110OUTData Raw: 5d 5c cd 28 21 9f 61 5d cc 0a be 85 c6 47 64 6a c0 aa 6f 87 11 38 e7 51 c8 74 8e 87 7a 94 6a 7f 6c 1f 63 b1 30 a0 5e a0 a5 63 d6 e0 aa 2d 39 64 c4 a4 66 9f 01 65 8b 35 a7 07 e2 ec 1f e7 05 0c 04 42 06 cc 2a bf 03 cc a7 6f cd ed bb 5d 7b 17 b2 d7
        Data Ascii: ]\(!a]Gdjo8Qtzjlc0^c-9dfe5B*o]{K,kNSMF1]SW
        Oct 2, 2024 19:12:47.262811899 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:47 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        13192.168.2.549752114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:12:50.404556036 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:12:50 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        14192.168.2.549756114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:02.232494116 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:13:02.237561941 CEST110OUTData Raw: c1 c0 51 b4 bd 03 fd c1 9b e6 15 ff 5d 1c ba f4 f8 03 1d e1 4c 0c 22 11 ae 4a 7a 91 d5 b1 18 15 ee aa fc 2d 9c 7d 35 3c 6e 13 e1 06 ad ea 7b 66 60 91 88 65 c0 cd d2 e9 5d a5 8a 66 2c 5e eb fa 1a 6b 05 cc 1a fe f4 cc 6c 1f fa 0b bc 9a 39 15 16 e2
        Data Ascii: Q]L"Jz-}5<n{f`e]f,^kl9(}Xm5'
        Oct 2, 2024 19:13:03.242086887 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:03 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        15192.168.2.549758114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:06.361156940 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:06 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        16192.168.2.549762114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:18.404220104 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:13:18.409137011 CEST110OUTData Raw: 94 95 04 e1 e8 56 a8 94 3c 93 25 1f 72 59 b1 bd f2 16 3d 65 c4 a8 da 57 41 68 f1 28 e4 4a 71 93 ff 07 9a 62 32 85 d8 c5 9c 33 84 b3 d7 fa 25 7a 3f d1 fd b4 1d 3c 7f fa e7 d2 54 8a 48 f0 d7 29 5e 93 36 d6 e1 53 4c 60 9e 3f 9f be c6 8a 67 09 49 a2
        Data Ascii: V<%rY=eWAh(Jqb23%z?<TH)^6SL`?gIc{eh.1#
        Oct 2, 2024 19:13:22.552242994 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:22 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        17192.168.2.549764114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:25.706309080 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:25 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        18192.168.2.549768114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:38.420531988 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:13:38.425753117 CEST110OUTData Raw: 19 18 89 6c 65 db 25 19 43 b4 69 87 bd 0d a9 de b7 b1 39 2e 7d ab af 8e 02 53 e3 fa 35 77 dc 06 fb 4b 51 5f 8e ee 48 9d 6e 99 45 a6 95 23 b0 94 f7 fb 74 72 29 b2 87 ae 29 64 cb d5 14 40 f7 31 d7 52 70 66 d0 b5 51 b5 6c 95 5e ab 84 53 f2 e7 81 88
        Data Ascii: le%Ci9.}S5wKQ_HnE#tr))d@1RpfQl^SW\Ep!hw5
        Oct 2, 2024 19:13:39.566139936 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:39 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>
        Oct 2, 2024 19:13:40.607445002 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:39 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>
        Oct 2, 2024 19:13:40.607939959 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:39 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        19192.168.2.549770114.55.25.22680806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:42.619282007 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:42 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        20192.168.2.549774114.55.25.226806516C:\Windows\Logs\logs\brcc.exe
        TimestampBytes transferredDirectionData
        Oct 2, 2024 19:13:55.592446089 CEST6OUTData Raw: 17 03 03 00 6e
        Data Ascii: n
        Oct 2, 2024 19:13:55.597620010 CEST110OUTData Raw: 58 59 c8 2d 24 9a 64 58 c3 e8 ab 84 22 1b b5 53 97 8d e5 1d 07 f6 84 6a a7 83 36 2b c4 7d 31 6c 27 1c a0 5d 97 17 7a bd af 84 c6 e4 4b 74 ed 58 96 86 e9 00 12 ae ed 0b cd f5 5f 45 a4 0b 5b 1a 4a 44 c0 25 88 0d 22 d4 ad 88 dd e9 5a 04 af 2b e0 f5
        Data Ascii: XY-$dX"Sj6+}1l']zKtX_E[JD%"Z+wln$K[74orNC
        Oct 2, 2024 19:13:56.702287912 CEST321INHTTP/1.1 400 Bad Request
        Server: nginx/1.20.1
        Date: Wed, 02 Oct 2024 17:13:56 GMT
        Content-Type: text/html
        Content-Length: 157
        Connection: close
        X-Sg: dbsk
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>nginx/1.20.1</center></body></html>


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Users\user\Desktop\OPyF68i97j.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\OPyF68i97j.exe"
        Imagebase:0x490000
        File size:4'323'328 bytes
        MD5 hash:048FE750E586BCE2FE5C5F0C77DD208F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:3
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /run /tn "TabletPCInputServices"
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Users\user\Desktop\OPyF68i97j.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\OPyF68i97j.exe" -service
        Imagebase:0x490000
        File size:4'323'328 bytes
        MD5 hash:048FE750E586BCE2FE5C5F0C77DD208F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:5
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Users\user\Desktop\OPyF68i97j.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\OPyF68i97j.exe
        Imagebase:0x490000
        File size:4'323'328 bytes
        MD5 hash:048FE750E586BCE2FE5C5F0C77DD208F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:6
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:8
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:9
        Start time:13:10:49
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /run /tn "TabletPCInputServices"
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:10
        Start time:13:10:50
        Start date:02/10/2024
        Path:C:\Users\user\Desktop\OPyF68i97j.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\OPyF68i97j.exe
        Imagebase:0x490000
        File size:4'323'328 bytes
        MD5 hash:048FE750E586BCE2FE5C5F0C77DD208F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:11
        Start time:13:10:50
        Start date:02/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:12
        Start time:13:10:50
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /create /tn "TabletPCInputServices" /tr "C:\Users\user\Desktop\OPyF68i97j.exe" /sc minute /mo 10 /ru system /f
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:13
        Start time:13:10:50
        Start date:02/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks /run /tn "TabletPCInputServices"
        Imagebase:0x3a0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:14
        Start time:13:10:51
        Start date:02/10/2024
        Path:C:\Windows\Logs\logs\brcc.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\Logs\logs\brcc.exe" askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
        Imagebase:0x400000
        File size:175'528 bytes
        MD5 hash:9D2AE725D41B1F9BF384D2F573DF9443
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 4%, ReversingLabs
        Has exited:false

        Target ID:15
        Start time:13:10:51
        Start date:02/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:17
        Start time:13:11:33
        Start date:02/10/2024
        Path:C:\Windows\System32\svchost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
        Imagebase:0x7ff7e52b0000
        File size:55'320 bytes
        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
        Has elevated privileges:true
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:4.1%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:22%
          Total number of Nodes:581
          Total number of Limit Nodes:12
          execution_graph 6834 4a582b 6835 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6834->6835 6836 4a583f 6835->6836 6837 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6836->6837 6838 4a5849 6837->6838 6839 493221 6842 49362e 6839->6842 6841 493226 6841->6841 6843 493644 6842->6843 6845 49364d 6843->6845 6846 4935e1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6843->6846 6845->6841 6846->6845 6169 491340 GetCommandLineW CommandLineToArgvW 6172 4913d0 6169->6172 6171 491372 ExitProcess 6173 4913fc 6172->6173 6174 49140c 6173->6174 6175 491401 6173->6175 6176 491411 lstrcmpW 6174->6176 6177 491430 6174->6177 6189 491930 ImpersonateSelf 6175->6189 6179 491428 ExitProcess 6176->6179 6180 491423 6176->6180 6214 492d90 6177->6214 6244 492b40 StartServiceCtrlDispatcherW 6180->6244 6184 49143c 6184->6171 6185 491445 6247 491d80 6185->6247 6190 491972 GetCurrentThread OpenThreadToken 6189->6190 6195 491afd 6189->6195 6193 49198d GetLastError 6190->6193 6194 4919d0 AllocateAndInitializeSid 6190->6194 6191 491b0d 6198 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6191->6198 6192 491b06 FreeSid 6192->6191 6193->6195 6196 49199e GetCurrentProcess OpenProcessToken 6193->6196 6194->6195 6197 4919fb LocalAlloc 6194->6197 6195->6191 6195->6192 6196->6195 6199 4919bd GetCurrentProcess OpenProcessToken 6196->6199 6197->6195 6200 491a11 InitializeSecurityDescriptor 6197->6200 6201 491406 6198->6201 6199->6194 6199->6195 6202 491a22 GetLengthSid LocalAlloc 6200->6202 6203 491af6 LocalFree 6200->6203 6201->6185 6221 491b20 6201->6221 6204 491a3e InitializeAcl 6202->6204 6205 491af5 6202->6205 6203->6195 6206 491aee LocalFree 6204->6206 6207 491a50 AddAccessAllowedAce 6204->6207 6205->6203 6206->6205 6207->6206 6208 491a66 SetSecurityDescriptorDacl 6207->6208 6208->6206 6209 491a76 SetSecurityDescriptorGroup 6208->6209 6209->6206 6210 491a86 SetSecurityDescriptorOwner 6209->6210 6210->6206 6211 491a96 IsValidSecurityDescriptor 6210->6211 6211->6206 6212 491aa1 AccessCheck 6211->6212 6212->6206 6213 491ae1 RevertToSelf 6212->6213 6213->6206 6215 492d99 6214->6215 6216 492d9b IsProcessorFeaturePresent 6214->6216 6215->6184 6218 492e1b 6216->6218 6254 492ddf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6218->6254 6220 492efe 6220->6184 6255 491e90 6221->6255 6223 491b54 std::_Xinvalid_argument 6224 491b86 GetModuleFileNameW 6223->6224 6225 491bd0 6224->6225 6225->6225 6286 4917d0 6225->6286 6227 491bec 6228 4917d0 38 API calls 6227->6228 6230 491c50 6228->6230 6229 491ce7 6299 491480 6229->6299 6233 491c9f 6230->6233 6343 498564 6230->6343 6233->6229 6236 498564 25 API calls 6233->6236 6234 491cfe 6329 4921c0 6234->6329 6236->6229 6238 491d1b OpenSCManagerW 6239 491d13 ExitProcess 6238->6239 6240 491d37 OpenServiceW 6238->6240 6241 491d5f CloseServiceHandle 6240->6241 6242 491d47 StartServiceW CloseServiceHandle 6240->6242 6241->6239 6243 491d6f ExitProcess 6241->6243 6242->6241 6245 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6244->6245 6246 492b80 6245->6246 6246->6179 6248 491e90 79 API calls 6247->6248 6249 491d87 6248->6249 6784 492090 6249->6784 6254->6220 6348 4943e0 6255->6348 6258 491efd lstrcatA 6259 491f0f 6258->6259 6350 491450 6259->6350 6263 491f36 std::_Xinvalid_argument 6264 491f4b lstrcpyA 6263->6264 6363 4912b0 6264->6363 6267 49206b 6370 4916f0 6267->6370 6268 491f75 6270 491f7f ReleaseMutex CloseHandle 6268->6270 6271 491f92 CreateMutexA 6268->6271 6270->6271 6273 4943e0 std::_Xinvalid_argument 6271->6273 6272 492073 GetCurrentProcessId 6373 491da0 6272->6373 6274 491fc0 GetModuleFileNameA 6273->6274 6276 491fea std::_Xinvalid_argument 6274->6276 6278 491450 50 API calls 6276->6278 6277 492080 ExitProcess 6279 492019 WinExec 6278->6279 6280 49205b 6279->6280 6281 492032 6279->6281 6283 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6280->6283 6282 491450 50 API calls 6281->6282 6284 49204d WinExec 6282->6284 6285 492067 6283->6285 6284->6280 6285->6223 6289 4917f1 6286->6289 6291 49181c 6286->6291 6287 49190f 6743 491920 6287->6743 6289->6227 6291->6287 6292 491866 6291->6292 6293 491896 6291->6293 6294 492da1 3 API calls 6292->6294 6295 492da1 3 API calls 6293->6295 6297 491884 __fassign 6293->6297 6294->6297 6295->6297 6296 498564 25 API calls 6296->6287 6297->6296 6298 4918f1 6297->6298 6298->6227 6300 4914b7 6299->6300 6300->6300 6301 4917d0 38 API calls 6300->6301 6302 4914d1 6301->6302 6303 491506 6302->6303 6305 491524 6302->6305 6304 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6303->6304 6306 491520 6304->6306 6307 498564 25 API calls 6305->6307 6306->6234 6311 491529 std::_Xinvalid_argument 6307->6311 6308 4916d7 6309 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6308->6309 6310 4916e4 6309->6310 6310->6234 6311->6308 6312 491450 50 API calls 6311->6312 6313 4915a6 6312->6313 6314 4915fc lstrcatW 6313->6314 6315 491480 51 API calls 6314->6315 6316 491611 lstrcatW lstrlenW 6315->6316 6317 49164a lstrlenW 6316->6317 6318 491626 lstrlenW 6316->6318 6319 491655 6317->6319 6320 491667 lstrlenW 6317->6320 6324 491647 6318->6324 6319->6320 6322 491691 lstrlenW 6320->6322 6323 491674 lstrlenW 6320->6323 6325 49169c 6322->6325 6326 4916b2 lstrcatW lstrcatW 6322->6326 6328 49168e 6323->6328 6324->6317 6325->6326 6326->6308 6328->6322 6330 4943e0 std::_Xinvalid_argument 6329->6330 6331 492205 wsprintfW OpenSCManagerW 6330->6331 6332 492240 OpenServiceW 6331->6332 6333 492266 6331->6333 6334 492279 CreateServiceW 6332->6334 6335 492251 CloseServiceHandle 6332->6335 6336 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6333->6336 6337 49225d 6334->6337 6339 4922b1 14 API calls 6334->6339 6335->6337 6338 491d0c 6336->6338 6340 492263 CloseServiceHandle 6337->6340 6338->6238 6338->6239 6341 49248c CloseServiceHandle 6339->6341 6342 4923a5 13 API calls 6339->6342 6340->6333 6341->6340 6342->6340 6344 4984f0 ___std_exception_copy 25 API calls 6343->6344 6345 498573 6344->6345 6346 498581 ___std_exception_copy 11 API calls 6345->6346 6347 498580 6346->6347 6349 491ece GetCurrentProcessId ProcessIdToSessionId GetUserNameA 6348->6349 6349->6258 6349->6259 6351 491468 6350->6351 6387 498384 6351->6387 6354 492da1 6357 492da6 ___std_exception_copy 6354->6357 6355 492dc0 6355->6263 6356 4985c4 _free 2 API calls 6356->6357 6357->6355 6357->6356 6359 492dc2 6357->6359 6358 49331c 6360 4942e9 __CxxThrowException@8 RaiseException 6358->6360 6359->6358 6740 4942e9 6359->6740 6361 493339 6360->6361 6361->6263 6364 4912c0 ReleaseMutex CloseHandle 6363->6364 6365 4912d3 CreateMutexA 6363->6365 6364->6365 6366 491308 6365->6366 6367 4912f2 GetLastError 6365->6367 6368 491312 ReleaseMutex CloseHandle 6366->6368 6369 491325 6366->6369 6367->6366 6368->6369 6369->6267 6369->6268 6371 491739 6370->6371 6372 491726 ReleaseMutex CloseHandle 6370->6372 6371->6272 6372->6371 6374 4943e0 std::_Xinvalid_argument 6373->6374 6375 491dd8 CreateToolhelp32Snapshot Process32First 6374->6375 6376 491df7 6375->6376 6377 491e46 CloseHandle 6375->6377 6380 491e08 OpenProcess 6376->6380 6382 491e64 CloseHandle 6376->6382 6383 491e3a Process32Next 6376->6383 6385 491da0 5 API calls 6376->6385 6378 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6377->6378 6379 491e60 6378->6379 6379->6277 6381 491e1a TerminateProcess 6380->6381 6380->6382 6381->6376 6381->6382 6384 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6382->6384 6383->6376 6383->6377 6386 491e7e 6384->6386 6385->6376 6386->6277 6390 496829 6387->6390 6389 491472 6389->6354 6391 496849 6390->6391 6392 496834 6390->6392 6394 49688b 6391->6394 6397 496857 6391->6397 6406 499cc1 6392->6406 6395 499cc1 _free 14 API calls 6394->6395 6405 496883 6395->6405 6412 4966ab 6397->6412 6401 498554 ___std_exception_copy 25 API calls 6403 49689b 6401->6403 6403->6389 6404 499cc1 _free 14 API calls 6404->6405 6405->6401 6427 49b237 GetLastError 6406->6427 6408 496839 6409 498554 6408->6409 6501 4984f0 6409->6501 6411 496844 6411->6389 6413 4966eb 6412->6413 6414 4966d3 6412->6414 6413->6414 6416 4966f3 6413->6416 6415 499cc1 _free 14 API calls 6414->6415 6417 4966d8 6415->6417 6519 496b6e 6416->6519 6419 498554 ___std_exception_copy 25 API calls 6417->6419 6420 4966e3 6419->6420 6422 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6420->6422 6421 496703 6527 496fcd 6421->6527 6423 49680b 6422->6423 6423->6403 6423->6404 6428 49b254 6427->6428 6429 49b24e 6427->6429 6448 49b25a SetLastError 6428->6448 6455 49a096 6428->6455 6450 49a057 6429->6450 6436 49b28a 6438 49a096 _free 6 API calls 6436->6438 6437 49b2a1 6439 49a096 _free 6 API calls 6437->6439 6446 49b298 6438->6446 6440 49b2ad 6439->6440 6441 49b2b1 6440->6441 6442 49b2c2 6440->6442 6443 49a096 _free 6 API calls 6441->6443 6473 49af0e 6442->6473 6443->6446 6467 499d31 6446->6467 6448->6408 6449 499d31 _free 12 API calls 6449->6448 6478 499e9a 6450->6478 6452 49a073 6453 49a07c 6452->6453 6454 49a08e TlsGetValue 6452->6454 6453->6428 6456 499e9a _free 5 API calls 6455->6456 6457 49a0b2 6456->6457 6458 49a0bb 6457->6458 6459 49a0d0 TlsSetValue 6457->6459 6458->6448 6460 499cd4 6458->6460 6465 499ce1 _free 6460->6465 6461 499d21 6464 499cc1 _free 13 API calls 6461->6464 6462 499d0c HeapAlloc 6463 499d1f 6462->6463 6462->6465 6463->6436 6463->6437 6464->6463 6465->6461 6465->6462 6484 4985c4 6465->6484 6468 499d65 _free 6467->6468 6469 499d3c HeapFree 6467->6469 6468->6448 6469->6468 6470 499d51 6469->6470 6471 499cc1 _free 12 API calls 6470->6471 6472 499d57 GetLastError 6471->6472 6472->6468 6487 49ada2 6473->6487 6479 499ec8 6478->6479 6482 499ec4 __crt_fast_encode_pointer 6478->6482 6480 499dd3 _free LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6479->6480 6479->6482 6481 499edc 6480->6481 6481->6482 6483 499ee2 GetProcAddress 6481->6483 6482->6452 6483->6482 6485 4985f1 _free EnterCriticalSection LeaveCriticalSection 6484->6485 6486 4985cf 6485->6486 6486->6465 6488 49adae std::_Xinvalid_argument 6487->6488 6489 49c063 std::_Xinvalid_argument EnterCriticalSection 6488->6489 6490 49adb8 6489->6490 6491 49ade8 _free LeaveCriticalSection 6490->6491 6492 49add6 6491->6492 6493 49aeb4 6492->6493 6494 49aec0 std::_Xinvalid_argument 6493->6494 6495 49c063 std::_Xinvalid_argument EnterCriticalSection 6494->6495 6496 49aeca 6495->6496 6497 49b095 _free 14 API calls 6496->6497 6498 49aee2 6497->6498 6499 49af02 _free LeaveCriticalSection 6498->6499 6500 49aef0 6499->6500 6500->6449 6502 49b237 _free 14 API calls 6501->6502 6503 4984fb 6502->6503 6504 498509 6503->6504 6509 498581 IsProcessorFeaturePresent 6503->6509 6504->6411 6506 498553 6507 4984f0 ___std_exception_copy 25 API calls 6506->6507 6508 498560 6507->6508 6508->6411 6510 49858d 6509->6510 6513 4983a8 6510->6513 6514 4983c4 std::_Xinvalid_argument 6513->6514 6515 4983f0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6514->6515 6518 4984c1 std::_Xinvalid_argument 6515->6518 6516 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6517 4984df GetCurrentProcess TerminateProcess 6516->6517 6517->6506 6518->6516 6520 496b8e 6519->6520 6521 496b85 6519->6521 6520->6521 6544 49b0e0 GetLastError 6520->6544 6521->6421 6608 497f28 6527->6608 6529 49678a 6541 496bf1 6529->6541 6530 496fed 6531 499cc1 _free 14 API calls 6530->6531 6532 496ff2 6531->6532 6533 498554 ___std_exception_copy 25 API calls 6532->6533 6533->6529 6534 496fde 6534->6529 6534->6530 6615 49714d 6534->6615 6623 4979c7 6534->6623 6628 4972a1 6534->6628 6633 497415 6534->6633 6662 497795 6534->6662 6684 497f43 6534->6684 6542 499d31 _free 14 API calls 6541->6542 6543 496c01 6542->6543 6543->6420 6545 49b0fd 6544->6545 6546 49b0f7 6544->6546 6548 49a096 _free 6 API calls 6545->6548 6550 49b103 SetLastError 6545->6550 6547 49a057 _free 6 API calls 6546->6547 6547->6545 6549 49b11b 6548->6549 6549->6550 6551 499cd4 _free 14 API calls 6549->6551 6556 496bae 6550->6556 6557 49b197 6550->6557 6552 49b12b 6551->6552 6554 49b14a 6552->6554 6555 49b133 6552->6555 6560 49a096 _free 6 API calls 6554->6560 6558 49a096 _free 6 API calls 6555->6558 6571 49b332 6556->6571 6579 499875 6557->6579 6561 49b141 6558->6561 6563 49b156 6560->6563 6566 499d31 _free 14 API calls 6561->6566 6564 49b16b 6563->6564 6565 49b15a 6563->6565 6568 49af0e _free 14 API calls 6564->6568 6567 49a096 _free 6 API calls 6565->6567 6566->6550 6567->6561 6569 49b176 6568->6569 6570 499d31 _free 14 API calls 6569->6570 6570->6550 6572 49b345 6571->6572 6574 496bc4 6571->6574 6572->6574 6590 49e1ac 6572->6590 6575 49b35f 6574->6575 6576 49b387 6575->6576 6577 49b372 6575->6577 6576->6521 6577->6576 6603 49cff7 6577->6603 6580 49e46c std::_Xinvalid_argument EnterCriticalSection LeaveCriticalSection 6579->6580 6581 49987a 6580->6581 6582 499885 6581->6582 6583 49e4b1 std::_Xinvalid_argument 36 API calls 6581->6583 6584 49988f IsProcessorFeaturePresent 6582->6584 6589 4998ae 6582->6589 6583->6582 6585 49989b 6584->6585 6587 4983a8 std::_Xinvalid_argument 8 API calls 6585->6587 6586 4990de std::_Xinvalid_argument 23 API calls 6588 4998b8 6586->6588 6587->6589 6589->6586 6591 49e1b8 std::_Xinvalid_argument 6590->6591 6592 49b0e0 std::_Xinvalid_argument 37 API calls 6591->6592 6593 49e1c1 6592->6593 6594 49e207 6593->6594 6595 49c063 std::_Xinvalid_argument EnterCriticalSection 6593->6595 6594->6574 6596 49e1df 6595->6596 6597 49e22d __fassign 14 API calls 6596->6597 6598 49e1f0 6597->6598 6599 49e20c __fassign LeaveCriticalSection 6598->6599 6600 49e203 6599->6600 6600->6594 6601 499875 std::_Xinvalid_argument 37 API calls 6600->6601 6602 49e22c 6601->6602 6604 49b0e0 std::_Xinvalid_argument 37 API calls 6603->6604 6605 49d001 6604->6605 6606 49cf0f __fassign 47 API calls 6605->6606 6607 49d007 6606->6607 6607->6576 6609 497f2d 6608->6609 6610 497f40 6608->6610 6611 499cc1 _free 14 API calls 6609->6611 6610->6534 6612 497f32 6611->6612 6613 498554 ___std_exception_copy 25 API calls 6612->6613 6614 497f3d 6613->6614 6614->6534 6691 4971a6 6615->6691 6617 497152 6618 497169 6617->6618 6619 499cc1 _free 14 API calls 6617->6619 6618->6534 6620 49715b 6619->6620 6621 498554 ___std_exception_copy 25 API calls 6620->6621 6622 497166 6621->6622 6622->6534 6624 4979d0 6623->6624 6625 4979d7 6623->6625 6694 496e45 6624->6694 6625->6534 6629 4972aa 6628->6629 6630 4972b1 6628->6630 6631 496e45 47 API calls 6629->6631 6630->6534 6632 4972b0 6631->6632 6632->6534 6634 49741c 6633->6634 6635 497436 6633->6635 6636 49781a 6634->6636 6637 4977ae 6634->6637 6638 497466 6634->6638 6635->6638 6639 499cc1 _free 14 API calls 6635->6639 6642 497821 6636->6642 6643 497860 6636->6643 6650 4977f1 6636->6650 6637->6650 6652 4977ba 6637->6652 6638->6534 6640 497452 6639->6640 6641 498554 ___std_exception_copy 25 API calls 6640->6641 6644 49745d 6641->6644 6645 4977c8 6642->6645 6646 497826 6642->6646 6731 497e7e 6643->6731 6644->6534 6649 4977ea 6645->6649 6659 4977d6 6645->6659 6725 497ab6 6645->6725 6646->6650 6651 49782b 6646->6651 6648 497801 6648->6649 6702 497c07 6648->6702 6649->6534 6650->6649 6650->6659 6716 497c9a 6650->6716 6655 49783e 6651->6655 6656 497830 6651->6656 6652->6645 6652->6648 6652->6659 6710 497deb 6655->6710 6656->6649 6706 497e5f 6656->6706 6659->6649 6734 498109 6659->6734 6663 49781a 6662->6663 6664 4977ae 6662->6664 6665 497821 6663->6665 6666 497860 6663->6666 6671 4977f1 6663->6671 6664->6671 6672 4977ba 6664->6672 6667 4977c8 6665->6667 6668 497826 6665->6668 6669 497e7e 26 API calls 6666->6669 6674 497ab6 49 API calls 6667->6674 6682 4977d6 6667->6682 6683 4977ea 6667->6683 6668->6671 6675 49782b 6668->6675 6669->6682 6670 497801 6679 497c07 48 API calls 6670->6679 6670->6683 6673 497c9a 26 API calls 6671->6673 6671->6682 6671->6683 6672->6667 6672->6670 6672->6682 6673->6682 6674->6682 6676 49783e 6675->6676 6677 497830 6675->6677 6678 497deb 25 API calls 6676->6678 6680 497e5f 26 API calls 6677->6680 6677->6683 6678->6682 6679->6682 6680->6682 6681 498109 48 API calls 6681->6683 6682->6681 6682->6683 6683->6534 6685 497f49 6684->6685 6686 497f62 6684->6686 6685->6686 6687 499cc1 _free 14 API calls 6685->6687 6686->6534 6688 497f54 6687->6688 6689 498554 ___std_exception_copy 25 API calls 6688->6689 6690 497f5f 6689->6690 6690->6534 6692 49723d 25 API calls 6691->6692 6693 4971b2 6692->6693 6693->6617 6695 496e57 6694->6695 6698 496e5c 6694->6698 6697 499cc1 _free 14 API calls 6695->6697 6696 49a7ef 47 API calls 6699 496e7a 6696->6699 6697->6698 6698->6696 6700 499cc1 _free 14 API calls 6699->6700 6701 496e8e 6699->6701 6700->6701 6701->6534 6703 497c22 6702->6703 6704 497c57 6703->6704 6705 49a975 48 API calls 6703->6705 6704->6659 6705->6704 6707 497e6b 6706->6707 6708 497c9a 26 API calls 6707->6708 6709 497e7d 6708->6709 6709->6659 6715 497e00 6710->6715 6711 499cc1 _free 14 API calls 6712 497e09 6711->6712 6713 498554 ___std_exception_copy 25 API calls 6712->6713 6714 497e14 6713->6714 6714->6659 6715->6711 6715->6714 6717 497cad 6716->6717 6718 497cc8 6717->6718 6720 497cdf 6717->6720 6719 499cc1 _free 14 API calls 6718->6719 6721 497ccd 6719->6721 6723 4968b9 15 API calls 6720->6723 6724 497cd8 6720->6724 6722 498554 ___std_exception_copy 25 API calls 6721->6722 6722->6724 6723->6724 6724->6659 6726 497acf 6725->6726 6727 4968b9 15 API calls 6726->6727 6728 497b0c 6727->6728 6729 49bd3e 49 API calls 6728->6729 6730 497b84 6729->6730 6730->6659 6732 497c9a 26 API calls 6731->6732 6733 497e95 6732->6733 6733->6659 6735 49817a 6734->6735 6736 498126 6734->6736 6737 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6735->6737 6736->6735 6738 49a975 48 API calls 6736->6738 6739 4981aa 6737->6739 6738->6736 6739->6649 6742 494309 RaiseException 6740->6742 6742->6358 6746 493bbb 6743->6746 6754 493b81 6746->6754 6749 4942e9 __CxxThrowException@8 RaiseException 6751 493bda 6749->6751 6752 49192a 6751->6752 6757 4997df 6751->6757 6763 493b31 6754->6763 6758 4997eb std::_Xinvalid_argument 6757->6758 6759 49b0e0 std::_Xinvalid_argument 37 API calls 6758->6759 6762 4997f0 6759->6762 6760 499875 std::_Xinvalid_argument 37 API calls 6761 49981a 6760->6761 6762->6760 6766 494267 6763->6766 6767 493b5d 6766->6767 6768 494274 ___std_exception_copy 6766->6768 6767->6749 6768->6767 6769 4942a1 6768->6769 6772 49981b 6768->6772 6781 4992d0 6769->6781 6773 499836 6772->6773 6774 499828 6772->6774 6775 499cc1 _free 14 API calls 6773->6775 6774->6773 6778 49984d 6774->6778 6780 49983e 6775->6780 6776 498554 ___std_exception_copy 25 API calls 6777 499848 6776->6777 6777->6769 6778->6777 6779 499cc1 _free 14 API calls 6778->6779 6779->6780 6780->6776 6782 499d31 _free 14 API calls 6781->6782 6783 4992e8 6782->6783 6783->6767 6785 4943e0 std::_Xinvalid_argument 6784->6785 6786 49215a GetModuleFileNameW lstrlenW 6785->6786 6787 4921a3 6786->6787 6788 4921aa ExitProcess 6787->6788 6789 4921b2 6787->6789 6790 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6789->6790 6791 491d8c 6790->6791 6792 4924b0 6791->6792 6793 4924cb std::_Xinvalid_argument 6792->6793 6812 491530 6793->6812 6795 49252a std::_Xinvalid_argument 6796 492576 lstrcatW 6795->6796 6797 491480 61 API calls 6796->6797 6798 492599 lstrcatW lstrcatW lstrcatW 6797->6798 6809 4925c3 std::_Xinvalid_argument 6798->6809 6799 4928e0 17 API calls 6799->6809 6800 492af0 7 API calls 6800->6809 6801 491450 50 API calls 6801->6809 6802 492da1 3 API calls 6802->6809 6803 492790 lstrcpyA 6804 4912b0 6 API calls 6803->6804 6804->6809 6805 491480 61 API calls 6805->6809 6806 4927c6 ReleaseMutex CloseHandle 6806->6809 6807 491120 81 API calls 6807->6809 6808 4928c7 Sleep 6808->6809 6809->6799 6809->6800 6809->6801 6809->6802 6809->6803 6809->6805 6809->6806 6809->6807 6809->6808 6810 49283f lstrcatW wsprintfW 6809->6810 6811 492888 CreateProcessW 6809->6811 6810->6809 6811->6808 6813 4916d7 6812->6813 6816 491560 std::_Xinvalid_argument 6812->6816 6814 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6813->6814 6815 4916e4 6814->6815 6815->6795 6817 491450 50 API calls 6816->6817 6818 4915a6 6817->6818 6819 4915fc lstrcatW 6818->6819 6820 491480 61 API calls 6819->6820 6821 491611 lstrcatW lstrlenW 6820->6821 6822 49164a lstrlenW 6821->6822 6823 491626 lstrlenW 6821->6823 6824 491655 6822->6824 6825 491667 lstrlenW 6822->6825 6828 491647 6823->6828 6824->6825 6827 491691 lstrlenW 6825->6827 6829 491674 lstrlenW 6825->6829 6830 49169c 6827->6830 6831 4916b2 lstrcatW lstrcatW 6827->6831 6828->6822 6833 49168e 6829->6833 6830->6831 6831->6813 6833->6827 6847 495470 6848 495482 6847->6848 6849 495490 @_EH4_CallFilterFunc@8 6847->6849 6850 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6848->6850 6850->6849 6851 494110 6862 4940d0 6851->6862 6863 4940ef 6862->6863 6864 4940e2 6862->6864 6865 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6864->6865 6865->6863 6866 492d30 SetServiceStatus 6867 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6866->6867 6868 492d8c 6867->6868 6874 4a5800 6875 492d90 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 6874->6875 6876 4a5811 6875->6876

          Control-flow Graph

          APIs
          • wsprintfW.USER32 ref: 00492212
          • OpenSCManagerW.SECHOST(00000000,00000000,000F003F), ref: 0049222E
          • OpenServiceW.ADVAPI32(00000000,00000000,000F01FF), ref: 00492247
          • CloseServiceHandle.ADVAPI32(00000000), ref: 00492257
          • CloseServiceHandle.ADVAPI32(00000000), ref: 00492264
          • CreateServiceW.ADVAPI32(00000000,00000000,?,000F01FF,?,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 004922A1
          • lstrcpyW.KERNEL32(?,SYSTE), ref: 004922BD
          • lstrlenW.KERNEL32(?), ref: 004922CA
          • lstrcpyW.KERNEL32(?,M\Curr), ref: 004922E1
          • lstrlenW.KERNEL32(?), ref: 004922E8
          • lstrcpyW.KERNEL32(?,entCont), ref: 004922FF
          • lstrlenW.KERNEL32(?), ref: 00492306
          • lstrcpyW.KERNEL32(?,rolSet\), ref: 0049231D
          • lstrlenW.KERNEL32(?), ref: 00492324
          • lstrcpyW.KERNEL32(?,Servi), ref: 0049233B
          • lstrlenW.KERNEL32(?), ref: 00492342
          • lstrcpyW.KERNEL32(?,ces\), ref: 00492359
          • lstrlenW.KERNEL32(?), ref: 00492360
          • lstrcpyW.KERNEL32(?,?), ref: 0049237E
          • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00000002,?), ref: 00492397
          • lstrcpyW.KERNEL32(?,004AC040), ref: 004923B1
          • lstrlenW.KERNEL32(?), ref: 004923C0
          • lstrcpyW.KERNEL32(00000000,004AC048), ref: 004923D1
          • RegSetValueExW.KERNELBASE(?,?,00000000,00000004,?,00000004), ref: 004923F3
          • lstrcpyW.KERNEL32(?,Desc), ref: 00492401
          • lstrlenW.KERNEL32(?), ref: 0049240A
          • lstrcpyW.KERNEL32(?,rip), ref: 0049241D
          • lstrlenW.KERNEL32(?), ref: 0049242A
          • lstrcpyW.KERNEL32(?,tion), ref: 0049243D
          • lstrlenW.KERNEL32(?), ref: 0049244A
          • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,?,00000001), ref: 00492460
          • RegCloseKey.KERNELBASE(?), ref: 0049246D
          • CloseServiceHandle.ADVAPI32(?), ref: 00492485
          • CloseServiceHandle.ADVAPI32(?), ref: 0049249A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrcpy$lstrlen$Service$Close$Handle$Open$Value$CreateManagerwsprintf
          • String ID: "%s" -service$Desc$M\Curr$SYSTE$Servi$ces\$entCont$rip$rolSet\$tion
          • API String ID: 1302190746-3081135776
          • Opcode ID: bf24f7cce1e50ce88070fb1e9c317137ea722caf29fea24ecaf900b2e7027f40
          • Instruction ID: 3cceacb72383bb2eb049c7fc0878346b63a720cf428f9548308c451c3352ebea
          • Opcode Fuzzy Hash: bf24f7cce1e50ce88070fb1e9c317137ea722caf29fea24ecaf900b2e7027f40
          • Instruction Fuzzy Hash: 9771557290522CAFCB10DBA0DD44FDA7BBDEF49301F0500A6F705A3191DB74AA958F98

          Control-flow Graph

          APIs
          • ImpersonateSelf.KERNELBASE(00000002), ref: 00491964
          • GetCurrentThread.KERNEL32 ref: 0049197C
          • OpenThreadToken.ADVAPI32(00000000), ref: 00491983
          • GetLastError.KERNEL32 ref: 0049198D
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 004919AA
          • OpenProcessToken.ADVAPI32(00000000), ref: 004919B3
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 004919C3
          • OpenProcessToken.ADVAPI32(00000000), ref: 004919C6
          • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004919ED
          • LocalAlloc.KERNEL32(00000040,00000014), ref: 00491A05
          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00491A14
          • GetLengthSid.ADVAPI32(00000000), ref: 00491A26
          • LocalAlloc.KERNEL32(00000040,00000010), ref: 00491A32
          • InitializeAcl.ADVAPI32(00000000,00000010,00000002), ref: 00491A42
          • AddAccessAllowedAce.ADVAPI32(00000000,00000002,00000003,00000000), ref: 00491A58
          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 00491A6C
          • SetSecurityDescriptorGroup.ADVAPI32(00000000,00000000,00000000), ref: 00491A7C
          • SetSecurityDescriptorOwner.ADVAPI32(00000000,00000000,00000000), ref: 00491A8C
          • IsValidSecurityDescriptor.ADVAPI32(00000000), ref: 00491A97
          • AccessCheck.ADVAPI32(00000000,?,00000001,00000001,?,00000014,?,00000000), ref: 00491AD7
          • RevertToSelf.KERNELBASE ref: 00491AE1
          • LocalFree.KERNEL32(00000000), ref: 00491AEF
          • LocalFree.KERNEL32(00000000), ref: 00491AF7
          • FreeSid.ADVAPI32(00000000), ref: 00491B07
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: DescriptorSecurity$LocalProcess$CurrentFreeInitializeOpenToken$AccessAllocSelfThread$AllocateAllowedCheckDaclErrorGroupImpersonateLastLengthOwnerRevertValid
          • String ID:
          • API String ID: 897049590-0
          • Opcode ID: 3bc0e8f9cdd8c72f0e724855255cbb110ac131844420f00f8f644bba313b73d3
          • Instruction ID: fec36ffe7706dbf05d09ce1652524ee4c47dd18af18c7262daa56e268468f881
          • Opcode Fuzzy Hash: 3bc0e8f9cdd8c72f0e724855255cbb110ac131844420f00f8f644bba313b73d3
          • Instruction Fuzzy Hash: 01515F71A4120AABEF11DFA1DD49FAF7FBCAF05740F054025F601E62A0DBB89D458B68

          Control-flow Graph

          APIs
          • GetCurrentProcessId.KERNEL32 ref: 00491ED1
          • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 00491EDF
          • GetUserNameA.ADVAPI32(?,?), ref: 00491EF3
          • lstrcatA.KERNEL32(?,Unknown), ref: 00491F09
            • Part of subcall function 004916F0: ReleaseMutex.KERNEL32(?,63EBF37A,00000000,00000000,004A5800,000000FF,?,00492073), ref: 00491727
            • Part of subcall function 004916F0: CloseHandle.KERNEL32(?,?,00492073), ref: 00491733
          • lstrcpyA.KERNEL32(00000000,?), ref: 00491F60
          • ReleaseMutex.KERNEL32(?), ref: 00491F80
          • CloseHandle.KERNEL32(?), ref: 00491F8C
          • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 00491FA1
          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00491FD1
          • WinExec.KERNEL32(?,00000000), ref: 0049202B
          • WinExec.KERNEL32(?,00000000), ref: 00492059
          • GetCurrentProcessId.KERNEL32 ref: 00492073
            • Part of subcall function 00491DA0: CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,00000000,00000000,00000000), ref: 00491DDF
            • Part of subcall function 00491DA0: Process32First.KERNEL32(00000000,?), ref: 00491DED
            • Part of subcall function 00491DA0: OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00491E10
            • Part of subcall function 00491DA0: TerminateProcess.KERNEL32(00000000,00000000), ref: 00491E1D
            • Part of subcall function 00491DA0: Process32Next.KERNEL32(00000000,?), ref: 00491E40
            • Part of subcall function 00491DA0: CloseHandle.KERNEL32(00000000), ref: 00491E47
          • ExitProcess.KERNEL32 ref: 00492082
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Process$CloseHandleMutex$CreateCurrentExecNameProcess32Release$ExitFileFirstModuleNextOpenSessionSnapshotTerminateToolhelp32Userlstrcatlstrcpy
          • String ID: %sResideVirtual%d$TabletPCInputServices$Unknown$schtasks /create /tn "%s" /tr "%s" /sc minute /mo %d /f$schtasks /create /tn "%s" /tr "%s" /sc minute /mo %d /ru system /f$schtasks /run /tn "%s"
          • API String ID: 749260584-984207080
          • Opcode ID: 58cf3f2e19dcd830df8c48d95cf52b3e109ea32f1e6f5d63a688aadf2e26ae5c
          • Instruction ID: c5e2958a9c6c2f350d9d18eb8f9f819d2de1da44193f051f2d5fdee2f8e93d67
          • Opcode Fuzzy Hash: 58cf3f2e19dcd830df8c48d95cf52b3e109ea32f1e6f5d63a688aadf2e26ae5c
          • Instruction Fuzzy Hash: BC41B7B1A45318ABDF20DB60DC4AFDA7B7CAB15704F0401A6F645E71C1DBB46AC48F58

          Control-flow Graph

          APIs
            • Part of subcall function 00491E90: GetCurrentProcessId.KERNEL32 ref: 00491ED1
            • Part of subcall function 00491E90: ProcessIdToSessionId.KERNEL32(00000000,?), ref: 00491EDF
            • Part of subcall function 00491E90: GetUserNameA.ADVAPI32(?,?), ref: 00491EF3
            • Part of subcall function 00491E90: lstrcatA.KERNEL32(?,Unknown), ref: 00491F09
            • Part of subcall function 00491E90: lstrcpyA.KERNEL32(00000000,?), ref: 00491F60
            • Part of subcall function 00491E90: ReleaseMutex.KERNEL32(?), ref: 00491F80
            • Part of subcall function 00491E90: CloseHandle.KERNEL32(?), ref: 00491F8C
            • Part of subcall function 00491E90: CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 00491FA1
            • Part of subcall function 00491E90: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00491FD1
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,63EBF37A,00000000,00000000), ref: 00491B97
          • ExitProcess.KERNEL32 ref: 00491D15
          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000001,?,?,00000000), ref: 00491D2B
          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00000000), ref: 00491D3B
          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00000000), ref: 00491D4C
          • CloseServiceHandle.ADVAPI32(00000000,?,?,00000000), ref: 00491D59
          • CloseServiceHandle.ADVAPI32(00000000,?,?,00000000), ref: 00491D60
          • ExitProcess.KERNEL32 ref: 00491D71
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ProcessService$CloseHandleName$ExitFileModuleMutexOpen$CreateCurrentManagerReleaseSessionStartUserlstrcatlstrcpy
          • String ID:
          • API String ID: 3235917964-0
          • Opcode ID: d954af59d113911bd63d34cf69684cd3411cf3a678d2f1ea90165afd29f66002
          • Instruction ID: 0a83df48254017662a87b9194f1a81ff3f91bc0af9b80274ff92e1d14f61b026
          • Opcode Fuzzy Hash: d954af59d113911bd63d34cf69684cd3411cf3a678d2f1ea90165afd29f66002
          • Instruction Fuzzy Hash: A851E3759002199BDF24DB24DC8DBDEBB75EF45304F1442ADE909A72A0DB786B80CF58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 114 4912b0-4912be 115 4912c0-4912cd ReleaseMutex CloseHandle 114->115 116 4912d3-4912f0 CreateMutexA 114->116 115->116 117 491308-491310 116->117 118 4912f2-491305 GetLastError 116->118 119 491312-49131f ReleaseMutex CloseHandle 117->119 120 491325-491333 117->120 118->117 119->120
          APIs
          • ReleaseMutex.KERNEL32(?,00000000,00000000,00491F6D), ref: 004912C1
          • CloseHandle.KERNEL32(?), ref: 004912CD
          • CreateMutexA.KERNELBASE(00000000,00000001,00000000,00000000,00000000,00491F6D), ref: 004912E2
          • GetLastError.KERNEL32 ref: 004912F2
          • ReleaseMutex.KERNEL32(?), ref: 00491313
          • CloseHandle.KERNEL32(?), ref: 0049131F
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Mutex$CloseHandleRelease$CreateErrorLast
          • String ID:
          • API String ID: 299056699-0
          • Opcode ID: b7d1e7709a75df8677032a7ed35025e8b8889b47130df195982de1a9b0ed2439
          • Instruction ID: ef52d2d5ff5c405c3d86134ed958ea3a43db5591ecccc79fe7139aa6840eb6c0
          • Opcode Fuzzy Hash: b7d1e7709a75df8677032a7ed35025e8b8889b47130df195982de1a9b0ed2439
          • Instruction Fuzzy Hash: DAF04FB1604B119BDB219F70EC5C7C37EA4BB19301F044939F59BC22A0C7B59880CB68

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 121 4913d0-4913ff call 491000 124 49140c-49140f 121->124 125 491401-491408 call 491930 121->125 126 491411-491421 lstrcmpW 124->126 127 491430-49143f call 492d90 124->127 135 49140a-491440 call 491b20 125->135 136 491445-49144a call 491d80 125->136 129 491428-49142a ExitProcess 126->129 130 491423 call 492b40 126->130 130->129 135->136
          APIs
          • lstrcmpW.KERNEL32(?,-service), ref: 00491419
          • ExitProcess.KERNEL32 ref: 0049142A
            • Part of subcall function 00491930: ImpersonateSelf.KERNELBASE(00000002), ref: 00491964
            • Part of subcall function 00491930: GetCurrentThread.KERNEL32 ref: 0049197C
            • Part of subcall function 00491930: OpenThreadToken.ADVAPI32(00000000), ref: 00491983
            • Part of subcall function 00491930: GetLastError.KERNEL32 ref: 0049198D
            • Part of subcall function 00491930: GetCurrentProcess.KERNEL32(00000008,?), ref: 004919AA
            • Part of subcall function 00491930: OpenProcessToken.ADVAPI32(00000000), ref: 004919B3
            • Part of subcall function 00491930: GetCurrentProcess.KERNEL32(00000008,?), ref: 004919C3
            • Part of subcall function 00491930: OpenProcessToken.ADVAPI32(00000000), ref: 004919C6
            • Part of subcall function 00491930: AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004919ED
            • Part of subcall function 00491930: LocalAlloc.KERNEL32(00000040,00000014), ref: 00491A05
            • Part of subcall function 00491930: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00491A14
            • Part of subcall function 00491930: GetLengthSid.ADVAPI32(00000000), ref: 00491A26
            • Part of subcall function 00491930: LocalAlloc.KERNEL32(00000040,00000010), ref: 00491A32
            • Part of subcall function 00491930: InitializeAcl.ADVAPI32(00000000,00000010,00000002), ref: 00491A42
            • Part of subcall function 00491930: AddAccessAllowedAce.ADVAPI32(00000000,00000002,00000003,00000000), ref: 00491A58
            • Part of subcall function 00491B20: GetModuleFileNameW.KERNEL32(00000000,?,00000104,63EBF37A,00000000,00000000), ref: 00491B97
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Process$CurrentInitializeOpenToken$AllocLocalThread$AccessAllocateAllowedDescriptorErrorExitFileImpersonateLastLengthModuleNameSecuritySelflstrcmp
          • String ID: -service
          • API String ID: 2077529461-2074144066
          • Opcode ID: b51ae6db1ab88941767d291077cbd663d0132d0fa5c25d62052e254ca2bba06c
          • Instruction ID: 503aded75bca2879fa99beb45a6a11860081647b3a0bbb5b21bd98308d49ee1d
          • Opcode Fuzzy Hash: b51ae6db1ab88941767d291077cbd663d0132d0fa5c25d62052e254ca2bba06c
          • Instruction Fuzzy Hash: F7F0F930D04106A6CF10BF7699027BEBFA49F19318F11427FF90463261EA286990829E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 461 491da0-491df5 call 4943e0 CreateToolhelp32Snapshot Process32First 464 491df7-491dfd 461->464 465 491e46-491e63 CloseHandle call 492d90 461->465 467 491e00-491e06 464->467 469 491e08-491e18 OpenProcess 467->469 470 491e2b-491e2f 467->470 471 491e1a-491e25 TerminateProcess 469->471 472 491e64-491e81 CloseHandle call 492d90 469->472 473 491e3a-491e44 Process32Next 470->473 474 491e31-491e38 call 491da0 470->474 471->472 476 491e27 471->476 473->465 473->467 474->472 474->473 476->470
          APIs
          • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,00000000,00000000,00000000), ref: 00491DDF
          • Process32First.KERNEL32(00000000,?), ref: 00491DED
          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00491E10
          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00491E1D
          • Process32Next.KERNEL32(00000000,?), ref: 00491E40
          • CloseHandle.KERNEL32(00000000), ref: 00491E47
          • CloseHandle.KERNEL32(00000000), ref: 00491E65
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
          • String ID:
          • API String ID: 2696918072-0
          • Opcode ID: ab9da6b530e0361f058e4a3a2c805af1d98300b09b231a9ecff0a39087a49c40
          • Instruction ID: 89a31b4b17e2b7eeb363f531c70724ee5c2f17b1021540201aa2ac1f7be39cc9
          • Opcode Fuzzy Hash: ab9da6b530e0361f058e4a3a2c805af1d98300b09b231a9ecff0a39087a49c40
          • Instruction Fuzzy Hash: 5721C9312043016BDF20DF20EC85BBB7FE8EB86755F44053EF959862D0DB24AC45C69A
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: __floor_pentium4
          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
          • API String ID: 4168288129-2761157908
          • Opcode ID: 050711ce4ab4b710cfc13db98717e3e335e27fc502a1cbb758b0c6313d1a4e43
          • Instruction ID: eec9e11f73ea0f532335c2293dbfcba82caf1f48810a97a08446b7b896517e5d
          • Opcode Fuzzy Hash: 050711ce4ab4b710cfc13db98717e3e335e27fc502a1cbb758b0c6313d1a4e43
          • Instruction Fuzzy Hash: F8D22972E082288FDB65CE28DD407EAB7B5EB5A305F1445EBD40DE7240E778AE818F45
          APIs
          • lstrlenW.KERNEL32(?,00000000), ref: 00492A17
          • lstrcatW.KERNEL32(?,?), ref: 00492A6D
          • lstrlenW.KERNEL32(?), ref: 00492A7B
          • FindFirstFileW.KERNEL32(?,?), ref: 00492AB7
          • FindClose.KERNEL32(00000000), ref: 00492AC7
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Findlstrlen$CloseFileFirstlstrcat
          • String ID:
          • API String ID: 2221514933-0
          • Opcode ID: abe7df52ea9b1521c97142ffc4d7f121de1c56d7703a879be4930906bfe6ca02
          • Instruction ID: 1ea456282f75d4d4a50b0732ab9ca5d07de2a4bf5e75e2802d0dd6adc08f6ed5
          • Opcode Fuzzy Hash: abe7df52ea9b1521c97142ffc4d7f121de1c56d7703a879be4930906bfe6ca02
          • Instruction Fuzzy Hash: C621F732405714ABCB30DB60EC4D6AB7BE8EF46315F10493BE559C7191D6749884879E
          APIs
          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 004984A0
          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 004984AA
          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 004984B7
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled$DebuggerPresent
          • String ID:
          • API String ID: 3906539128-0
          • Opcode ID: 2d2918df46587f12f8ec280c3e3d88229ecdabe9bdfd986e7966d11adb5dcd80
          • Instruction ID: 91c3a47256fc2a7740196e01d447b83aeb7f7ad377f99ac529594ceed697d9f6
          • Opcode Fuzzy Hash: 2d2918df46587f12f8ec280c3e3d88229ecdabe9bdfd986e7966d11adb5dcd80
          • Instruction Fuzzy Hash: 9B31E774901228ABCF61DF29D889BCDBBB4BF08314F5041EAE41CA7251EB749F818F48
          APIs
          • GetCurrentProcess.KERNEL32(00000000,?,0049901B,?,?,00000000,?), ref: 0049903E
          • TerminateProcess.KERNEL32(00000000,?,0049901B,?,?,00000000,?), ref: 00499045
          • ExitProcess.KERNEL32 ref: 00499057
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Process$CurrentExitTerminate
          • String ID:
          • API String ID: 1703294689-0
          • Opcode ID: ade01d4074f65352cd41944da87a153c09eac26d82b5d4c5cbd506beced1e646
          • Instruction ID: bbdcfae18d928a607c7d218b009d4715343a18686b915a85242801087cfdf0a6
          • Opcode Fuzzy Hash: ade01d4074f65352cd41944da87a153c09eac26d82b5d4c5cbd506beced1e646
          • Instruction Fuzzy Hash: 29E04F31004104ABCF11AF59CC08A093F29FB41341B094439F41986132CB3ADD82CB48
          APIs
          • StartServiceCtrlDispatcherW.ADVAPI32(?), ref: 00492B70
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CtrlDispatcherServiceStart
          • String ID: TestWrite
          • API String ID: 3789849863-1711770924
          • Opcode ID: 5829eab2a07bb3311af46094caf5edbb2fed385b8159fbf296b5c857167248a9
          • Instruction ID: bd0e075842981ca8d318d38315b977274b150aeab29d3cf4f9e83d0187c8aa76
          • Opcode Fuzzy Hash: 5829eab2a07bb3311af46094caf5edbb2fed385b8159fbf296b5c857167248a9
          • Instruction Fuzzy Hash: C9E01AB490521CABDB00DF95D64979EBBF4EB04308F5145AAD80567241DBB45A088BA9
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1bc668b8b44d7bfb338e1b0398f39d33e802b05a49133743f99c14bb2fa942e4
          • Instruction ID: e8b31ef7fb8299c78e6ba93b5f12cc9675ac2a0181b3712f51a9d8415e18d4dd
          • Opcode Fuzzy Hash: 1bc668b8b44d7bfb338e1b0398f39d33e802b05a49133743f99c14bb2fa942e4
          • Instruction Fuzzy Hash: 91F15C71E002199FDF14CFA8C9806AEBBB1FF99314F15826AE819EB344D735AD05CB94
          APIs
          • FindFirstFileW.KERNEL32(?,?,00000000), ref: 00492B13
          • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00492B21
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Find$CloseFileFirst
          • String ID:
          • API String ID: 2295610775-0
          • Opcode ID: 175bd04492e448e786967119c5a0c22e79e8e805826b7d4ab4733b4f542dbb34
          • Instruction ID: 26890a62fb72ee08edffb08f4efe489053f2087684d6d50beaf36577ce9cbb23
          • Opcode Fuzzy Hash: 175bd04492e448e786967119c5a0c22e79e8e805826b7d4ab4733b4f542dbb34
          • Instruction Fuzzy Hash: 86E09B711456005FC2209F349C495677BDCD745225F154B26A879822D0E9329454C69E
          APIs
          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004A4B1D,?,?,00000008,?,?,004A47B5,00000000), ref: 004A4D4F
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ExceptionRaise
          • String ID:
          • API String ID: 3997070919-0
          • Opcode ID: ca1bfd8f5b16a5cf1605ee7462efcb9cdce2fbe1fc89b39bf8dd9ef06a73451c
          • Instruction ID: c505204baa11a8d92db12e682bae653b96079628709ce1b73040061f6f7ada61
          • Opcode Fuzzy Hash: ca1bfd8f5b16a5cf1605ee7462efcb9cdce2fbe1fc89b39bf8dd9ef06a73451c
          • Instruction Fuzzy Hash: 98B15C31610608CFD715CF28C486B697BE0FF96364F258659E89ACF3A1C379E992CB44
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 63ea2712ae36f081eda2fdf5608d15ceaf206ca272076bf4c91352699f705b27
          • Instruction ID: 69843d7b2e5b2a52cfbd96aa59e7c6b7ef5214978e11b6c73de4c5d23b07f3c1
          • Opcode Fuzzy Hash: 63ea2712ae36f081eda2fdf5608d15ceaf206ca272076bf4c91352699f705b27
          • Instruction Fuzzy Hash: E351887023CA48AADF784A2C89957BF7F999B42328F14043FD446D7782DA1DAD05835E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: b6c8fd394a4385cb96eeb6526d220197f9bec5e84873b0840d057cbb14610335
          • Instruction ID: 85b55d94c9e5d2889ef3037893e967a4493f36868e92552a9fbad138852708f7
          • Opcode Fuzzy Hash: b6c8fd394a4385cb96eeb6526d220197f9bec5e84873b0840d057cbb14610335
          • Instruction Fuzzy Hash: EA5157B023C64856EF38E668889E7BFAF89AF41304F18447FD48297391D61DAD09C35E
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 076e0986a98fb2ad234cad95280b139f447e79507e3d91f2dd07534dc7d90bcc
          • Instruction ID: c14546761345f765ff6188ea972120d8f2c8d033059d99a1c5843b2a17c4d3cb
          • Opcode Fuzzy Hash: 076e0986a98fb2ad234cad95280b139f447e79507e3d91f2dd07534dc7d90bcc
          • Instruction Fuzzy Hash: 8721B673F2043947770CC47E8C522BDB6E1C68C501745823AF8A6EA2C1D968D917E2E4
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: efb20f6fc4f47de5524259f71d583fac7a523cd9d1a8d05841d1eef5c2ea2454
          • Instruction ID: 0321b4f9d93e55f2eb3e485f3079aafb0afc0b0d00bfae5744a8474a29605747
          • Opcode Fuzzy Hash: efb20f6fc4f47de5524259f71d583fac7a523cd9d1a8d05841d1eef5c2ea2454
          • Instruction Fuzzy Hash: 9D11A723F30C255A675C81698C1327A95D2EBD824031F533AD826E7284E8A4DF13D290
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1b9aa229c6464817f707d15d796411dac954e5f630b2d955eccaff9382012813
          • Instruction ID: 5570a56e907c5c527aa284e7a59509f6a24fdd060102c3d1815ca3904b994733
          • Opcode Fuzzy Hash: 1b9aa229c6464817f707d15d796411dac954e5f630b2d955eccaff9382012813
          • Instruction Fuzzy Hash: 2CE04632911228EBCB24EB8A8904A8AFBACEB44B14B5104ABB511D3601C274DE00CBD4

          Control-flow Graph

          APIs
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,00000000), ref: 0049216B
          • lstrlenW.KERNEL32(?), ref: 00492178
          • SHSetValueW.SHLWAPI(80000001,006F0053,TabletPCInputServices,00000001,?,00000000), ref: 0049219D
          • ExitProcess.KERNEL32 ref: 004921AC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ExitFileModuleNameProcessValuelstrlen
          • String ID: @rt$R$S$TabletPCInputServices$V$\$d$f$f$i$i$i$n$n$r$r$r$r$s$u$w$w
          • API String ID: 2356826538-729126582
          • Opcode ID: b516c702de16d20d13c2c725dcbc0128b718e44e3412b19cf0b064590ecacadc
          • Instruction ID: 60e2c49e4ae5ab80d7751187d480cad084f087e3448e5c3055edf5ddd53db33d
          • Opcode Fuzzy Hash: b516c702de16d20d13c2c725dcbc0128b718e44e3412b19cf0b064590ecacadc
          • Instruction Fuzzy Hash: 5031E8B090021CEEEB10CF91E949BEDBFB5EB05748F104129A6156A291D7B64688CFA4

          Control-flow Graph

          APIs
            • Part of subcall function 00491530: lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
            • Part of subcall function 00491530: lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 00492590
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925A1
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925B1
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925C1
            • Part of subcall function 004928E0: lstrcatW.KERNEL32(?,?,7595F770,?), ref: 00492916
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(?), ref: 0049292B
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(0000002F), ref: 0049294F
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(?), ref: 0049295C
            • Part of subcall function 004928E0: SHCreateDirectoryExW.SHELL32(00000000,?,00000000), ref: 004929B4
            • Part of subcall function 004928E0: GetLastError.KERNEL32 ref: 004929BF
            • Part of subcall function 00492AF0: FindFirstFileW.KERNEL32(?,?,00000000), ref: 00492B13
            • Part of subcall function 00492AF0: FindClose.KERNEL32(00000000,?,?,00000000), ref: 00492B21
          • lstrcpyA.KERNEL32(00000000,?), ref: 004927A5
          • ReleaseMutex.KERNEL32(?), ref: 004927C7
          • CloseHandle.KERNEL32(?), ref: 004927D3
          • lstrcatW.KERNEL32(?,?), ref: 00492853
          • wsprintfW.USER32 ref: 00492873
          • CreateProcessW.KERNEL32(?,?,00000001,00000001,00000001,00000001,00000001,00000001,?,?), ref: 004928C1
          • Sleep.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004928D2
          Strings
          • Function exe : %S exe size : %u dll : %S dll size : %u, xrefs: 0049270E
          • NetWork exe : %S exe size : %u dll : %S dll size : %u, xrefs: 0049264F
          • "%s" %S, xrefs: 0049286D
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrcat$lstrlen$CloseCreateFind$DirectoryErrorFileFirstHandleLastMutexProcessReleaseSleeplstrcpywsprintf
          • String ID: "%s" %S$Function exe : %S exe size : %u dll : %S dll size : %u$NetWork exe : %S exe size : %u dll : %S dll size : %u
          • API String ID: 1787968544-1339826144
          • Opcode ID: e699b334411b896df028221fa484c9ce4f91697672d7cebd137caca4d2f5236c
          • Instruction ID: 978ddc93b5e99c96478a903f32f8369831daf6b2a44a5fc7bda5ed681d522383
          • Opcode Fuzzy Hash: e699b334411b896df028221fa484c9ce4f91697672d7cebd137caca4d2f5236c
          • Instruction Fuzzy Hash: 86B12171900219ABDF30EB61CD45FDA7BBCAF49348F0401EAB609A7191DB746B85CF58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 231 491480-4914b4 232 4914b7-4914c0 231->232 232->232 233 4914c2-4914df call 4917d0 232->233 236 4914e1-4914f4 233->236 237 491510-491523 call 492d90 233->237 238 491506-49150d call 492dd1 236->238 239 4914f6-491504 236->239 238->237 239->238 241 491524-49155a call 498564 239->241 248 491560-491624 call 4943e0 * 2 call 491450 call 4911f0 * 2 call 491000 lstrcatW call 491480 lstrcatW lstrlenW 241->248 249 4916d7-4916e7 call 492d90 241->249 266 49164a-491653 lstrlenW 248->266 267 491626-491629 248->267 268 491655-49165a 266->268 269 491667-491672 lstrlenW 266->269 270 491630-491635 267->270 268->269 273 49165c-491665 268->273 274 491691-49169a lstrlenW 269->274 275 491674 269->275 271 49163b-491645 lstrlenW 270->271 272 491637 270->272 271->270 276 491647 271->276 272->271 273->268 273->269 278 49169c 274->278 279 4916b2-4916d6 lstrcatW * 2 274->279 277 491677-49167c 275->277 276->266 280 49167e 277->280 281 491682-49168c lstrlenW 277->281 282 4916a0-4916a5 278->282 279->249 280->281 281->277 283 49168e 281->283 282->279 284 4916a7-4916b0 282->284 283->274 284->279 284->282
          APIs
          • lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491684
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491692
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 004916C2
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,006B1FF8,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?), ref: 004916CC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$lstrcat
          • String ID: /%$$ASJG943P9TGEAGAGP$SHOIOJGA094953-$askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
          • API String ID: 493641738-1664939733
          • Opcode ID: a8d2572f8fd157a0467df45bb091da27454174081d039cfa1dae71fad27b1cf6
          • Instruction ID: 537a477a7d8768b4a8f2df014eee6bede5d2e4bb6e43d21df6334e25e0ddf682
          • Opcode Fuzzy Hash: a8d2572f8fd157a0467df45bb091da27454174081d039cfa1dae71fad27b1cf6
          • Instruction Fuzzy Hash: 2361F670600205AFCB20DF29DD85BAFBBF5EF85304F04852EE546972A1DB78AD41CB99

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 285 491530-49155a 286 491560-491624 call 4943e0 * 2 call 491450 call 4911f0 * 2 call 491000 lstrcatW call 491480 lstrcatW lstrlenW 285->286 287 4916d7-4916e7 call 492d90 285->287 304 49164a-491653 lstrlenW 286->304 305 491626-491629 286->305 306 491655-49165a 304->306 307 491667-491672 lstrlenW 304->307 308 491630-491635 305->308 306->307 311 49165c-491665 306->311 312 491691-49169a lstrlenW 307->312 313 491674 307->313 309 49163b-491645 lstrlenW 308->309 310 491637 308->310 309->308 314 491647 309->314 310->309 311->306 311->307 316 49169c 312->316 317 4916b2-4916d6 lstrcatW * 2 312->317 315 491677-49167c 313->315 314->304 318 49167e 315->318 319 491682-49168c lstrlenW 315->319 320 4916a0-4916a5 316->320 317->287 318->319 319->315 321 49168e 319->321 320->317 322 4916a7-4916b0 320->322 321->312 322->317 322->320
          APIs
          • lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491684
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491692
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 004916C2
          • lstrcatW.KERNEL32(?,006B1FF8,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?), ref: 004916CC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$lstrcat
          • String ID: /%$$ASJG943P9TGEAGAGP$SHOIOJGA094953-$askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
          • API String ID: 493641738-1664939733
          • Opcode ID: 75c905cb566b79080cb020569c30e038d5dba22884149851e4b86ceacd9866b4
          • Instruction ID: 53908bf14a11770d340f0550d9eae5510cbcf3eff139a46ca88e6dd4b6a6360e
          • Opcode Fuzzy Hash: 75c905cb566b79080cb020569c30e038d5dba22884149851e4b86ceacd9866b4
          • Instruction Fuzzy Hash: 8A51D470900215AFCB20DF65DD85BABBFF8EF45304F04852EE542A72A1D778AD41C798

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 323 49df60-49df74 324 49dfe2-49dfea 323->324 325 49df76-49df7b 323->325 326 49dfec-49dfef 324->326 327 49e031-49e049 call 49e0d1 324->327 325->324 328 49df7d-49df82 325->328 326->327 329 49dff1-49e02e call 499d31 * 4 326->329 335 49e04c-49e053 327->335 328->324 331 49df84-49df87 328->331 329->327 331->324 334 49df89-49df91 331->334 336 49dfab-49dfb3 334->336 337 49df93-49df96 334->337 339 49e072-49e076 335->339 340 49e055-49e059 335->340 342 49dfcd-49dfe1 call 499d31 * 2 336->342 343 49dfb5-49dfb8 336->343 337->336 341 49df98-49dfaa call 499d31 call 49db19 337->341 350 49e078-49e07d 339->350 351 49e08e-49e09a 339->351 345 49e05b-49e05e 340->345 346 49e06f 340->346 341->336 342->324 343->342 348 49dfba-49dfcc call 499d31 call 49dc17 343->348 345->346 354 49e060-49e06e call 499d31 * 2 345->354 346->339 348->342 358 49e08b 350->358 359 49e07f-49e082 350->359 351->335 353 49e09c-49e0a7 call 499d31 351->353 354->346 358->351 359->358 367 49e084-49e08a call 499d31 359->367 367->358
          APIs
          • ___free_lconv_mon.LIBCMT ref: 0049DFA4
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB36
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB48
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB5A
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB6C
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB7E
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB90
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBA2
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBB4
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBC6
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBD8
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBEA
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBFC
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DC0E
          • _free.LIBCMT ref: 0049DF99
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DFBB
          • _free.LIBCMT ref: 0049DFD0
          • _free.LIBCMT ref: 0049DFDB
          • _free.LIBCMT ref: 0049DFFD
          • _free.LIBCMT ref: 0049E010
          • _free.LIBCMT ref: 0049E01E
          • _free.LIBCMT ref: 0049E029
          • _free.LIBCMT ref: 0049E061
          • _free.LIBCMT ref: 0049E068
          • _free.LIBCMT ref: 0049E085
          • _free.LIBCMT ref: 0049E09D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
          • String ID: J
          • API String ID: 161543041-2157922337
          • Opcode ID: d1277a13de082da91929ca57ecbbfccbf60eaf1c4f8dd8c92cb920cc87748433
          • Instruction ID: eb586024dd964233a58823a3a268cc559cc2def3b6b0fa563b3df1a4a0a16598
          • Opcode Fuzzy Hash: d1277a13de082da91929ca57ecbbfccbf60eaf1c4f8dd8c92cb920cc87748433
          • Instruction Fuzzy Hash: 1F314F316002019FEF21AA7AD886B5B7BE8AF00359F14493FE455D7295DB7DEC818B28

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 380 491120-49115e CreateFileW 381 4911b0-4911c2 GetLastError call 4910e0 380->381 382 491160-491195 SetFilePointerEx WriteFile 380->382 390 4911c5-4911ea CloseHandle Sleep call 492d90 381->390 384 4911a1-4911ae call 4910e0 382->384 385 491197-49119b 382->385 384->390 385->384 388 49119d-49119f 385->388 388->390
          APIs
          • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000004,00000000,00000000,7595F770,?,?,?,00492676,?,?,?), ref: 00491153
          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000,?,?,00492676,?,?,?), ref: 00491176
          • WriteFile.KERNEL32(00000000,?,v&I,?,00000000,?,?,00492676,?,?,?), ref: 0049118C
          • GetLastError.KERNEL32(?,?,?,00492676,?,?,?,?,?,?,?,?,?,?,?,00000300), ref: 004911B1
          • CloseHandle.KERNEL32(00000000,?,?,?,?,00492676,?,?,?), ref: 004911C6
          • Sleep.KERNEL32(000001F4,?,?,?,?,00492676,?,?,?), ref: 004911D1
          Strings
          • (TRUE == bRet) && (dWriteNumber == config_size) , xrefs: 004911A1
          • v&I, xrefs: 0049117C, 00491186
          • INVALID_HANDLE_VALUE != hFile errorcode : %d file: %S, xrefs: 004911B8
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: File$CloseCreateErrorHandleLastPointerSleepWrite
          • String ID: (TRUE == bRet) && (dWriteNumber == config_size) $INVALID_HANDLE_VALUE != hFile errorcode : %d file: %S$v&I
          • API String ID: 284182958-178700489
          • Opcode ID: 64b26dd76e0f5379aba950c1fe095ae93655682b7ec3c63059c4330225e9aca9
          • Instruction ID: 8f23c5a3c57e93db051efbbeb2e5b8b1c599e462cfaeb94006c70ac95142d0df
          • Opcode Fuzzy Hash: 64b26dd76e0f5379aba950c1fe095ae93655682b7ec3c63059c4330225e9aca9
          • Instruction Fuzzy Hash: F3212432684301BBDA10DF609C0AF5B7FA8EF8A720F14062BFA51921E1D774944587DE

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 393 4928e0-49292f call 4943e0 lstrcatW lstrlenW 396 492931 393->396 397 492955-492960 lstrlenW 393->397 400 492934-49293d 396->400 398 49298a-49299a 397->398 399 492962 397->399 402 4929a0 call 4929f0 398->402 401 492965-49296e 399->401 403 49293f 400->403 404 492947-492953 lstrlenW 400->404 401->398 405 492970-492976 401->405 406 4929a5-4929a7 402->406 403->404 404->397 404->400 407 492978-492988 405->407 408 4929e1-4929e6 call 492f00 405->408 409 4929a9-4929ca SHCreateDirectoryExW GetLastError 406->409 410 4929cc 406->410 407->398 407->401 409->410 411 4929ce-4929e0 call 492d90 409->411 410->411
          APIs
          • lstrcatW.KERNEL32(?,?,7595F770,?), ref: 00492916
          • lstrlenW.KERNEL32(?), ref: 0049292B
          • lstrlenW.KERNEL32(0000002F), ref: 0049294F
          • lstrlenW.KERNEL32(?), ref: 0049295C
          • SHCreateDirectoryExW.SHELL32(00000000,?,00000000), ref: 004929B4
          • GetLastError.KERNEL32 ref: 004929BF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$CreateDirectoryErrorLastlstrcat
          • String ID: \
          • API String ID: 1382740711-2967466578
          • Opcode ID: 10e0f0b9bfaf3d51149ec605bd32471ad2766b34d09cf6ffc7a4c3bd7eae0d33
          • Instruction ID: eb1dd0ec6a56bdc6a16ebaca415e2a6d5aa760368d12754cc0dd6f4a0bd7589d
          • Opcode Fuzzy Hash: 10e0f0b9bfaf3d51149ec605bd32471ad2766b34d09cf6ffc7a4c3bd7eae0d33
          • Instruction Fuzzy Hash: D721D6B1A0131CAACF20DB61DD4CBEB7F68EF01304F1186BAE91993141E7B89E448F94

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 416 494110-494155 call 4940d0 call 49537c 421 494157-494169 416->421 422 4941b6-4941b9 416->422 423 4941d9-4941e2 421->423 425 49416b 421->425 422->423 424 4941bb-4941c8 call 495530 422->424 428 4941cd-4941d6 call 4940d0 424->428 427 494170-494187 425->427 429 494189-494197 call 4954e0 427->429 430 49419d 427->430 428->423 438 494199 429->438 439 4941ad-4941b4 429->439 433 4941a0-4941a5 430->433 433->427 434 4941a7-4941a9 433->434 434->423 437 4941ab 434->437 437->428 440 49419b 438->440 441 4941e3-4941ec 438->441 439->428 440->433 442 4941ee-4941f5 441->442 443 494226-494236 call 495514 441->443 442->443 445 4941f7-494206 call 4a5140 442->445 448 494238-494247 call 495530 443->448 449 49424a-494266 call 4940d0 call 4954f8 443->449 453 494208-494220 445->453 454 494223 445->454 448->449 453->454 454->443
          APIs
          • _ValidateLocalCookies.LIBCMT ref: 0049413B
          • ___except_validate_context_record.LIBVCRUNTIME ref: 00494143
          • _ValidateLocalCookies.LIBCMT ref: 004941D1
          • __IsNonwritableInCurrentImage.LIBCMT ref: 004941FC
          • _ValidateLocalCookies.LIBCMT ref: 00494251
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
          • String ID: csm
          • API String ID: 1170836740-1018135373
          • Opcode ID: f7a3e57d5f633a1c0618d8346cf0893e0e84aa6a1b94c82747fe3ea4f2c83c95
          • Instruction ID: 2e0e896b00721ce58a5de16ce711141b8c7ecd5391cce2bed5df2f8c33e95adc
          • Opcode Fuzzy Hash: f7a3e57d5f633a1c0618d8346cf0893e0e84aa6a1b94c82747fe3ea4f2c83c95
          • Instruction Fuzzy Hash: 7F41F534A002089BCF10DF69C849E9E7FB1AF95328F14817BE8145B392D739D956CB99
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID: api-ms-$ext-ms-
          • API String ID: 0-537541572
          • Opcode ID: 25dac25b284b70273728739754db045336454ef3bc38b9ad438a51e46d58cc2b
          • Instruction ID: e7ba4160d83b0256485b359bc08f81c96f7d92a38c5635af6a8a54c988ae9fe0
          • Opcode Fuzzy Hash: 25dac25b284b70273728739754db045336454ef3bc38b9ad438a51e46d58cc2b
          • Instruction Fuzzy Hash: D521C631E01220ABCF21CA6D8C40B1B3F58AB52BA0F25053EED16A73D1D638ED0186E9
          APIs
            • Part of subcall function 0049DC80: _free.LIBCMT ref: 0049DCA5
          • _free.LIBCMT ref: 0049DD06
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DD11
          • _free.LIBCMT ref: 0049DD1C
          • _free.LIBCMT ref: 0049DD70
          • _free.LIBCMT ref: 0049DD7B
          • _free.LIBCMT ref: 0049DD86
          • _free.LIBCMT ref: 0049DD91
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: d88016c8f192cd9e66b99b433c08ba9ba6908eb77d80b9a979daad6b387c8377
          • Instruction ID: 4b9091c4d3222095dcbe060a091ca258ac514cce20150f75e62a791e4c8ab645
          • Opcode Fuzzy Hash: d88016c8f192cd9e66b99b433c08ba9ba6908eb77d80b9a979daad6b387c8377
          • Instruction Fuzzy Hash: 6D115471940704AAEE20B7B2CD87FCB7F9C9F00708F400D3EF29966156D6BDB9449654
          APIs
          • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 0049EF71
          • __fassign.LIBCMT ref: 0049F156
          • __fassign.LIBCMT ref: 0049F173
          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0049F1BB
          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0049F1FB
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0049F2A3
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
          • String ID:
          • API String ID: 1735259414-0
          • Opcode ID: fa56a7d7dd016bedc8c05fa55a22cb3fc43d6ce2e050500ab4d2f4302e0ab7f2
          • Instruction ID: 813a38873e0932aec4ca3fc2dbdca634121a3675a25122b699d79e17005a8541
          • Opcode Fuzzy Hash: fa56a7d7dd016bedc8c05fa55a22cb3fc43d6ce2e050500ab4d2f4302e0ab7f2
          • Instruction Fuzzy Hash: 6BC16C75D002589FCF14CFE9C880AEDBFB5AF49314F2841BAE815EB242D6359D46CB68
          APIs
          • GetLastError.KERNEL32(?,00000200,?,00496BAE,00000200,00000000,?,?,00496703,?,00000000,00000200,00000000), ref: 0049B0E5
          • _free.LIBCMT ref: 0049B142
          • _free.LIBCMT ref: 0049B178
          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00496703,?,00000000,00000200,00000000), ref: 0049B183
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID: 8J
          • API String ID: 2283115069-3490681954
          • Opcode ID: ad9b2c0400f629f83e80a308dbf533a6dca9940e41f5bc28d79aa81d1dbe34d4
          • Instruction ID: d4244da54fe59ed5ac86e02457e4fb1b7bdbba9c5f022ded2a9adca4d33d5212
          • Opcode Fuzzy Hash: ad9b2c0400f629f83e80a308dbf533a6dca9940e41f5bc28d79aa81d1dbe34d4
          • Instruction Fuzzy Hash: CB110A322145112A9F116AB7BD97D6B2D8AEBC27F9F25063FF264822D1DB3D8C01419D
          APIs
          • GetLastError.KERNEL32(00000000,00000200,00000000,00499CC6,00496890,00000000,?,004983A3,?,?,00000200,?,00491F2C,?,?), ref: 0049B23C
          • _free.LIBCMT ref: 0049B299
          • _free.LIBCMT ref: 0049B2CF
          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,004983A3,?,?,00000200,?,00491F2C,?,?,?,00491472,00000000,?), ref: 0049B2DA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID: 8J
          • API String ID: 2283115069-3490681954
          • Opcode ID: f084348487f184f1e7803243fc4f711c1a58ba57e9fcdbdd24be523d105c673e
          • Instruction ID: ad39fcfb4cace2d4be5a1f0bceffdfc23a7b8249a7702fc42ca0da63e85a0dd1
          • Opcode Fuzzy Hash: f084348487f184f1e7803243fc4f711c1a58ba57e9fcdbdd24be523d105c673e
          • Instruction Fuzzy Hash: 86112C322042016ADF116BB6BD89D5F2E99EBC2779F25027FF224822E1DF3D8C01519D
          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00499053,00000000,?,0049901B,?,?,00000000), ref: 00499073
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00499086
          • FreeLibrary.KERNEL32(00000000,?,?,00499053,00000000,?,0049901B,?,?,00000000), ref: 004990A9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: 696ecf7f67fcc4b6cc6a55144c9b37f603081c8a3445929d2324e338db5119e8
          • Instruction ID: 73b419070b5206dcd383a705adbb13ee9e800685d1d247fd0fd1b31ef5e69d2f
          • Opcode Fuzzy Hash: 696ecf7f67fcc4b6cc6a55144c9b37f603081c8a3445929d2324e338db5119e8
          • Instruction Fuzzy Hash: A9F0A031601218FBCF219B64DD0EB9E7EB8EB05756F154079F504A21A2CB788E00DBD8
          APIs
          • _free.LIBCMT ref: 0049DC2F
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DC41
          • _free.LIBCMT ref: 0049DC53
          • _free.LIBCMT ref: 0049DC65
          • _free.LIBCMT ref: 0049DC77
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: afe3247d2ce1cdfe87e7c7d44f29fe1f0ed3777ac2fc4dba23e70eed9de8112a
          • Instruction ID: d77649f19d10f279535a697354c2db7d803938f746dd6e28a311364662f1fc50
          • Opcode Fuzzy Hash: afe3247d2ce1cdfe87e7c7d44f29fe1f0ed3777ac2fc4dba23e70eed9de8112a
          • Instruction Fuzzy Hash: A1F06232904601A78E20DB9AE9C6C1B7FD9EA05355B540C2FF058D7601CB7CFC80C66C
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _strrchr
          • String ID:
          • API String ID: 3213747228-0
          • Opcode ID: 4d188971a6fa4204caef89fb7e3ccd4c4c55d280ea87260fd91b417bae0265c5
          • Instruction ID: f60097497dee1ec4074d170ece3165cf11303ba9657d105f34cfea86aec4aadb
          • Opcode Fuzzy Hash: 4d188971a6fa4204caef89fb7e3ccd4c4c55d280ea87260fd91b417bae0265c5
          • Instruction Fuzzy Hash: 32B13331900245AFDF118F68DA81BAEBFE5EF95314F1541BBE844AB341D7389D02CBA9
          APIs
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,00000000,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000), ref: 004A391E
          • GetLastError.KERNEL32(?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?,00000000,?,0049F84C,?), ref: 004A392A
            • Part of subcall function 004A38F0: CloseHandle.KERNEL32(FFFFFFFE,004A393A,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?,00000000), ref: 004A3900
          • ___initconout.LIBCMT ref: 004A393A
            • Part of subcall function 004A38B2: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004A38E1,004A29A4,00000000,?,0049F300,?,00000000,00000000,?), ref: 004A38C5
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?), ref: 004A394F
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
          • String ID:
          • API String ID: 2744216297-0
          • Opcode ID: 475b23788058356c487cabd9e0dfcbf61c460955b3eeda064c9983c576e24d88
          • Instruction ID: 7441f08516ac10a6ff437d365a4b07333a29cb6c9f70fdeb7bd1a75283ac3e65
          • Opcode Fuzzy Hash: 475b23788058356c487cabd9e0dfcbf61c460955b3eeda064c9983c576e24d88
          • Instruction Fuzzy Hash: 4EF03736400115BFCF227FD1DC04A9A7F66FB1A361F058029FE1986130D6768D609B99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free
          • String ID: 8J
          • API String ID: 269201875-3490681954
          • Opcode ID: e48ad7c0f6460bb4c2e87e345e7142c569c6b201b091d87eaa87548c3bf94cf2
          • Instruction ID: 83e6cfa1de8f275722c780beca3b336ec12d23cf16cd9c493132b78e9d9d1b08
          • Opcode Fuzzy Hash: e48ad7c0f6460bb4c2e87e345e7142c569c6b201b091d87eaa87548c3bf94cf2
          • Instruction Fuzzy Hash: 9801283140523226DE223776BD1AE6F1D44CF12BA9F14073BF960A52E9DB2C8C1141DE
          APIs
          • __CxxThrowException@8.LIBVCRUNTIME ref: 00493317
            • Part of subcall function 004942E9: RaiseException.KERNEL32(?,?,?,93I,00000000,00000000,00000000,?,?,?,?,?,00493339,?,004AC838,%sResideVirtual%d), ref: 00494349
          • __CxxThrowException@8.LIBVCRUNTIME ref: 00493334
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2023489098.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000000.00000002.2023360004.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023538601.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023564033.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023593922.00000000006B2000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2023803808.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionRaise
          • String ID: Unknown exception
          • API String ID: 3476068407-410509341
          • Opcode ID: 682fe5d4504e22df046d7b75d131f6ae458e62a6e892a0ad61f0fd513a808a65
          • Instruction ID: 81b97e415f7bb619a1a557b0752e873be8e308b0e45b4d68003930d2f8cfe19f
          • Opcode Fuzzy Hash: 682fe5d4504e22df046d7b75d131f6ae458e62a6e892a0ad61f0fd513a808a65
          • Instruction Fuzzy Hash: 6BF0F434900208B78F10BBA6D909D9E7F6C6A12714B60817BB81485181EF6CEB06859C

          Execution Graph

          Execution Coverage:3.9%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:0%
          Total number of Nodes:526
          Total number of Limit Nodes:16
          execution_graph 6787 4a582b 6788 492d90 _ValidateLocalCookies 5 API calls 6787->6788 6789 4a583f 6788->6789 6790 492d90 _ValidateLocalCookies 5 API calls 6789->6790 6791 4a5849 6790->6791 6792 493221 6795 49362e 6792->6795 6794 493226 6794->6794 6796 493644 6795->6796 6798 49364d 6796->6798 6799 4935e1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6796->6799 6798->6794 6799->6798 6169 491340 GetCommandLineW CommandLineToArgvW 6172 4913d0 6169->6172 6173 4913fc 6172->6173 6174 49140c 6173->6174 6175 491401 6173->6175 6176 491411 lstrcmpW 6174->6176 6177 491430 6174->6177 6200 491930 ImpersonateSelf 6175->6200 6179 491428 ExitProcess 6176->6179 6180 491423 6176->6180 6225 492d90 6177->6225 6190 492b40 StartServiceCtrlDispatcherW 6180->6190 6182 491406 6185 49140a 6182->6185 6186 491445 6182->6186 6184 491372 ExitProcess 6232 491b20 6185->6232 6193 491d80 6186->6193 6191 492d90 _ValidateLocalCookies 5 API calls 6190->6191 6192 492b80 6191->6192 6192->6179 6275 491e90 6193->6275 6195 491d87 6306 492090 6195->6306 6197 491d8c 6255 4924b0 6197->6255 6201 491972 GetCurrentThread OpenThreadToken 6200->6201 6206 491afd 6200->6206 6204 49198d GetLastError 6201->6204 6205 4919d0 AllocateAndInitializeSid 6201->6205 6202 491b0d 6209 492d90 _ValidateLocalCookies 5 API calls 6202->6209 6203 491b06 FreeSid 6203->6202 6204->6206 6207 49199e GetCurrentProcess OpenProcessToken 6204->6207 6205->6206 6208 4919fb LocalAlloc 6205->6208 6206->6202 6206->6203 6207->6206 6210 4919bd GetCurrentProcess OpenProcessToken 6207->6210 6208->6206 6211 491a11 InitializeSecurityDescriptor 6208->6211 6212 491b1a 6209->6212 6210->6205 6210->6206 6213 491a22 GetLengthSid LocalAlloc 6211->6213 6214 491af6 LocalFree 6211->6214 6212->6182 6215 491a3e InitializeAcl 6213->6215 6216 491af5 6213->6216 6214->6206 6217 491aee LocalFree 6215->6217 6218 491a50 AddAccessAllowedAce 6215->6218 6216->6214 6217->6216 6218->6217 6219 491a66 SetSecurityDescriptorDacl 6218->6219 6219->6217 6220 491a76 SetSecurityDescriptorGroup 6219->6220 6220->6217 6221 491a86 SetSecurityDescriptorOwner 6220->6221 6221->6217 6222 491a96 IsValidSecurityDescriptor 6221->6222 6222->6217 6223 491aa1 AccessCheck 6222->6223 6223->6217 6224 491ae1 RevertToSelf 6223->6224 6224->6217 6226 492d99 6225->6226 6227 492d9b IsProcessorFeaturePresent 6225->6227 6226->6184 6229 492e1b 6227->6229 6765 492ddf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6229->6765 6231 492efe 6231->6184 6233 491e90 79 API calls 6232->6233 6234 491b54 std::_Xinvalid_argument 6233->6234 6235 491b86 GetModuleFileNameW 6234->6235 6236 491bd0 6235->6236 6236->6236 6237 4917d0 38 API calls 6236->6237 6238 491bec 6237->6238 6239 4917d0 38 API calls 6238->6239 6241 491c50 6239->6241 6240 491ce7 6242 491480 61 API calls 6240->6242 6243 498564 25 API calls 6241->6243 6244 491c9f 6241->6244 6245 491cfe 6242->6245 6243->6244 6244->6240 6247 498564 25 API calls 6244->6247 6766 4921c0 6245->6766 6247->6240 6249 491d1b OpenSCManagerW 6250 491d13 ExitProcess 6249->6250 6251 491d37 OpenServiceW 6249->6251 6252 491d5f CloseServiceHandle 6251->6252 6253 491d47 StartServiceW CloseServiceHandle 6251->6253 6252->6250 6254 491d6f ExitProcess 6252->6254 6253->6252 6256 4924cb std::_Xinvalid_argument 6255->6256 6314 491530 6256->6314 6258 49252a std::_Xinvalid_argument 6259 492576 lstrcatW 6258->6259 6336 491480 6259->6336 6262 4928e0 17 API calls 6272 4925c3 std::_Xinvalid_argument 6262->6272 6263 492af0 7 API calls 6263->6272 6264 491450 50 API calls 6264->6272 6266 491480 61 API calls 6266->6272 6267 492790 lstrcpyA 6375 4912b0 6267->6375 6269 4927c6 ReleaseMutex CloseHandle 6269->6272 6270 491120 81 API calls 6270->6272 6271 4928c7 Sleep 6271->6272 6272->6262 6272->6263 6272->6264 6272->6266 6272->6267 6272->6269 6272->6270 6272->6271 6273 49283f lstrcatW wsprintfW 6272->6273 6274 492888 CreateProcessW 6272->6274 6366 492da1 6272->6366 6273->6272 6274->6271 6746 4943e0 6275->6746 6278 491efd lstrcatA 6279 491f0f 6278->6279 6280 491450 50 API calls 6279->6280 6281 491f2c 6280->6281 6282 492da1 3 API calls 6281->6282 6283 491f36 std::_Xinvalid_argument 6282->6283 6284 491f4b lstrcpyA 6283->6284 6285 4912b0 6 API calls 6284->6285 6286 491f6d 6285->6286 6287 49206b 6286->6287 6288 491f75 6286->6288 6748 4916f0 6287->6748 6290 491f7f ReleaseMutex CloseHandle 6288->6290 6291 491f92 CreateMutexA 6288->6291 6290->6291 6293 4943e0 std::_Xinvalid_argument 6291->6293 6292 492073 GetCurrentProcessId 6751 491da0 6292->6751 6294 491fc0 GetModuleFileNameA 6293->6294 6296 491fea std::_Xinvalid_argument 6294->6296 6298 491450 50 API calls 6296->6298 6297 492080 ExitProcess 6299 492019 WinExec 6298->6299 6300 49205b 6299->6300 6301 492032 6299->6301 6303 492d90 _ValidateLocalCookies 5 API calls 6300->6303 6302 491450 50 API calls 6301->6302 6304 49204d WinExec 6302->6304 6305 492067 6303->6305 6304->6300 6305->6195 6307 4943e0 std::_Xinvalid_argument 6306->6307 6308 49215a GetModuleFileNameW lstrlenW 6307->6308 6309 4921a3 6308->6309 6310 4921aa ExitProcess 6309->6310 6311 4921b2 6309->6311 6312 492d90 _ValidateLocalCookies 5 API calls 6311->6312 6313 4921bc 6312->6313 6313->6197 6315 4916d7 6314->6315 6318 491560 std::_Xinvalid_argument 6314->6318 6316 492d90 _ValidateLocalCookies 5 API calls 6315->6316 6317 4916e4 6316->6317 6317->6258 6382 491450 6318->6382 6320 4915a6 6321 4915fc lstrcatW 6320->6321 6322 491480 61 API calls 6321->6322 6323 491611 lstrcatW lstrlenW 6322->6323 6324 49164a lstrlenW 6323->6324 6325 491626 lstrlenW 6323->6325 6326 491655 6324->6326 6327 491667 lstrlenW 6324->6327 6330 491647 6325->6330 6326->6327 6329 491691 lstrlenW 6327->6329 6331 491674 lstrlenW 6327->6331 6332 49169c 6329->6332 6333 4916b2 lstrcatW lstrcatW 6329->6333 6330->6324 6335 49168e 6331->6335 6332->6333 6333->6315 6335->6329 6337 4914b7 6336->6337 6337->6337 6632 4917d0 6337->6632 6339 4914d1 6340 491506 6339->6340 6342 491524 6339->6342 6341 492d90 _ValidateLocalCookies 5 API calls 6340->6341 6343 491520 lstrcatW lstrcatW lstrcatW 6341->6343 6645 498564 6342->6645 6343->6272 6369 492da6 ___std_exception_copy 6366->6369 6367 492dc0 6367->6272 6369->6367 6371 492dc2 6369->6371 6732 4985c4 6369->6732 6370 49331c 6372 4942e9 __CxxThrowException@8 RaiseException 6370->6372 6371->6370 6374 4942e9 __CxxThrowException@8 RaiseException 6371->6374 6373 493339 6372->6373 6373->6272 6374->6370 6376 4912c0 ReleaseMutex CloseHandle 6375->6376 6377 4912d3 CreateMutexA 6375->6377 6376->6377 6378 491308 6377->6378 6379 4912f2 GetLastError 6377->6379 6380 491312 ReleaseMutex CloseHandle 6378->6380 6381 491325 6378->6381 6379->6378 6380->6381 6381->6272 6383 491468 6382->6383 6386 498384 6383->6386 6389 496829 6386->6389 6388 491472 6388->6320 6390 496849 6389->6390 6391 496834 6389->6391 6393 49688b 6390->6393 6396 496857 6390->6396 6405 499cc1 6391->6405 6394 499cc1 __dosmaperr 14 API calls 6393->6394 6404 496883 6394->6404 6411 4966ab 6396->6411 6400 498554 ___std_exception_copy 25 API calls 6402 49689b 6400->6402 6402->6388 6403 499cc1 __dosmaperr 14 API calls 6403->6404 6404->6400 6426 49b237 GetLastError 6405->6426 6407 496839 6408 498554 6407->6408 6477 4984f0 6408->6477 6410 496844 6410->6388 6412 4966eb 6411->6412 6413 4966d3 6411->6413 6412->6413 6415 4966f3 6412->6415 6414 499cc1 __dosmaperr 14 API calls 6413->6414 6416 4966d8 6414->6416 6489 496b6e 6415->6489 6418 498554 ___std_exception_copy 25 API calls 6416->6418 6419 4966e3 6418->6419 6421 492d90 _ValidateLocalCookies 5 API calls 6419->6421 6420 496703 6497 496fcd 6420->6497 6422 49680b 6421->6422 6422->6402 6422->6403 6427 49b254 6426->6427 6428 49b24e 6426->6428 6447 49b25a SetLastError 6427->6447 6454 49a096 6427->6454 6449 49a057 6428->6449 6435 49b28a 6437 49a096 std::_Xinvalid_argument 6 API calls 6435->6437 6436 49b2a1 6438 49a096 std::_Xinvalid_argument 6 API calls 6436->6438 6445 49b298 6437->6445 6439 49b2ad 6438->6439 6440 49b2b1 6439->6440 6441 49b2c2 6439->6441 6442 49a096 std::_Xinvalid_argument 6 API calls 6440->6442 6472 49af0e 6441->6472 6442->6445 6466 499d31 6445->6466 6447->6407 6448 499d31 _free 12 API calls 6448->6447 6450 499e9a std::_Xinvalid_argument 5 API calls 6449->6450 6451 49a073 6450->6451 6452 49a07c 6451->6452 6453 49a08e TlsGetValue 6451->6453 6452->6427 6455 499e9a std::_Xinvalid_argument 5 API calls 6454->6455 6456 49a0b2 6455->6456 6457 49a0bb 6456->6457 6458 49a0d0 TlsSetValue 6456->6458 6457->6447 6459 499cd4 6457->6459 6464 499ce1 std::_Xinvalid_argument 6459->6464 6460 499d21 6463 499cc1 __dosmaperr 13 API calls 6460->6463 6461 499d0c RtlAllocateHeap 6462 499d1f 6461->6462 6461->6464 6462->6435 6462->6436 6463->6462 6464->6460 6464->6461 6465 4985c4 std::_Xinvalid_argument EnterCriticalSection LeaveCriticalSection 6464->6465 6465->6464 6467 499d65 __dosmaperr 6466->6467 6468 499d3c HeapFree 6466->6468 6467->6447 6468->6467 6469 499d51 6468->6469 6470 499cc1 __dosmaperr 12 API calls 6469->6470 6471 499d57 GetLastError 6470->6471 6471->6467 6473 49ada2 std::_Xinvalid_argument EnterCriticalSection LeaveCriticalSection 6472->6473 6474 49af7c 6473->6474 6475 49aeb4 std::_Xinvalid_argument 14 API calls 6474->6475 6476 49afa5 6475->6476 6476->6448 6478 49b237 __dosmaperr 14 API calls 6477->6478 6479 4984fb 6478->6479 6482 498509 6479->6482 6485 498581 IsProcessorFeaturePresent 6479->6485 6481 498553 6483 4984f0 ___std_exception_copy 25 API calls 6481->6483 6482->6410 6484 498560 6483->6484 6484->6410 6486 49858d 6485->6486 6487 4983a8 std::_Xinvalid_argument 8 API calls 6486->6487 6488 4985a2 GetCurrentProcess TerminateProcess 6487->6488 6488->6481 6490 496b8e 6489->6490 6491 496b85 6489->6491 6490->6491 6514 49b0e0 GetLastError 6490->6514 6491->6420 6549 497f28 6497->6549 6499 49678a 6511 496bf1 6499->6511 6500 496fed 6501 499cc1 __dosmaperr 14 API calls 6500->6501 6502 496ff2 6501->6502 6503 498554 ___std_exception_copy 25 API calls 6502->6503 6503->6499 6504 496fde 6504->6499 6504->6500 6556 49714d 6504->6556 6564 4979c7 6504->6564 6569 4972a1 6504->6569 6574 497415 6504->6574 6603 497795 6504->6603 6625 497f43 6504->6625 6512 499d31 _free 14 API calls 6511->6512 6513 496c01 6512->6513 6513->6419 6515 49b0fd 6514->6515 6516 49b0f7 6514->6516 6517 49a096 std::_Xinvalid_argument 6 API calls 6515->6517 6539 49b103 SetLastError 6515->6539 6518 49a057 std::_Xinvalid_argument 6 API calls 6516->6518 6519 49b11b 6517->6519 6518->6515 6520 499cd4 std::_Xinvalid_argument 14 API calls 6519->6520 6519->6539 6522 49b12b 6520->6522 6523 49b14a 6522->6523 6524 49b133 6522->6524 6527 49a096 std::_Xinvalid_argument 6 API calls 6523->6527 6528 49a096 std::_Xinvalid_argument 6 API calls 6524->6528 6525 496bae 6541 49b332 6525->6541 6526 49b197 6529 499875 std::_Xinvalid_argument 35 API calls 6526->6529 6530 49b156 6527->6530 6531 49b141 6528->6531 6532 49b19c 6529->6532 6533 49b16b 6530->6533 6534 49b15a 6530->6534 6537 499d31 _free 14 API calls 6531->6537 6536 49af0e std::_Xinvalid_argument 14 API calls 6533->6536 6535 49a096 std::_Xinvalid_argument 6 API calls 6534->6535 6535->6531 6538 49b176 6536->6538 6537->6539 6540 499d31 _free 14 API calls 6538->6540 6539->6525 6539->6526 6540->6539 6542 49b345 6541->6542 6544 496bc4 6541->6544 6543 49e1ac __fassign 37 API calls 6542->6543 6542->6544 6543->6544 6545 49b35f 6544->6545 6546 49b387 6545->6546 6547 49b372 6545->6547 6546->6491 6547->6546 6548 49cff7 __fassign 47 API calls 6547->6548 6548->6546 6550 497f2d 6549->6550 6551 497f40 6549->6551 6552 499cc1 __dosmaperr 14 API calls 6550->6552 6551->6504 6553 497f32 6552->6553 6554 498554 ___std_exception_copy 25 API calls 6553->6554 6555 497f3d 6554->6555 6555->6504 6557 4971a6 25 API calls 6556->6557 6558 497152 6557->6558 6559 497169 6558->6559 6560 499cc1 __dosmaperr 14 API calls 6558->6560 6559->6504 6561 49715b 6560->6561 6562 498554 ___std_exception_copy 25 API calls 6561->6562 6563 497166 6562->6563 6563->6504 6565 4979d0 6564->6565 6566 4979d7 6564->6566 6567 496e45 47 API calls 6565->6567 6566->6504 6568 4979d6 6567->6568 6568->6504 6570 4972aa 6569->6570 6571 4972b1 6569->6571 6572 496e45 47 API calls 6570->6572 6571->6504 6573 4972b0 6572->6573 6573->6504 6575 49741c 6574->6575 6576 497436 6574->6576 6577 49781a 6575->6577 6578 4977ae 6575->6578 6579 497466 6575->6579 6576->6579 6580 499cc1 __dosmaperr 14 API calls 6576->6580 6583 497821 6577->6583 6584 497860 6577->6584 6591 4977f1 6577->6591 6578->6591 6593 4977ba 6578->6593 6579->6504 6581 497452 6580->6581 6582 498554 ___std_exception_copy 25 API calls 6581->6582 6585 49745d 6582->6585 6586 4977c8 6583->6586 6587 497826 6583->6587 6588 497e7e 26 API calls 6584->6588 6585->6504 6590 4977ea 6586->6590 6595 497ab6 49 API calls 6586->6595 6600 4977d6 6586->6600 6587->6591 6592 49782b 6587->6592 6588->6600 6589 497801 6589->6590 6598 497c07 48 API calls 6589->6598 6590->6504 6591->6590 6594 497c9a 26 API calls 6591->6594 6591->6600 6596 49783e 6592->6596 6597 497830 6592->6597 6593->6586 6593->6589 6593->6600 6594->6600 6595->6600 6599 497deb 25 API calls 6596->6599 6597->6590 6601 497e5f 26 API calls 6597->6601 6598->6600 6599->6600 6600->6590 6602 498109 48 API calls 6600->6602 6601->6600 6602->6590 6604 49781a 6603->6604 6605 4977ae 6603->6605 6606 497821 6604->6606 6607 497860 6604->6607 6612 4977f1 6604->6612 6605->6612 6613 4977ba 6605->6613 6608 4977c8 6606->6608 6609 497826 6606->6609 6610 497e7e 26 API calls 6607->6610 6615 497ab6 49 API calls 6608->6615 6623 4977d6 6608->6623 6624 4977ea 6608->6624 6609->6612 6616 49782b 6609->6616 6610->6623 6611 497801 6620 497c07 48 API calls 6611->6620 6611->6624 6614 497c9a 26 API calls 6612->6614 6612->6623 6612->6624 6613->6608 6613->6611 6613->6623 6614->6623 6615->6623 6617 49783e 6616->6617 6618 497830 6616->6618 6619 497deb 25 API calls 6617->6619 6621 497e5f 26 API calls 6618->6621 6618->6624 6619->6623 6620->6623 6621->6623 6622 498109 48 API calls 6622->6624 6623->6622 6623->6624 6624->6504 6626 497f49 6625->6626 6627 497f62 6625->6627 6626->6627 6628 499cc1 __dosmaperr 14 API calls 6626->6628 6627->6504 6629 497f54 6628->6629 6630 498554 ___std_exception_copy 25 API calls 6629->6630 6631 497f5f 6630->6631 6631->6504 6635 4917f1 6632->6635 6637 49181c 6632->6637 6633 49190f 6650 491920 6633->6650 6635->6339 6637->6633 6638 491866 6637->6638 6639 491896 6637->6639 6640 492da1 3 API calls 6638->6640 6641 492da1 3 API calls 6639->6641 6643 491884 __fassign 6639->6643 6640->6643 6641->6643 6642 498564 25 API calls 6642->6633 6643->6642 6644 4918f1 6643->6644 6644->6339 6646 4984f0 ___std_exception_copy 25 API calls 6645->6646 6647 498573 6646->6647 6648 498581 ___std_exception_copy 11 API calls 6647->6648 6649 498580 6648->6649 6653 493bbb 6650->6653 6661 493b81 6653->6661 6658 493bda 6659 49192a 6658->6659 6667 4997df 6658->6667 6673 493b31 6661->6673 6664 4942e9 6666 494309 RaiseException 6664->6666 6666->6658 6668 4997eb std::_Xinvalid_argument 6667->6668 6669 49b0e0 std::_Xinvalid_argument 37 API calls 6668->6669 6672 4997f0 6669->6672 6682 499875 6672->6682 6676 494267 6673->6676 6677 493b5d 6676->6677 6678 494274 ___std_exception_copy 6676->6678 6677->6664 6678->6677 6679 4942a1 6678->6679 6680 49981b ___std_exception_copy 25 API calls 6678->6680 6681 4992d0 ___std_exception_copy 14 API calls 6679->6681 6680->6679 6681->6677 6693 49e46c 6682->6693 6685 499885 6687 49988f IsProcessorFeaturePresent 6685->6687 6692 4998ae 6685->6692 6688 49989b 6687->6688 6723 4983a8 6688->6723 6729 4990de 6692->6729 6694 49e39e std::_Xinvalid_argument EnterCriticalSection LeaveCriticalSection 6693->6694 6695 49987a 6694->6695 6695->6685 6696 49e4b1 6695->6696 6697 49e4bd std::_Xinvalid_argument 6696->6697 6698 49b237 __dosmaperr 14 API calls 6697->6698 6703 49e4ea std::_Xinvalid_argument 6697->6703 6704 49e4e4 std::_Xinvalid_argument 6697->6704 6698->6704 6699 49e531 6701 499cc1 __dosmaperr 14 API calls 6699->6701 6700 49e51b 6700->6685 6702 49e536 6701->6702 6705 498554 ___std_exception_copy 25 API calls 6702->6705 6706 49e55d 6703->6706 6707 49c063 std::_Xinvalid_argument EnterCriticalSection 6703->6707 6704->6699 6704->6700 6704->6703 6705->6700 6709 49e690 6706->6709 6710 49e59f 6706->6710 6720 49e5ce 6706->6720 6707->6706 6708 49e63d std::_Xinvalid_argument LeaveCriticalSection 6713 49e614 6708->6713 6711 49c0ab std::_Xinvalid_argument LeaveCriticalSection 6709->6711 6715 49e69b 6709->6715 6714 49b0e0 std::_Xinvalid_argument 37 API calls 6710->6714 6710->6720 6711->6715 6712 4990de std::_Xinvalid_argument 23 API calls 6716 49e6a3 6712->6716 6713->6700 6717 49b0e0 std::_Xinvalid_argument 37 API calls 6713->6717 6721 49e623 6713->6721 6718 49e5c3 6714->6718 6715->6712 6717->6721 6719 49b0e0 std::_Xinvalid_argument 37 API calls 6718->6719 6719->6720 6720->6708 6721->6700 6722 49b0e0 std::_Xinvalid_argument 37 API calls 6721->6722 6722->6700 6724 4983c4 std::_Xinvalid_argument 6723->6724 6725 4983f0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6724->6725 6728 4984c1 std::_Xinvalid_argument 6725->6728 6726 492d90 _ValidateLocalCookies 5 API calls 6727 4984df 6726->6727 6727->6692 6728->6726 6730 498fb8 std::_Xinvalid_argument 23 API calls 6729->6730 6731 4990ef 6730->6731 6735 4985f1 6732->6735 6736 4985fd std::_Xinvalid_argument 6735->6736 6741 49c063 EnterCriticalSection 6736->6741 6738 498608 6742 498644 6738->6742 6741->6738 6745 49c0ab LeaveCriticalSection 6742->6745 6744 4985cf 6744->6369 6745->6744 6747 491ece GetCurrentProcessId ProcessIdToSessionId GetUserNameA 6746->6747 6747->6278 6747->6279 6749 491739 6748->6749 6750 491726 ReleaseMutex CloseHandle 6748->6750 6749->6292 6750->6749 6752 4943e0 std::_Xinvalid_argument 6751->6752 6753 491dd8 CreateToolhelp32Snapshot Process32First 6752->6753 6754 491df7 6753->6754 6755 491e46 CloseHandle 6753->6755 6758 491e08 OpenProcess 6754->6758 6760 491e64 CloseHandle 6754->6760 6761 491e3a Process32Next 6754->6761 6763 491da0 5 API calls 6754->6763 6756 492d90 _ValidateLocalCookies 5 API calls 6755->6756 6757 491e60 6756->6757 6757->6297 6759 491e1a TerminateProcess 6758->6759 6758->6760 6759->6754 6759->6760 6762 492d90 _ValidateLocalCookies 5 API calls 6760->6762 6761->6754 6761->6755 6764 491e7e 6762->6764 6763->6754 6764->6297 6765->6231 6767 4943e0 std::_Xinvalid_argument 6766->6767 6768 492205 wsprintfW OpenSCManagerW 6767->6768 6769 492240 OpenServiceW 6768->6769 6770 492266 6768->6770 6771 492279 CreateServiceW 6769->6771 6772 492251 CloseServiceHandle 6769->6772 6773 492d90 _ValidateLocalCookies 5 API calls 6770->6773 6774 49225d 6771->6774 6776 4922b1 14 API calls 6771->6776 6772->6774 6775 491d0c 6773->6775 6777 492263 CloseServiceHandle 6774->6777 6775->6249 6775->6250 6778 49248c CloseServiceHandle 6776->6778 6779 4923a5 13 API calls 6776->6779 6777->6770 6778->6777 6779->6777 6800 495470 6801 495482 6800->6801 6802 495490 @_EH4_CallFilterFunc@8 6800->6802 6803 492d90 _ValidateLocalCookies 5 API calls 6801->6803 6803->6802 6804 494110 6815 4940d0 6804->6815 6816 4940ef 6815->6816 6817 4940e2 6815->6817 6818 492d90 _ValidateLocalCookies 5 API calls 6817->6818 6818->6816 6819 492d30 SetServiceStatus 6820 492d90 _ValidateLocalCookies 5 API calls 6819->6820 6821 492d8c 6820->6821 6827 4a5800 6828 492d90 _ValidateLocalCookies 5 API calls 6827->6828 6829 4a5811 6828->6829 6780 499cd4 6785 499ce1 std::_Xinvalid_argument 6780->6785 6781 499d21 6784 499cc1 __dosmaperr 13 API calls 6781->6784 6782 499d0c RtlAllocateHeap 6783 499d1f 6782->6783 6782->6785 6784->6783 6785->6781 6785->6782 6786 4985c4 std::_Xinvalid_argument 2 API calls 6785->6786 6786->6785

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 125 4929f0-492a20 lstrlenW 126 492a4d-492a8f call 4943e0 lstrcatW lstrlenW 125->126 127 492a22-492a29 125->127 133 492a91-492a94 126->133 134 492a96-492a9e 126->134 128 492a2b-492a2e 127->128 129 492a30-492a35 127->129 128->126 128->129 129->126 132 492a37-492a4c call 492d90 129->132 133->134 136 492aaa-492ac0 FindFirstFileW 133->136 137 492ae9-492aef call 492f00 134->137 138 492aa0-492aa2 134->138 140 492ad3-492ae8 call 492d90 136->140 141 492ac2-492ad0 FindClose 136->141 138->136 141->140
          APIs
          • lstrlenW.KERNEL32(?,00000000), ref: 00492A17
          • lstrcatW.KERNEL32(?,?), ref: 00492A6D
          • lstrlenW.KERNEL32(?), ref: 00492A7B
          • FindFirstFileW.KERNELBASE(?,?), ref: 00492AB7
          • FindClose.KERNELBASE(00000000), ref: 00492AC7
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Findlstrlen$CloseFileFirstlstrcat
          • String ID:
          • API String ID: 2221514933-0
          • Opcode ID: abe7df52ea9b1521c97142ffc4d7f121de1c56d7703a879be4930906bfe6ca02
          • Instruction ID: 1ea456282f75d4d4a50b0732ab9ca5d07de2a4bf5e75e2802d0dd6adc08f6ed5
          • Opcode Fuzzy Hash: abe7df52ea9b1521c97142ffc4d7f121de1c56d7703a879be4930906bfe6ca02
          • Instruction Fuzzy Hash: C621F732405714ABCB30DB60EC4D6AB7BE8EF46315F10493BE559C7191D6749884879E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 166 492b40-492b7b StartServiceCtrlDispatcherW call 492d90 168 492b80-492b83 166->168
          APIs
          • StartServiceCtrlDispatcherW.ADVAPI32(?), ref: 00492B70
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CtrlDispatcherServiceStart
          • String ID: TestWrite
          • API String ID: 3789849863-1711770924
          • Opcode ID: 5829eab2a07bb3311af46094caf5edbb2fed385b8159fbf296b5c857167248a9
          • Instruction ID: bd0e075842981ca8d318d38315b977274b150aeab29d3cf4f9e83d0187c8aa76
          • Opcode Fuzzy Hash: 5829eab2a07bb3311af46094caf5edbb2fed385b8159fbf296b5c857167248a9
          • Instruction Fuzzy Hash: C9E01AB490521CABDB00DF95D64979EBBF4EB04308F5145AAD80567241DBB45A088BA9

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 169 492af0-492b1c FindFirstFileW 170 492b1e-492b21 FindClose 169->170 171 492b27-492b3b call 492d90 169->171 170->171
          APIs
          • FindFirstFileW.KERNELBASE(?,?,00000000), ref: 00492B13
          • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00492B21
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Find$CloseFileFirst
          • String ID:
          • API String ID: 2295610775-0
          • Opcode ID: 175bd04492e448e786967119c5a0c22e79e8e805826b7d4ab4733b4f542dbb34
          • Instruction ID: 26890a62fb72ee08edffb08f4efe489053f2087684d6d50beaf36577ce9cbb23
          • Opcode Fuzzy Hash: 175bd04492e448e786967119c5a0c22e79e8e805826b7d4ab4733b4f542dbb34
          • Instruction Fuzzy Hash: 86E09B711456005FC2209F349C495677BDCD745225F154B26A879822D0E9329454C69E

          Control-flow Graph

          APIs
            • Part of subcall function 00491530: lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
            • Part of subcall function 00491530: lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
            • Part of subcall function 00491530: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 00492590
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925A1
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925B1
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0049144A), ref: 004925C1
            • Part of subcall function 004928E0: lstrcatW.KERNEL32(?,?,7595F770,?), ref: 00492916
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(?), ref: 0049292B
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(0000002F), ref: 0049294F
            • Part of subcall function 004928E0: lstrlenW.KERNEL32(?), ref: 0049295C
            • Part of subcall function 004928E0: SHCreateDirectoryExW.SHELL32(00000000,?,00000000), ref: 004929B4
            • Part of subcall function 004928E0: GetLastError.KERNEL32 ref: 004929BF
            • Part of subcall function 00492AF0: FindFirstFileW.KERNELBASE(?,?,00000000), ref: 00492B13
            • Part of subcall function 00492AF0: FindClose.KERNEL32(00000000,?,?,00000000), ref: 00492B21
          • lstrcpyA.KERNEL32(00000000,?), ref: 004927A5
          • ReleaseMutex.KERNEL32(?), ref: 004927C7
          • CloseHandle.KERNEL32(?), ref: 004927D3
          • lstrcatW.KERNEL32(?,?), ref: 00492853
          • wsprintfW.USER32 ref: 00492873
          • CreateProcessW.KERNELBASE(?,?,00000001,00000001,00000001,00000001,00000001,00000001,?,?), ref: 004928C1
          • Sleep.KERNELBASE(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004928D2
          Strings
          • "%s" %S, xrefs: 0049286D
          • Function exe : %S exe size : %u dll : %S dll size : %u, xrefs: 0049270E
          • NetWork exe : %S exe size : %u dll : %S dll size : %u, xrefs: 0049264F
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrcat$lstrlen$CloseCreateFind$DirectoryErrorFileFirstHandleLastMutexProcessReleaseSleeplstrcpywsprintf
          • String ID: "%s" %S$Function exe : %S exe size : %u dll : %S dll size : %u$NetWork exe : %S exe size : %u dll : %S dll size : %u
          • API String ID: 1787968544-1339826144
          • Opcode ID: e699b334411b896df028221fa484c9ce4f91697672d7cebd137caca4d2f5236c
          • Instruction ID: 978ddc93b5e99c96478a903f32f8369831daf6b2a44a5fc7bda5ed681d522383
          • Opcode Fuzzy Hash: e699b334411b896df028221fa484c9ce4f91697672d7cebd137caca4d2f5236c
          • Instruction Fuzzy Hash: 86B12171900219ABDF30EB61CD45FDA7BBCAF49348F0401EAB609A7191DB746B85CF58

          Control-flow Graph

          APIs
          • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000004,00000000,00000000,7595F770,?,?,?,00492676,?,?,?), ref: 00491153
          • SetFilePointerEx.KERNELBASE(00000000,?,?,00000000,00000000,?,?,00492676,?,?,?), ref: 00491176
          • WriteFile.KERNELBASE(00000000,?,v&I,?,00000000,?,?,00492676,?,?,?), ref: 0049118C
          • GetLastError.KERNEL32(?,?,?,00492676,?,?,?,?,?,?,?,?,?,?,?,00000300), ref: 004911B1
          • CloseHandle.KERNELBASE(00000000,?,?,?,?,00492676,?,?,?), ref: 004911C6
          • Sleep.KERNELBASE(000001F4,?,?,?,?,00492676,?,?,?), ref: 004911D1
          Strings
          • v&I, xrefs: 0049117C, 00491186
          • INVALID_HANDLE_VALUE != hFile errorcode : %d file: %S, xrefs: 004911B8
          • (TRUE == bRet) && (dWriteNumber == config_size) , xrefs: 004911A1
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: File$CloseCreateErrorHandleLastPointerSleepWrite
          • String ID: (TRUE == bRet) && (dWriteNumber == config_size) $INVALID_HANDLE_VALUE != hFile errorcode : %d file: %S$v&I
          • API String ID: 284182958-178700489
          • Opcode ID: 64b26dd76e0f5379aba950c1fe095ae93655682b7ec3c63059c4330225e9aca9
          • Instruction ID: 8f23c5a3c57e93db051efbbeb2e5b8b1c599e462cfaeb94006c70ac95142d0df
          • Opcode Fuzzy Hash: 64b26dd76e0f5379aba950c1fe095ae93655682b7ec3c63059c4330225e9aca9
          • Instruction Fuzzy Hash: F3212432684301BBDA10DF609C0AF5B7FA8EF8A720F14062BFA51921E1D774944587DE

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 95 4928e0-49292f call 4943e0 lstrcatW lstrlenW 98 492931 95->98 99 492955-492960 lstrlenW 95->99 100 492934-49293d 98->100 101 49298a-4929a7 call 4929f0 99->101 102 492962 99->102 104 49293f 100->104 105 492947-492953 lstrlenW 100->105 109 4929a9-4929ca SHCreateDirectoryExW GetLastError 101->109 110 4929cc 101->110 106 492965-49296e 102->106 104->105 105->99 105->100 106->101 108 492970-492976 106->108 111 492978-492988 108->111 112 4929e1-4929e6 call 492f00 108->112 109->110 113 4929ce-4929e0 call 492d90 109->113 110->113 111->101 111->106
          APIs
          • lstrcatW.KERNEL32(?,?,7595F770,?), ref: 00492916
          • lstrlenW.KERNEL32(?), ref: 0049292B
          • lstrlenW.KERNEL32(0000002F), ref: 0049294F
          • lstrlenW.KERNEL32(?), ref: 0049295C
          • SHCreateDirectoryExW.SHELL32(00000000,?,00000000), ref: 004929B4
          • GetLastError.KERNEL32 ref: 004929BF
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$CreateDirectoryErrorLastlstrcat
          • String ID: \
          • API String ID: 1382740711-2967466578
          • Opcode ID: 10e0f0b9bfaf3d51149ec605bd32471ad2766b34d09cf6ffc7a4c3bd7eae0d33
          • Instruction ID: eb1dd0ec6a56bdc6a16ebaca415e2a6d5aa760368d12754cc0dd6f4a0bd7589d
          • Opcode Fuzzy Hash: 10e0f0b9bfaf3d51149ec605bd32471ad2766b34d09cf6ffc7a4c3bd7eae0d33
          • Instruction Fuzzy Hash: D721D6B1A0131CAACF20DB61DD4CBEB7F68EF01304F1186BAE91993141E7B89E448F94

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 118 4912b0-4912be 119 4912c0-4912cd ReleaseMutex CloseHandle 118->119 120 4912d3-4912f0 CreateMutexA 118->120 119->120 121 491308-491310 120->121 122 4912f2-491305 GetLastError 120->122 123 491312-49131f ReleaseMutex CloseHandle 121->123 124 491325-491333 121->124 122->121 123->124
          APIs
          • ReleaseMutex.KERNEL32(?,00000000,00000000,00491F6D), ref: 004912C1
          • CloseHandle.KERNEL32(?), ref: 004912CD
          • CreateMutexA.KERNELBASE(00000000,00000001,00000000,00000000,00000000,00491F6D), ref: 004912E2
          • GetLastError.KERNEL32 ref: 004912F2
          • ReleaseMutex.KERNEL32(?), ref: 00491313
          • CloseHandle.KERNEL32(?), ref: 0049131F
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Mutex$CloseHandleRelease$CreateErrorLast
          • String ID:
          • API String ID: 299056699-0
          • Opcode ID: b7d1e7709a75df8677032a7ed35025e8b8889b47130df195982de1a9b0ed2439
          • Instruction ID: ef52d2d5ff5c405c3d86134ed958ea3a43db5591ecccc79fe7139aa6840eb6c0
          • Opcode Fuzzy Hash: b7d1e7709a75df8677032a7ed35025e8b8889b47130df195982de1a9b0ed2439
          • Instruction Fuzzy Hash: DAF04FB1604B119BDB219F70EC5C7C37EA4BB19301F044939F59BC22A0C7B59880CB68

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 146 4913d0-4913ff call 491000 149 49140c-49140f 146->149 150 491401 146->150 151 491411-491421 lstrcmpW 149->151 152 491430-49143f call 492d90 149->152 153 491401 call 491930 150->153 154 491428-49142a ExitProcess 151->154 155 491423 call 492b40 151->155 157 491406-491408 153->157 155->154 160 49140a-491440 call 491b20 157->160 161 491445 call 491d80 157->161 160->161 165 49144a 161->165
          APIs
          • lstrcmpW.KERNELBASE(?,-service), ref: 00491419
          • ExitProcess.KERNEL32 ref: 0049142A
            • Part of subcall function 00491930: ImpersonateSelf.ADVAPI32(00000002), ref: 00491964
            • Part of subcall function 00491930: GetCurrentThread.KERNEL32 ref: 0049197C
            • Part of subcall function 00491930: OpenThreadToken.ADVAPI32(00000000), ref: 00491983
            • Part of subcall function 00491930: GetLastError.KERNEL32 ref: 0049198D
            • Part of subcall function 00491930: GetCurrentProcess.KERNEL32(00000008,?), ref: 004919AA
            • Part of subcall function 00491930: OpenProcessToken.ADVAPI32(00000000), ref: 004919B3
            • Part of subcall function 00491930: GetCurrentProcess.KERNEL32(00000008,?), ref: 004919C3
            • Part of subcall function 00491930: OpenProcessToken.ADVAPI32(00000000), ref: 004919C6
            • Part of subcall function 00491930: AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004919ED
            • Part of subcall function 00491930: LocalAlloc.KERNEL32(00000040,00000014), ref: 00491A05
            • Part of subcall function 00491930: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00491A14
            • Part of subcall function 00491930: GetLengthSid.ADVAPI32(00000000), ref: 00491A26
            • Part of subcall function 00491930: LocalAlloc.KERNEL32(00000040,00000010), ref: 00491A32
            • Part of subcall function 00491930: InitializeAcl.ADVAPI32(00000000,00000010,00000002), ref: 00491A42
            • Part of subcall function 00491930: AddAccessAllowedAce.ADVAPI32(00000000,00000002,00000003,00000000), ref: 00491A58
            • Part of subcall function 00491B20: GetModuleFileNameW.KERNEL32(00000000,?,00000104,C94B88FF,00000000,00000000), ref: 00491B97
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Process$CurrentInitializeOpenToken$AllocLocalThread$AccessAllocateAllowedDescriptorErrorExitFileImpersonateLastLengthModuleNameSecuritySelflstrcmp
          • String ID: -service
          • API String ID: 2077529461-2074144066
          • Opcode ID: b51ae6db1ab88941767d291077cbd663d0132d0fa5c25d62052e254ca2bba06c
          • Instruction ID: 503aded75bca2879fa99beb45a6a11860081647b3a0bbb5b21bd98308d49ee1d
          • Opcode Fuzzy Hash: b51ae6db1ab88941767d291077cbd663d0132d0fa5c25d62052e254ca2bba06c
          • Instruction Fuzzy Hash: F7F0F930D04106A6CF10BF7699027BEBFA49F19318F11427FF90463261EA286990829E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 174 499cd4-499cdf 175 499ced-499cf3 174->175 176 499ce1-499ceb 174->176 178 499d0c-499d1d RtlAllocateHeap 175->178 179 499cf5-499cf6 175->179 176->175 177 499d21-499d2c call 499cc1 176->177 183 499d2e-499d30 177->183 180 499cf8-499cff call 499294 178->180 181 499d1f 178->181 179->178 180->177 187 499d01-499d0a call 4985c4 180->187 181->183 187->177 187->178
          APIs
          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0049B282,00000001,00000364,00000006,000000FF,?,004983A3,?,?,00000200,?,00491F2C), ref: 00499D15
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: 76b38f3a6f9616f9569c9256a9eca45b7016f51f06e2d98d6f4811454ce3998e
          • Instruction ID: 4975576fd508e0b127f2290639dd10ad8be0c943e7fa38bc9ff7e387ef61d96e
          • Opcode Fuzzy Hash: 76b38f3a6f9616f9569c9256a9eca45b7016f51f06e2d98d6f4811454ce3998e
          • Instruction Fuzzy Hash: A9F0E93150012477EF255BAE9D85A5F3F98EF46770B19863FAC059B281CA28DC4086AC

          Control-flow Graph

          APIs
          • wsprintfW.USER32 ref: 00492212
          • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 0049222E
          • OpenServiceW.ADVAPI32(00000000,00000000,000F01FF), ref: 00492247
          • CloseServiceHandle.ADVAPI32(00000000), ref: 00492257
          • CloseServiceHandle.ADVAPI32(00000000), ref: 00492264
          • CreateServiceW.ADVAPI32(00000000,00000000,?,000F01FF,?,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 004922A1
          • lstrcpyW.KERNEL32(?,SYSTE), ref: 004922BD
          • lstrlenW.KERNEL32(?), ref: 004922CA
          • lstrcpyW.KERNEL32(?,M\Curr), ref: 004922E1
          • lstrlenW.KERNEL32(?), ref: 004922E8
          • lstrcpyW.KERNEL32(?,entCont), ref: 004922FF
          • lstrlenW.KERNEL32(?), ref: 00492306
          • lstrcpyW.KERNEL32(?,rolSet\), ref: 0049231D
          • lstrlenW.KERNEL32(?), ref: 00492324
          • lstrcpyW.KERNEL32(?,Servi), ref: 0049233B
          • lstrlenW.KERNEL32(?), ref: 00492342
          • lstrcpyW.KERNEL32(?,ces\), ref: 00492359
          • lstrlenW.KERNEL32(?), ref: 00492360
          • lstrcpyW.KERNEL32(?,?), ref: 0049237E
          • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000002,?), ref: 00492397
          • lstrcpyW.KERNEL32(?,004AC040), ref: 004923B1
          • lstrlenW.KERNEL32(?), ref: 004923C0
          • lstrcpyW.KERNEL32(00000000,004AC048), ref: 004923D1
          • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,?,00000004), ref: 004923F3
          • lstrcpyW.KERNEL32(?,Desc), ref: 00492401
          • lstrlenW.KERNEL32(?), ref: 0049240A
          • lstrcpyW.KERNEL32(?,rip), ref: 0049241D
          • lstrlenW.KERNEL32(?), ref: 0049242A
          • lstrcpyW.KERNEL32(?,tion), ref: 0049243D
          • lstrlenW.KERNEL32(?), ref: 0049244A
          • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,00000001), ref: 00492460
          • RegCloseKey.ADVAPI32(?), ref: 0049246D
          • CloseServiceHandle.ADVAPI32(?), ref: 00492485
          • CloseServiceHandle.ADVAPI32(?), ref: 0049249A
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrcpy$lstrlen$Service$Close$Handle$Open$Value$CreateManagerwsprintf
          • String ID: "%s" -service$Desc$M\Curr$SYSTE$Servi$ces\$entCont$rip$rolSet\$tion
          • API String ID: 1302190746-3081135776
          • Opcode ID: bf24f7cce1e50ce88070fb1e9c317137ea722caf29fea24ecaf900b2e7027f40
          • Instruction ID: 3cceacb72383bb2eb049c7fc0878346b63a720cf428f9548308c451c3352ebea
          • Opcode Fuzzy Hash: bf24f7cce1e50ce88070fb1e9c317137ea722caf29fea24ecaf900b2e7027f40
          • Instruction Fuzzy Hash: 9771557290522CAFCB10DBA0DD44FDA7BBDEF49301F0500A6F705A3191DB74AA958F98

          Control-flow Graph

          APIs
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,00000000), ref: 0049216B
          • lstrlenW.KERNEL32(?), ref: 00492178
          • SHSetValueW.SHLWAPI(80000001,006F0053,TabletPCInputServices,00000001,?,00000000), ref: 0049219D
          • ExitProcess.KERNEL32 ref: 004921AC
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ExitFileModuleNameProcessValuelstrlen
          • String ID: @rt$R$S$TabletPCInputServices$V$\$\$\$d$f$f$i$i$i$n$n$n$r$r$r$r$s$u$w$w
          • API String ID: 2356826538-302260228
          • Opcode ID: b516c702de16d20d13c2c725dcbc0128b718e44e3412b19cf0b064590ecacadc
          • Instruction ID: 60e2c49e4ae5ab80d7751187d480cad084f087e3448e5c3055edf5ddd53db33d
          • Opcode Fuzzy Hash: b516c702de16d20d13c2c725dcbc0128b718e44e3412b19cf0b064590ecacadc
          • Instruction Fuzzy Hash: 5031E8B090021CEEEB10CF91E949BEDBFB5EB05748F104129A6156A291D7B64688CFA4

          Control-flow Graph

          APIs
          • ImpersonateSelf.ADVAPI32(00000002), ref: 00491964
          • GetCurrentThread.KERNEL32 ref: 0049197C
          • OpenThreadToken.ADVAPI32(00000000), ref: 00491983
          • GetLastError.KERNEL32 ref: 0049198D
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 004919AA
          • OpenProcessToken.ADVAPI32(00000000), ref: 004919B3
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 004919C3
          • OpenProcessToken.ADVAPI32(00000000), ref: 004919C6
          • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004919ED
          • LocalAlloc.KERNEL32(00000040,00000014), ref: 00491A05
          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00491A14
          • GetLengthSid.ADVAPI32(00000000), ref: 00491A26
          • LocalAlloc.KERNEL32(00000040,00000010), ref: 00491A32
          • InitializeAcl.ADVAPI32(00000000,00000010,00000002), ref: 00491A42
          • AddAccessAllowedAce.ADVAPI32(00000000,00000002,00000003,00000000), ref: 00491A58
          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 00491A6C
          • SetSecurityDescriptorGroup.ADVAPI32(00000000,00000000,00000000), ref: 00491A7C
          • SetSecurityDescriptorOwner.ADVAPI32(00000000,00000000,00000000), ref: 00491A8C
          • IsValidSecurityDescriptor.ADVAPI32(00000000), ref: 00491A97
          • AccessCheck.ADVAPI32(00000000,?,00000001,00000001,?,00000014,?,00000000), ref: 00491AD7
          • RevertToSelf.ADVAPI32 ref: 00491AE1
          • LocalFree.KERNEL32(00000000), ref: 00491AEF
          • LocalFree.KERNEL32(00000000), ref: 00491AF7
          • FreeSid.ADVAPI32(00000000), ref: 00491B07
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: DescriptorSecurity$LocalProcess$CurrentFreeInitializeOpenToken$AccessAllocSelfThread$AllocateAllowedCheckDaclErrorGroupImpersonateLastLengthOwnerRevertValid
          • String ID:
          • API String ID: 897049590-0
          • Opcode ID: 3bc0e8f9cdd8c72f0e724855255cbb110ac131844420f00f8f644bba313b73d3
          • Instruction ID: fec36ffe7706dbf05d09ce1652524ee4c47dd18af18c7262daa56e268468f881
          • Opcode Fuzzy Hash: 3bc0e8f9cdd8c72f0e724855255cbb110ac131844420f00f8f644bba313b73d3
          • Instruction Fuzzy Hash: 01515F71A4120AABEF11DFA1DD49FAF7FBCAF05740F054025F601E62A0DBB89D458B68

          Control-flow Graph

          APIs
          • GetCurrentProcessId.KERNEL32 ref: 00491ED1
          • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 00491EDF
          • GetUserNameA.ADVAPI32(?,?), ref: 00491EF3
          • lstrcatA.KERNEL32(?,Unknown), ref: 00491F09
            • Part of subcall function 004916F0: ReleaseMutex.KERNEL32(?,C94B88FF,00000000,00000000,004A5800,000000FF,?,00492073), ref: 00491727
            • Part of subcall function 004916F0: CloseHandle.KERNEL32(?,?,00492073), ref: 00491733
          • lstrcpyA.KERNEL32(00000000,?), ref: 00491F60
          • ReleaseMutex.KERNEL32(?), ref: 00491F80
          • CloseHandle.KERNEL32(?), ref: 00491F8C
          • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00491FA1
          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00491FD1
          • WinExec.KERNEL32(?,00000000), ref: 0049202B
          • WinExec.KERNEL32(?,00000000), ref: 00492059
          • GetCurrentProcessId.KERNEL32 ref: 00492073
            • Part of subcall function 00491DA0: CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,00000000,00000000,00000000), ref: 00491DDF
            • Part of subcall function 00491DA0: Process32First.KERNEL32(00000000,?), ref: 00491DED
            • Part of subcall function 00491DA0: OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00491E10
            • Part of subcall function 00491DA0: TerminateProcess.KERNEL32(00000000,00000000), ref: 00491E1D
            • Part of subcall function 00491DA0: Process32Next.KERNEL32(00000000,?), ref: 00491E40
            • Part of subcall function 00491DA0: CloseHandle.KERNEL32(00000000), ref: 00491E47
          • ExitProcess.KERNEL32 ref: 00492082
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Process$CloseHandleMutex$CreateCurrentExecNameProcess32Release$ExitFileFirstModuleNextOpenSessionSnapshotTerminateToolhelp32Userlstrcatlstrcpy
          • String ID: %sResideVirtual%d$TabletPCInputServices$Unknown$schtasks /create /tn "%s" /tr "%s" /sc minute /mo %d /f$schtasks /create /tn "%s" /tr "%s" /sc minute /mo %d /ru system /f$schtasks /run /tn "%s"
          • API String ID: 749260584-984207080
          • Opcode ID: 58cf3f2e19dcd830df8c48d95cf52b3e109ea32f1e6f5d63a688aadf2e26ae5c
          • Instruction ID: c5e2958a9c6c2f350d9d18eb8f9f819d2de1da44193f051f2d5fdee2f8e93d67
          • Opcode Fuzzy Hash: 58cf3f2e19dcd830df8c48d95cf52b3e109ea32f1e6f5d63a688aadf2e26ae5c
          • Instruction Fuzzy Hash: BC41B7B1A45318ABDF20DB60DC4AFDA7B7CAB15704F0401A6F645E71C1DBB46AC48F58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 271 491480-4914b4 272 4914b7-4914c0 271->272 272->272 273 4914c2-4914df call 4917d0 272->273 276 4914e1-4914f4 273->276 277 491510-491523 call 492d90 273->277 278 491506-49150d call 492dd1 276->278 279 4914f6-491504 276->279 278->277 279->278 281 491524-49155a call 498564 279->281 288 491560-491624 call 4943e0 * 2 call 491450 call 4911f0 * 2 call 491000 lstrcatW call 491480 lstrcatW lstrlenW 281->288 289 4916d7-4916e7 call 492d90 281->289 306 49164a-491653 lstrlenW 288->306 307 491626-491629 288->307 308 491655-49165a 306->308 309 491667-491672 lstrlenW 306->309 310 491630-491635 307->310 308->309 313 49165c-491665 308->313 314 491691-49169a lstrlenW 309->314 315 491674 309->315 311 49163b-491645 lstrlenW 310->311 312 491637 310->312 311->310 316 491647 311->316 312->311 313->308 313->309 318 49169c 314->318 319 4916b2-4916d6 lstrcatW * 2 314->319 317 491677-49167c 315->317 316->306 320 49167e 317->320 321 491682-49168c lstrlenW 317->321 322 4916a0-4916a5 318->322 319->289 320->321 321->317 323 49168e 321->323 322->319 324 4916a7-4916b0 322->324 323->314 324->319 324->322
          APIs
          • lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491684
            • Part of subcall function 00491480: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491692
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 004916C2
            • Part of subcall function 00491480: lstrcatW.KERNEL32(?,006B1FF8,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?), ref: 004916CC
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$lstrcat
          • String ID: ASJG943P9TGEAGAGP$MZP$SHOIOJGA094953-$askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
          • API String ID: 493641738-2741108744
          • Opcode ID: a8d2572f8fd157a0467df45bb091da27454174081d039cfa1dae71fad27b1cf6
          • Instruction ID: 537a477a7d8768b4a8f2df014eee6bede5d2e4bb6e43d21df6334e25e0ddf682
          • Opcode Fuzzy Hash: a8d2572f8fd157a0467df45bb091da27454174081d039cfa1dae71fad27b1cf6
          • Instruction Fuzzy Hash: 2361F670600205AFCB20DF29DD85BAFBBF5EF85304F04852EE546972A1DB78AD41CB99

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 325 491530-49155a 326 491560-491624 call 4943e0 * 2 call 491450 call 4911f0 * 2 call 491000 lstrcatW call 491480 lstrcatW lstrlenW 325->326 327 4916d7-4916e7 call 492d90 325->327 344 49164a-491653 lstrlenW 326->344 345 491626-491629 326->345 346 491655-49165a 344->346 347 491667-491672 lstrlenW 344->347 348 491630-491635 345->348 346->347 351 49165c-491665 346->351 352 491691-49169a lstrlenW 347->352 353 491674 347->353 349 49163b-491645 lstrlenW 348->349 350 491637 348->350 349->348 354 491647 349->354 350->349 351->346 351->347 356 49169c 352->356 357 4916b2-4916d6 lstrcatW * 2 352->357 355 491677-49167c 353->355 354->344 358 49167e 355->358 359 491682-49168c lstrlenW 355->359 360 4916a0-4916a5 356->360 357->327 358->359 359->355 361 49168e 359->361 360->357 362 4916a7-4916b0 360->362 361->352 362->357 362->360
          APIs
          • lstrcatW.KERNEL32(?,00000008,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00491604
          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491613
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049161C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049163D
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049164B
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 0049166A
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491684
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 00491692
          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?,00000000), ref: 004916C2
          • lstrcatW.KERNEL32(?,006B1FF8,?,?,?,?,?,?,?,?,?,?,?,?,0000000A,?), ref: 004916CC
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: lstrlen$lstrcat
          • String ID: ASJG943P9TGEAGAGP$MZP$SHOIOJGA094953-$askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG
          • API String ID: 493641738-2741108744
          • Opcode ID: 75c905cb566b79080cb020569c30e038d5dba22884149851e4b86ceacd9866b4
          • Instruction ID: 53908bf14a11770d340f0550d9eae5510cbcf3eff139a46ca88e6dd4b6a6360e
          • Opcode Fuzzy Hash: 75c905cb566b79080cb020569c30e038d5dba22884149851e4b86ceacd9866b4
          • Instruction Fuzzy Hash: 8A51D470900215AFCB20DF65DD85BABBFF8EF45304F04852EE542A72A1D778AD41C798
          APIs
          • ___free_lconv_mon.LIBCMT ref: 0049DFA4
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB36
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB48
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB5A
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB6C
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB7E
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DB90
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBA2
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBB4
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBC6
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBD8
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBEA
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DBFC
            • Part of subcall function 0049DB19: _free.LIBCMT ref: 0049DC0E
          • _free.LIBCMT ref: 0049DF99
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DFBB
          • _free.LIBCMT ref: 0049DFD0
          • _free.LIBCMT ref: 0049DFDB
          • _free.LIBCMT ref: 0049DFFD
          • _free.LIBCMT ref: 0049E010
          • _free.LIBCMT ref: 0049E01E
          • _free.LIBCMT ref: 0049E029
          • _free.LIBCMT ref: 0049E061
          • _free.LIBCMT ref: 0049E068
          • _free.LIBCMT ref: 0049E085
          • _free.LIBCMT ref: 0049E09D
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
          • String ID: J
          • API String ID: 161543041-2157922337
          • Opcode ID: d1277a13de082da91929ca57ecbbfccbf60eaf1c4f8dd8c92cb920cc87748433
          • Instruction ID: eb586024dd964233a58823a3a268cc559cc2def3b6b0fa563b3df1a4a0a16598
          • Opcode Fuzzy Hash: d1277a13de082da91929ca57ecbbfccbf60eaf1c4f8dd8c92cb920cc87748433
          • Instruction Fuzzy Hash: 1F314F316002019FEF21AA7AD886B5B7BE8AF00359F14493FE455D7295DB7DEC818B28
          APIs
            • Part of subcall function 00491E90: GetCurrentProcessId.KERNEL32 ref: 00491ED1
            • Part of subcall function 00491E90: ProcessIdToSessionId.KERNEL32(00000000,?), ref: 00491EDF
            • Part of subcall function 00491E90: GetUserNameA.ADVAPI32(?,?), ref: 00491EF3
            • Part of subcall function 00491E90: lstrcatA.KERNEL32(?,Unknown), ref: 00491F09
            • Part of subcall function 00491E90: lstrcpyA.KERNEL32(00000000,?), ref: 00491F60
            • Part of subcall function 00491E90: ReleaseMutex.KERNEL32(?), ref: 00491F80
            • Part of subcall function 00491E90: CloseHandle.KERNEL32(?), ref: 00491F8C
            • Part of subcall function 00491E90: CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00491FA1
            • Part of subcall function 00491E90: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00491FD1
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C94B88FF,00000000,00000000), ref: 00491B97
          • ExitProcess.KERNEL32 ref: 00491D15
          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000001,?,?,00000000), ref: 00491D2B
          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00000000), ref: 00491D3B
          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00000000), ref: 00491D4C
          • CloseServiceHandle.ADVAPI32(00000000,?,?,00000000), ref: 00491D59
          • CloseServiceHandle.ADVAPI32(00000000,?,?,00000000), ref: 00491D60
          • ExitProcess.KERNEL32 ref: 00491D71
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ProcessService$CloseHandleName$ExitFileModuleMutexOpen$CreateCurrentManagerReleaseSessionStartUserlstrcatlstrcpy
          • String ID:
          • API String ID: 3235917964-0
          • Opcode ID: 539cc90bafc1a1d0ea64264256f86966af5f47e430af3f3d51a400eba62a5910
          • Instruction ID: 0a83df48254017662a87b9194f1a81ff3f91bc0af9b80274ff92e1d14f61b026
          • Opcode Fuzzy Hash: 539cc90bafc1a1d0ea64264256f86966af5f47e430af3f3d51a400eba62a5910
          • Instruction Fuzzy Hash: A851E3759002199BDF24DB24DC8DBDEBB75EF45304F1442ADE909A72A0DB786B80CF58
          APIs
          • _ValidateLocalCookies.LIBCMT ref: 0049413B
          • ___except_validate_context_record.LIBVCRUNTIME ref: 00494143
          • _ValidateLocalCookies.LIBCMT ref: 004941D1
          • __IsNonwritableInCurrentImage.LIBCMT ref: 004941FC
          • _ValidateLocalCookies.LIBCMT ref: 00494251
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
          • String ID: csm
          • API String ID: 1170836740-1018135373
          • Opcode ID: f7a3e57d5f633a1c0618d8346cf0893e0e84aa6a1b94c82747fe3ea4f2c83c95
          • Instruction ID: 2e0e896b00721ce58a5de16ce711141b8c7ecd5391cce2bed5df2f8c33e95adc
          • Opcode Fuzzy Hash: f7a3e57d5f633a1c0618d8346cf0893e0e84aa6a1b94c82747fe3ea4f2c83c95
          • Instruction Fuzzy Hash: 7F41F534A002089BCF10DF69C849E9E7FB1AF95328F14817BE8145B392D739D956CB99
          APIs
          • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,00000000,00000000,00000000), ref: 00491DDF
          • Process32First.KERNEL32(00000000,?), ref: 00491DED
          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00491E10
          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00491E1D
          • Process32Next.KERNEL32(00000000,?), ref: 00491E40
          • CloseHandle.KERNEL32(00000000), ref: 00491E47
          • CloseHandle.KERNEL32(00000000), ref: 00491E65
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
          • String ID:
          • API String ID: 2696918072-0
          • Opcode ID: ab9da6b530e0361f058e4a3a2c805af1d98300b09b231a9ecff0a39087a49c40
          • Instruction ID: 89a31b4b17e2b7eeb363f531c70724ee5c2f17b1021540201aa2ac1f7be39cc9
          • Opcode Fuzzy Hash: ab9da6b530e0361f058e4a3a2c805af1d98300b09b231a9ecff0a39087a49c40
          • Instruction Fuzzy Hash: 5721C9312043016BDF20DF20EC85BBB7FE8EB86755F44053EF959862D0DB24AC45C69A
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID:
          • String ID: api-ms-$ext-ms-
          • API String ID: 0-537541572
          • Opcode ID: 25dac25b284b70273728739754db045336454ef3bc38b9ad438a51e46d58cc2b
          • Instruction ID: e7ba4160d83b0256485b359bc08f81c96f7d92a38c5635af6a8a54c988ae9fe0
          • Opcode Fuzzy Hash: 25dac25b284b70273728739754db045336454ef3bc38b9ad438a51e46d58cc2b
          • Instruction Fuzzy Hash: D521C631E01220ABCF21CA6D8C40B1B3F58AB52BA0F25053EED16A73D1D638ED0186E9
          APIs
            • Part of subcall function 0049DC80: _free.LIBCMT ref: 0049DCA5
          • _free.LIBCMT ref: 0049DD06
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DD11
          • _free.LIBCMT ref: 0049DD1C
          • _free.LIBCMT ref: 0049DD70
          • _free.LIBCMT ref: 0049DD7B
          • _free.LIBCMT ref: 0049DD86
          • _free.LIBCMT ref: 0049DD91
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: d88016c8f192cd9e66b99b433c08ba9ba6908eb77d80b9a979daad6b387c8377
          • Instruction ID: 4b9091c4d3222095dcbe060a091ca258ac514cce20150f75e62a791e4c8ab645
          • Opcode Fuzzy Hash: d88016c8f192cd9e66b99b433c08ba9ba6908eb77d80b9a979daad6b387c8377
          • Instruction Fuzzy Hash: 6D115471940704AAEE20B7B2CD87FCB7F9C9F00708F400D3EF29966156D6BDB9449654
          APIs
          • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 0049EF71
          • __fassign.LIBCMT ref: 0049F156
          • __fassign.LIBCMT ref: 0049F173
          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0049F1BB
          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0049F1FB
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0049F2A3
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
          • String ID:
          • API String ID: 1735259414-0
          • Opcode ID: fa56a7d7dd016bedc8c05fa55a22cb3fc43d6ce2e050500ab4d2f4302e0ab7f2
          • Instruction ID: 813a38873e0932aec4ca3fc2dbdca634121a3675a25122b699d79e17005a8541
          • Opcode Fuzzy Hash: fa56a7d7dd016bedc8c05fa55a22cb3fc43d6ce2e050500ab4d2f4302e0ab7f2
          • Instruction Fuzzy Hash: 6BC16C75D002589FCF14CFE9C880AEDBFB5AF49314F2841BAE815EB242D6359D46CB68
          APIs
          • GetLastError.KERNEL32(?,00000200,?,00496BAE,00000200,00000000,?,?,00496703,?,00000000,00000200,00000000), ref: 0049B0E5
          • _free.LIBCMT ref: 0049B142
          • _free.LIBCMT ref: 0049B178
          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00496703,?,00000000,00000200,00000000), ref: 0049B183
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID: 8J
          • API String ID: 2283115069-3490681954
          • Opcode ID: 7316175678f8aefb2e4ebcde6f50e06eaffc2c0a1982e976c03e29297e543b8b
          • Instruction ID: d4244da54fe59ed5ac86e02457e4fb1b7bdbba9c5f022ded2a9adca4d33d5212
          • Opcode Fuzzy Hash: 7316175678f8aefb2e4ebcde6f50e06eaffc2c0a1982e976c03e29297e543b8b
          • Instruction Fuzzy Hash: CB110A322145112A9F116AB7BD97D6B2D8AEBC27F9F25063FF264822D1DB3D8C01419D
          APIs
          • GetLastError.KERNEL32(00000000,00000200,00000000,00499CC6,00496890,00000000,?,004983A3,?,?,00000200,?,00491F2C,?,?), ref: 0049B23C
          • _free.LIBCMT ref: 0049B299
          • _free.LIBCMT ref: 0049B2CF
          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,004983A3,?,?,00000200,?,00491F2C,?,?,?,00491472,00000000,?), ref: 0049B2DA
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID: 8J
          • API String ID: 2283115069-3490681954
          • Opcode ID: 9370c5eb15f639d6794b5764ef4ac21887e1f967f18eeee0593d23259089c6f2
          • Instruction ID: ad39fcfb4cace2d4be5a1f0bceffdfc23a7b8249a7702fc42ca0da63e85a0dd1
          • Opcode Fuzzy Hash: 9370c5eb15f639d6794b5764ef4ac21887e1f967f18eeee0593d23259089c6f2
          • Instruction Fuzzy Hash: 86112C322042016ADF116BB6BD89D5F2E99EBC2779F25027FF224822E1DF3D8C01519D
          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00499053,00000000,?,0049901B,?,?,00000000), ref: 00499073
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00499086
          • FreeLibrary.KERNEL32(00000000,?,?,00499053,00000000,?,0049901B,?,?,00000000), ref: 004990A9
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: 696ecf7f67fcc4b6cc6a55144c9b37f603081c8a3445929d2324e338db5119e8
          • Instruction ID: 73b419070b5206dcd383a705adbb13ee9e800685d1d247fd0fd1b31ef5e69d2f
          • Opcode Fuzzy Hash: 696ecf7f67fcc4b6cc6a55144c9b37f603081c8a3445929d2324e338db5119e8
          • Instruction Fuzzy Hash: A9F0A031601218FBCF219B64DD0EB9E7EB8EB05756F154079F504A21A2CB788E00DBD8
          APIs
          • _free.LIBCMT ref: 0049DC2F
            • Part of subcall function 00499D31: HeapFree.KERNEL32(00000000,00000000,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200), ref: 00499D47
            • Part of subcall function 00499D31: GetLastError.KERNEL32(004AE200,?,0049DCAA,004AE200,00000000,004AE200,00000000,?,0049DCD1,004AE200,00000007,004AE200,?,0049E0F7,004AE200,004AE200), ref: 00499D59
          • _free.LIBCMT ref: 0049DC41
          • _free.LIBCMT ref: 0049DC53
          • _free.LIBCMT ref: 0049DC65
          • _free.LIBCMT ref: 0049DC77
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: afe3247d2ce1cdfe87e7c7d44f29fe1f0ed3777ac2fc4dba23e70eed9de8112a
          • Instruction ID: d77649f19d10f279535a697354c2db7d803938f746dd6e28a311364662f1fc50
          • Opcode Fuzzy Hash: afe3247d2ce1cdfe87e7c7d44f29fe1f0ed3777ac2fc4dba23e70eed9de8112a
          • Instruction Fuzzy Hash: A1F06232904601A78E20DB9AE9C6C1B7FD9EA05355B540C2FF058D7601CB7CFC80C66C
          APIs
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _strrchr
          • String ID:
          • API String ID: 3213747228-0
          • Opcode ID: 4d188971a6fa4204caef89fb7e3ccd4c4c55d280ea87260fd91b417bae0265c5
          • Instruction ID: f60097497dee1ec4074d170ece3165cf11303ba9657d105f34cfea86aec4aadb
          • Opcode Fuzzy Hash: 4d188971a6fa4204caef89fb7e3ccd4c4c55d280ea87260fd91b417bae0265c5
          • Instruction Fuzzy Hash: 32B13331900245AFDF118F68DA81BAEBFE5EF95314F1541BBE844AB341D7389D02CBA9
          APIs
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,00000000,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000), ref: 004A391E
          • GetLastError.KERNEL32(?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?,00000000,?,0049F84C,?), ref: 004A392A
            • Part of subcall function 004A38F0: CloseHandle.KERNEL32(FFFFFFFE,004A393A,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?,00000000), ref: 004A3900
          • ___initconout.LIBCMT ref: 004A393A
            • Part of subcall function 004A38B2: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004A38E1,004A29A4,00000000,?,0049F300,?,00000000,00000000,?), ref: 004A38C5
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,?,004A29B7,00000000,00000001,00000000,00000000,?,0049F300,?,00000000,00000000,?), ref: 004A394F
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
          • String ID:
          • API String ID: 2744216297-0
          • Opcode ID: 475b23788058356c487cabd9e0dfcbf61c460955b3eeda064c9983c576e24d88
          • Instruction ID: 7441f08516ac10a6ff437d365a4b07333a29cb6c9f70fdeb7bd1a75283ac3e65
          • Opcode Fuzzy Hash: 475b23788058356c487cabd9e0dfcbf61c460955b3eeda064c9983c576e24d88
          • Instruction Fuzzy Hash: 4EF03736400115BFCF227FD1DC04A9A7F66FB1A361F058029FE1986130D6768D609B99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: _free
          • String ID: 8J
          • API String ID: 269201875-3490681954
          • Opcode ID: 0b0e71b80875c557a2f131051416c8c1f85d3034fc58a384c5bc01849fa072f5
          • Instruction ID: 83e6cfa1de8f275722c780beca3b336ec12d23cf16cd9c493132b78e9d9d1b08
          • Opcode Fuzzy Hash: 0b0e71b80875c557a2f131051416c8c1f85d3034fc58a384c5bc01849fa072f5
          • Instruction Fuzzy Hash: 9801283140523226DE223776BD1AE6F1D44CF12BA9F14073BF960A52E9DB2C8C1141DE
          APIs
          • __CxxThrowException@8.LIBVCRUNTIME ref: 00493317
            • Part of subcall function 004942E9: RaiseException.KERNEL32(?,?,?,93I,00000000,00000000,00000000,?,?,?,?,?,00493339,?,004AC838,%sResideVirtual%d), ref: 00494349
          • __CxxThrowException@8.LIBVCRUNTIME ref: 00493334
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.3889706970.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
          • Associated: 00000004.00000002.3889687828.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889729142.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889761126.00000000004AE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000004B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889780984.00000000005CD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.00000000006B2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3889897120.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000004.00000002.3890019739.00000000008B2000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_490000_OPyF68i97j.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionRaise
          • String ID: Unknown exception
          • API String ID: 3476068407-410509341
          • Opcode ID: 682fe5d4504e22df046d7b75d131f6ae458e62a6e892a0ad61f0fd513a808a65
          • Instruction ID: 81b97e415f7bb619a1a557b0752e873be8e308b0e45b4d68003930d2f8cfe19f
          • Opcode Fuzzy Hash: 682fe5d4504e22df046d7b75d131f6ae458e62a6e892a0ad61f0fd513a808a65
          • Instruction Fuzzy Hash: 6BF0F434900208B78F10BBA6D909D9E7F6C6A12714B60817BB81485181EF6CEB06859C

          Execution Graph

          Execution Coverage:4.7%
          Dynamic/Decrypted Code Coverage:75.8%
          Signature Coverage:11.6%
          Total number of Nodes:1038
          Total number of Limit Nodes:41
          execution_graph 35513 1221e33 35514 1221e3f ___DestructExceptionObject 35513->35514 35527 122233b 35514->35527 35516 1221e46 35517 1221e70 35516->35517 35518 1221f35 35516->35518 35524 1221e4b ___scrt_is_nonwritable_in_current_image __fassign 35516->35524 35538 122229d IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 35517->35538 35541 12224f8 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 35518->35541 35521 1221f3c 35522 1221e7f __RTC_Initialize 35522->35524 35539 12221bb InitializeSListHead 35522->35539 35525 1221e8d ___scrt_initialize_default_local_stdio_options 35525->35524 35540 1222272 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 35525->35540 35528 1222344 35527->35528 35542 12226dc IsProcessorFeaturePresent 35528->35542 35530 1222350 35543 1222a4a 10 API calls 3 library calls 35530->35543 35532 1222355 35537 1222359 35532->35537 35544 1224baa 35532->35544 35535 1222370 35535->35516 35537->35516 35538->35522 35539->35525 35540->35524 35541->35521 35542->35530 35543->35532 35548 12272f1 35544->35548 35547 1222a89 8 API calls 3 library calls 35547->35537 35549 1227301 35548->35549 35550 1222362 35548->35550 35549->35550 35552 12271b1 35549->35552 35550->35535 35550->35547 35553 12271b8 35552->35553 35554 12271fb GetStdHandle 35553->35554 35555 1227261 35553->35555 35556 122720e GetFileType 35553->35556 35554->35553 35555->35549 35556->35553 35557 406d02 35558 406d12 35557->35558 35572 40701b 35558->35572 35560 406d2a 35575 406a78 35560->35575 35562 406d6e 35563 406dc6 35562->35563 35565 406d73 35562->35565 35564 406de2 LoadLibraryA 35563->35564 35569 40741a 35564->35569 35588 40d538 7 API calls 35565->35588 35567 406d96 GetModuleHandleA 35568 406db3 35567->35568 35571 4074d1 35569->35571 35584 4095da 35569->35584 35589 406f0a GetPEB 35572->35589 35574 407060 35574->35560 35576 406a88 35575->35576 35577 406ac8 35576->35577 35578 406b7b 35576->35578 35580 406b10 35577->35580 35581 406add lstrcmpiA 35577->35581 35579 419018 7 API calls 35578->35579 35583 406af9 35579->35583 35591 419018 35580->35591 35581->35577 35581->35583 35583->35562 35585 40962e 35584->35585 35674 40897a CreateFileA 35585->35674 35588->35567 35590 406f3b 35589->35590 35590->35574 35592 41902a 35591->35592 35594 419045 35592->35594 35595 419b74 35592->35595 35594->35583 35596 419b80 35595->35596 35597 419b87 35595->35597 35596->35592 35619 419438 35597->35619 35600 419bae 35602 419bd1 35600->35602 35606 419bfe 35600->35606 35651 419448 LeaveCriticalSection 35602->35651 35603 419d7a 35608 419dc4 35603->35608 35609 419d88 35603->35609 35604 419e4d 35607 419684 7 API calls 35604->35607 35606->35603 35606->35604 35610 419e56 35607->35610 35653 419448 LeaveCriticalSection 35608->35653 35652 419448 LeaveCriticalSection 35609->35652 35611 419e69 35610->35611 35612 419e5b 35610->35612 35655 419448 LeaveCriticalSection 35611->35655 35654 419448 LeaveCriticalSection 35612->35654 35617 419e60 35618 419b74 7 API calls 35617->35618 35618->35596 35656 41c58c EnterCriticalSection 35619->35656 35621 419443 35621->35600 35622 419684 35621->35622 35623 4196aa 35622->35623 35626 4196af 35622->35626 35657 419e74 GlobalMemoryStatus 35623->35657 35625 4197f3 35658 41931c 35625->35658 35626->35625 35628 4196ed 35626->35628 35629 419388 2 API calls 35628->35629 35630 419782 35629->35630 35631 4197a4 35630->35631 35632 419789 35630->35632 35636 419388 2 API calls 35631->35636 35668 419598 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35632->35668 35634 41991a 35662 419388 35634->35662 35638 4197b3 35636->35638 35642 41979a 35638->35642 35669 419598 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35638->35669 35639 41988c 35641 4198b6 35639->35641 35645 419388 2 API calls 35639->35645 35643 419388 2 API calls 35641->35643 35642->35600 35647 4198d1 35643->35647 35648 41989f 35645->35648 35647->35642 35671 419598 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35647->35671 35648->35642 35670 419598 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35648->35670 35651->35596 35652->35596 35653->35596 35654->35617 35655->35596 35656->35621 35657->35626 35659 419329 35658->35659 35660 41934e VirtualAlloc 35658->35660 35659->35660 35661 419376 35660->35661 35661->35634 35661->35639 35661->35642 35663 4193b9 35662->35663 35664 41939a VirtualAlloc 35662->35664 35663->35642 35672 419400 VirtualFree 35663->35672 35665 4193c0 35664->35665 35666 4193b0 35664->35666 35665->35663 35665->35664 35673 4193dc VirtualFree 35666->35673 35668->35642 35669->35642 35670->35641 35671->35642 35672->35642 35673->35663 35675 408a69 VirtualAlloc 35674->35675 35679 408ad6 35674->35679 35677 408af2 CloseHandle 35675->35677 35678 408aae ReadFile 35675->35678 35677->35679 35678->35677 35678->35679 35679->35571 35680 132a5a0 35681 132a5b0 35680->35681 35682 132a5b5 Sleep 35681->35682 35683 132a5d5 GetCurrentProcessId 35681->35683 35682->35681 35682->35682 35686 132ccb0 12 API calls 2 library calls 35683->35686 35685 132a5e4 ExitProcess 35686->35685 35687 1221de0 35688 1221deb 35687->35688 35689 1221e1e dllmain_crt_process_detach 35687->35689 35690 1221e10 dllmain_crt_process_attach 35688->35690 35691 1221df0 35688->35691 35693 1221dfa 35689->35693 35690->35693 35692 1221e06 35691->35692 35694 1221df5 35691->35694 35698 12222ab 23 API calls 35692->35698 35694->35693 35697 12222ca 21 API calls 35694->35697 35697->35693 35698->35693 35699 412074 35709 41c528 EnterCriticalSection 35699->35709 35701 412089 SetHandleCount 35702 4120a1 35701->35702 35703 4120a7 GetStartupInfoA 35701->35703 35702->35703 35704 4120d2 35703->35704 35705 4121c0 35704->35705 35706 412173 GetStdHandle GetStdHandle GetStdHandle 35704->35706 35708 41219e 35706->35708 35708->35705 35714 4105f0 35708->35714 35710 41c541 35709->35710 35711 41c54b InitializeCriticalSection LeaveCriticalSection 35709->35711 35717 41c5ac 34 API calls 35710->35717 35711->35701 35713 41c54a 35713->35711 35715 410604 GetFileType 35714->35715 35716 4105ff 35714->35716 35715->35708 35716->35708 35717->35713 35718 1224735 35729 12266fe 35718->35729 35725 122475d 35750 12257d7 14 API calls _free 35725->35750 35726 1224781 35728 1224752 35751 12257d7 14 API calls _free 35728->35751 35730 1224747 35729->35730 35731 1226707 35729->35731 35735 1226bbf GetEnvironmentStringsW 35730->35735 35752 1225298 37 API calls 2 library calls 35731->35752 35733 122672a 35753 122654a 47 API calls 2 library calls 35733->35753 35736 1226bd6 35735->35736 35737 1226c2f 35735->35737 35754 1226ad1 WideCharToMultiByte 35736->35754 35738 1226c35 FreeEnvironmentStringsW 35737->35738 35739 122474c 35737->35739 35738->35739 35739->35728 35749 1224787 25 API calls 2 library calls 35739->35749 35741 1226bef 35741->35737 35742 1226bf9 35741->35742 35755 1227b50 15 API calls _free 35742->35755 35744 1226bff 35745 1226c17 35744->35745 35756 1226ad1 WideCharToMultiByte 35744->35756 35757 12257d7 14 API calls _free 35745->35757 35748 1226c2c 35748->35737 35749->35725 35750->35728 35751->35726 35752->35733 35753->35730 35754->35741 35755->35744 35756->35745 35757->35748 35758 41ac48 35759 419b74 7 API calls 35758->35759 35760 41ac53 35759->35760 35761 41ac60 35760->35761 35762 41ac6b GetModuleFileNameA 35760->35762 35765 41a62c 34 API calls 35761->35765 35764 41ac6a 35764->35762 35765->35764 35766 4015f9 35768 40160c 35766->35768 35767 4016a0 35768->35767 35770 40165b 35768->35770 35772 401ce3 35768->35772 35770->35767 35771 401ce3 12 API calls 35770->35771 35771->35767 35780 401290 35772->35780 35774 401f7f 35792 401221 EnterCriticalSection LeaveCriticalSection 35774->35792 35776 401fa4 35776->35768 35777 401fa6 35777->35776 35793 401221 EnterCriticalSection LeaveCriticalSection 35777->35793 35794 40fa34 35780->35794 35782 4012a0 EnterCriticalSection 35783 401311 LeaveCriticalSection 35782->35783 35784 4012b9 35782->35784 35787 401305 35783->35787 35788 419018 7 API calls 35784->35788 35791 4012e1 35784->35791 35786 401290 8 API calls 35786->35787 35787->35774 35787->35777 35789 4012cb 35788->35789 35789->35791 35795 4011c4 8 API calls 35789->35795 35791->35786 35792->35776 35793->35776 35794->35782 35795->35791 35796 40967a 35801 409672 35796->35801 35803 409020 35796->35803 35797 409692 35799 4096a2 35797->35799 35802 419b74 7 API calls 35797->35802 35800 4096da 35799->35800 35804 419b74 7 API calls 35799->35804 35826 4096b1 35799->35826 35805 419b74 7 API calls 35800->35805 35806 409712 35800->35806 35800->35826 35801->35796 35801->35797 35843 408c5f 35801->35843 35802->35799 35808 4092ad 35803->35808 35813 409281 VirtualProtect 35803->35813 35804->35800 35805->35806 35806->35826 35828 4098bc 35806->35828 35853 411c8c 12 API calls 35806->35853 35831 1222100 35808->35831 35809 4099a5 35856 412704 34 API calls 35809->35856 35810 409375 35835 1221ba0 35810->35835 35812 4099c6 35815 419b74 7 API calls 35812->35815 35812->35826 35813->35808 35814 4092a6 35813->35814 35815->35826 35816 409789 35824 409857 35816->35824 35854 419a60 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35816->35854 35818 409846 35822 419b74 7 API calls 35818->35822 35819 4098e9 35819->35828 35855 419a60 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 35819->35855 35820 409885 35821 419b74 7 API calls 35820->35821 35821->35828 35822->35824 35824->35819 35824->35820 35824->35826 35825 40993b 35827 419b74 7 API calls 35825->35827 35827->35828 35828->35809 35828->35812 35828->35826 35832 1222109 35831->35832 35833 122210e dllmain_dispatch 35831->35833 35857 1222170 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 35832->35857 35833->35810 35836 1221bb7 ___scrt_fastfail 35835->35836 35858 1221000 35836->35858 35838 1221bdd 35839 1221be1 ExitProcess 35838->35839 35840 1221be9 35838->35840 35866 1221670 35840->35866 35842 1221c0c ExitProcess 35844 408c55 35843->35844 35844->35843 35845 408d2d VirtualAlloc 35844->35845 35846 408d26 35844->35846 35845->35846 35849 408d52 35845->35849 35846->35801 35847 4092ad 35852 1222100 5 API calls 35847->35852 35848 409375 35851 1221ba0 313 API calls 35848->35851 35849->35846 35849->35847 35850 409281 VirtualProtect 35849->35850 35850->35846 35850->35847 35851->35846 35852->35848 35853->35816 35854->35818 35855->35825 35856->35826 35857->35833 35862 1221027 ___scrt_fastfail 35858->35862 35859 1221656 35891 1221cae 5 API calls ___raise_securityfailure 35859->35891 35861 1221664 35861->35838 35862->35859 35863 12215e2 35862->35863 35890 1221cae 5 API calls ___raise_securityfailure 35863->35890 35865 1221652 35865->35838 35870 122169d 35866->35870 35867 1221b83 35921 1221cae 5 API calls ___raise_securityfailure 35867->35921 35869 1221b92 35869->35842 35870->35867 35871 122180a VirtualAlloc 35870->35871 35871->35867 35877 1221829 35871->35877 35872 1221a50 35892 132e20b 35872->35892 35873 1221942 LoadLibraryA 35873->35867 35873->35877 35874 12219a7 35874->35872 35875 12219f0 VirtualProtect 35874->35875 35875->35867 35875->35874 35876 1221a66 35878 1221aab 35876->35878 35885 1221ae5 35876->35885 35877->35873 35877->35874 35879 1221b6c 35878->35879 35880 1221ac7 35878->35880 35920 1221cae 5 API calls ___raise_securityfailure 35879->35920 35918 1221cae 5 API calls ___raise_securityfailure 35880->35918 35882 1221b7f 35882->35842 35883 1221b31 35919 1221cae 5 API calls ___raise_securityfailure 35883->35919 35885->35879 35885->35883 35886 1221ae1 35886->35842 35888 1221b54 35888->35842 35890->35865 35891->35861 35893 132e217 __FrameHandler3::FrameUnwindToState 35892->35893 35922 132e4fc 35893->35922 35895 132e21e 35896 132e377 35895->35896 35904 132e248 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 35895->35904 35941 132e810 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 35896->35941 35898 132e37e 35899 132e384 35898->35899 35942 1333dd2 23 API calls __CreateFrameInfo 35898->35942 35943 1333d96 23 API calls __CreateFrameInfo 35899->35943 35902 132e38c 35903 132e267 35903->35876 35904->35903 35905 132e2e8 35904->35905 35940 1333dac 37 API calls 2 library calls 35904->35940 35933 1334e55 35905->35933 35918->35886 35919->35888 35920->35882 35921->35869 35923 132e505 35922->35923 35944 132ea7b IsProcessorFeaturePresent 35923->35944 35925 132e511 35945 132f4a4 10 API calls 3 library calls 35925->35945 35927 132e516 35928 132e51a 35927->35928 35946 13354d4 35927->35946 35928->35895 35931 132e531 35931->35895 35934 132e2fc 35933->35934 35935 1334e5e 35933->35935 35937 132dae0 GetCommandLineW CommandLineToArgvW 35934->35937 36013 1334bb9 49 API calls 35935->36013 36014 132db10 35937->36014 35940->35905 35941->35898 35942->35899 35943->35902 35944->35925 35945->35927 35950 133ae9f 35946->35950 35949 132f4cd 8 API calls 3 library calls 35949->35928 35951 133aeaf 35950->35951 35952 132e523 35950->35952 35951->35952 35955 13370d0 35951->35955 35960 1337184 35951->35960 35952->35931 35952->35949 35956 13370d7 35955->35956 35957 133711a GetStdHandle 35956->35957 35958 1337180 35956->35958 35959 133712d GetFileType 35956->35959 35957->35956 35958->35951 35959->35956 35961 1337190 __FrameHandler3::FrameUnwindToState 35960->35961 35972 13379db EnterCriticalSection 35961->35972 35963 1337197 35973 133a4e2 35963->35973 35968 13371c6 35968->35951 35969 13371b0 35970 13370d0 2 API calls 35969->35970 35971 13371b5 35970->35971 35987 13371db LeaveCriticalSection __CreateFrameInfo 35971->35987 35972->35963 35974 133a4ee __FrameHandler3::FrameUnwindToState 35973->35974 35975 133a4f7 35974->35975 35976 133a518 35974->35976 35996 1335cc1 14 API calls __dosmaperr 35975->35996 35988 13379db EnterCriticalSection 35976->35988 35979 133a4fc 35997 1331800 25 API calls ___std_exception_copy 35979->35997 35981 133a550 35998 133a577 LeaveCriticalSection __CreateFrameInfo 35981->35998 35983 13371a6 35983->35971 35986 133701a 28 API calls 35983->35986 35985 133a524 35985->35981 35989 133a432 35985->35989 35986->35969 35987->35968 35988->35985 35999 1337210 35989->35999 35991 133a444 35995 133a451 35991->35995 36006 133761a 6 API calls __dosmaperr 35991->36006 35993 133a4a6 35993->35985 36007 1335cd4 35995->36007 35996->35979 35997->35983 35998->35983 36005 133721d __dosmaperr 35999->36005 36000 133725d 36002 1335cc1 __dosmaperr 13 API calls 36000->36002 36001 1337248 RtlAllocateHeap 36003 133725b 36001->36003 36001->36005 36002->36003 36003->35991 36004 1334651 __dosmaperr EnterCriticalSection LeaveCriticalSection 36004->36005 36005->36000 36005->36001 36005->36004 36006->35991 36008 1335cdf HeapFree 36007->36008 36009 1335d08 __dosmaperr 36007->36009 36008->36009 36010 1335cf4 36008->36010 36009->35993 36011 1335cc1 __dosmaperr 12 API calls 36010->36011 36012 1335cfa GetLastError 36011->36012 36012->36009 36013->35934 36057 132dedc 36014->36057 36016 132db44 ___scrt_fastfail 36017 132db56 lstrcpyA 36016->36017 36018 132db92 CreateMutexA 36017->36018 36019 132db83 ReleaseMutex CloseHandle 36017->36019 36020 132dbb1 GetLastError 36018->36020 36021 132dbcd 36018->36021 36019->36018 36020->36021 36022 132dbe6 36021->36022 36023 132dbd7 ReleaseMutex CloseHandle 36021->36023 36024 132dec2 ExitProcess 36022->36024 36025 132dbfa CreateMutexA 36022->36025 36023->36022 36066 1322020 36025->36066 36028 1322020 3 API calls 36029 132dc60 36028->36029 36069 1321ff0 36029->36069 36031 132dc88 36072 132d800 36031->36072 36034 132dcc2 36093 1321c50 36034->36093 36035 1321c50 25 API calls 36035->36034 36037 132dcf2 36038 132d800 26 API calls 36037->36038 36039 132dd0b 36038->36039 36040 132dd1a 36039->36040 36041 1321c50 25 API calls 36039->36041 36042 1321c50 25 API calls 36040->36042 36041->36040 36055 132dd3f 36042->36055 36044 132dea0 36098 13214c0 36044->36098 36047 132deb3 36047->36024 36116 1321180 WSAStartup 36047->36116 36048 132ddfa 36048->36044 36159 132ece2 26 API calls 2 library calls 36048->36159 36160 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36048->36160 36161 1322520 26 API calls 36048->36161 36054 132ddf5 36158 1331810 25 API calls ___std_exception_copy 36054->36158 36055->36048 36055->36054 36145 1321b40 36055->36145 36156 13340df 40 API calls 36055->36156 36157 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36055->36157 36058 132dee1 ___std_exception_copy 36057->36058 36059 132defb 36058->36059 36062 132defd 36058->36062 36162 1334651 EnterCriticalSection LeaveCriticalSection __dosmaperr 36058->36162 36059->36016 36061 132e446 36164 132f437 RaiseException 36061->36164 36062->36061 36163 132f437 RaiseException 36062->36163 36065 132e463 36067 132dedc 3 API calls 36066->36067 36068 132202a 36067->36068 36068->36028 36070 132dedc 3 API calls 36069->36070 36071 1321ffa 36070->36071 36071->36031 36073 1322020 3 API calls 36072->36073 36074 132d860 36073->36074 36165 1321cd0 36074->36165 36076 132da9f 36178 132decb 36076->36178 36078 132da66 36078->36076 36081 132dad7 36078->36081 36079 132da35 36079->36078 36188 1322520 26 API calls 36079->36188 36080 132dac2 36080->36034 36080->36035 36191 1331810 25 API calls ___std_exception_copy 36081->36191 36082 1321cd0 26 API calls 36090 132d8a3 36082->36090 36085 132da55 36085->36078 36088 132dacd 36085->36088 36190 132ece2 26 API calls 2 library calls 36088->36190 36090->36078 36090->36079 36090->36081 36090->36082 36090->36088 36091 132dac8 36090->36091 36185 1322660 36090->36185 36189 1327380 26 API calls 36091->36189 36094 1321c6a 36093->36094 36095 1321cc5 36093->36095 36094->36095 36195 1331810 25 API calls ___std_exception_copy 36094->36195 36095->36037 36099 132168d 36098->36099 36105 13214f5 36098->36105 36100 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36099->36100 36101 132169d 36100->36101 36101->36047 36102 1321566 LocalAlloc 36115 132158d ___scrt_uninitialize_crt ___scrt_fastfail 36102->36115 36103 1321b40 26 API calls 36103->36105 36104 1321639 36107 132166a 36104->36107 36112 1321685 LocalFree 36104->36112 36105->36099 36105->36102 36105->36103 36106 1321560 36105->36106 36109 13216a3 36105->36109 36106->36102 36110 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36107->36110 36108 1321b40 26 API calls 36108->36115 36196 1331810 25 API calls ___std_exception_copy 36109->36196 36113 132167f 36110->36113 36112->36099 36113->36047 36115->36099 36115->36104 36115->36108 36115->36109 36117 1322020 3 API calls 36116->36117 36118 13211e3 36117->36118 36119 1321ff0 3 API calls 36118->36119 36120 132120c 36119->36120 36121 1322020 3 API calls 36120->36121 36122 1321232 36121->36122 36197 13216b0 36122->36197 36124 1321334 36125 1321c50 25 API calls 36124->36125 36131 132133c 36125->36131 36126 132124a ___scrt_fastfail 36126->36124 36211 1321000 36126->36211 36129 132dedc 3 API calls 36130 1321284 ___scrt_fastfail 36129->36130 36232 13226b0 36130->36232 36132 1321c50 25 API calls 36131->36132 36134 132137d 36132->36134 36137 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36134->36137 36139 13213a2 36137->36139 36138 13212f6 36245 1321e70 36138->36245 36139->36024 36141 132130f 36257 132a5f0 InitializeCriticalSection 36141->36257 36146 1321b66 36145->36146 36147 1321b6d 36146->36147 36148 1321ba3 36146->36148 36149 1321bc6 36146->36149 36147->36055 36150 132dedc 3 API calls 36148->36150 36152 132dedc 3 API calls 36149->36152 36153 1321bbb ___scrt_uninitialize_crt 36149->36153 36151 1321bb4 36150->36151 36151->36153 36756 1331810 25 API calls ___std_exception_copy 36151->36756 36152->36153 36153->36055 36156->36055 36157->36055 36160->36048 36161->36048 36162->36058 36163->36061 36164->36065 36168 1321d14 36165->36168 36170 1321cee BuildCatchObjectHelperInternal 36165->36170 36166 1321dfe 36193 13224b0 26 API calls std::_Xinvalid_argument 36166->36193 36168->36166 36171 1321d68 36168->36171 36172 1321d8d 36168->36172 36170->36090 36173 132dedc 3 API calls 36171->36173 36174 132dedc 3 API calls 36172->36174 36176 1321d79 ___scrt_uninitialize_crt 36172->36176 36173->36176 36174->36176 36177 1321de0 36176->36177 36192 1331810 25 API calls ___std_exception_copy 36176->36192 36177->36090 36179 132ded6 IsProcessorFeaturePresent 36178->36179 36180 132ded4 36178->36180 36182 132df7e 36179->36182 36180->36080 36194 132df42 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 36182->36194 36184 132e061 36184->36080 36186 1322020 3 API calls 36185->36186 36187 132266e 36186->36187 36187->36090 36188->36085 36194->36184 36198 1321927 36197->36198 36200 13216fb 36197->36200 36198->36126 36200->36198 36201 1321cd0 26 API calls 36200->36201 36202 132196a 36200->36202 36204 1322660 RaiseException EnterCriticalSection LeaveCriticalSection 36200->36204 36208 1321965 36200->36208 36292 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36200->36292 36201->36200 36294 132ece2 26 API calls 2 library calls 36202->36294 36204->36200 36293 1331810 25 API calls ___std_exception_copy 36208->36293 36212 1322020 3 API calls 36211->36212 36213 1321046 36212->36213 36214 1321ff0 3 API calls 36213->36214 36215 132106b 36214->36215 36216 1322020 3 API calls 36215->36216 36217 132108d 36216->36217 36218 1322020 3 API calls 36217->36218 36219 13210af 36218->36219 36220 1321ff0 3 API calls 36219->36220 36221 13210d1 36220->36221 36222 1322020 3 API calls 36221->36222 36223 13210f3 36222->36223 36224 1321ff0 3 API calls 36223->36224 36225 1321115 36224->36225 36226 1321143 36225->36226 36295 13222b0 26 API calls 2 library calls 36225->36295 36227 1321156 36226->36227 36296 1322190 26 API calls 3 library calls 36226->36296 36230 132116a 36227->36230 36297 13222b0 26 API calls 2 library calls 36227->36297 36230->36129 36233 132dedc 3 API calls 36232->36233 36234 13212cb 36233->36234 36235 1322060 36234->36235 36236 1322092 36235->36236 36237 132208d 36235->36237 36236->36237 36238 13220c1 36236->36238 36239 132dedc 3 API calls 36237->36239 36240 13220ab 36238->36240 36241 132dedc 3 API calls 36238->36241 36239->36240 36244 1322139 36240->36244 36298 1331810 25 API calls ___std_exception_copy 36240->36298 36241->36240 36244->36138 36249 1321f54 36245->36249 36250 1321e9e 36245->36250 36246 1321fe9 36300 1322050 26 API calls std::_Xinvalid_argument 36246->36300 36249->36141 36249->36249 36250->36246 36250->36249 36251 1321f47 36250->36251 36252 1321f35 36250->36252 36253 1321f5f 36250->36253 36251->36249 36299 1331810 25 API calls ___std_exception_copy 36251->36299 36255 132dedc 3 API calls 36252->36255 36253->36249 36256 132dedc 3 API calls 36253->36256 36255->36251 36256->36249 36301 13344e9 GetSystemTimeAsFileTime 36257->36301 36259 132a64d 36303 1331882 36259->36303 36262 132dedc 3 API calls 36263 132a666 36262->36263 36264 1322020 3 API calls 36263->36264 36265 132a6a5 36264->36265 36306 1322760 SHGetValueA 36265->36306 36268 132a701 InitializeCriticalSection 36270 132dedc 3 API calls 36268->36270 36269 132a859 36271 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36269->36271 36272 132a712 36270->36272 36273 132132c 36271->36273 36434 13338bc 36272->36434 36291 13213b0 25 API calls 36273->36291 36275 132a754 Sleep 36276 1321c50 25 API calls 36275->36276 36277 132a767 36276->36277 36449 1326b30 36277->36449 36279 132a7a0 GetTickCount 36280 132a7b3 36279->36280 36286 132a7d7 36280->36286 36482 1328060 36280->36482 36283 132a7d2 GetTickCount 36283->36286 36284 132a7f0 Sleep 36514 1327cc0 36284->36514 36286->36284 36288 132a831 shutdown closesocket 36286->36288 36289 132a81c 36286->36289 36535 132acb0 36286->36535 36288->36286 36289->36284 36289->36288 36558 132b1e0 107 API calls 2 library calls 36289->36558 36291->36124 36292->36200 36295->36226 36296->36227 36297->36230 36302 133451b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 36301->36302 36302->36259 36559 13359f6 GetLastError 36303->36559 36307 13227e9 CoCreateGuid 36306->36307 36308 13227dc 36306->36308 36309 1322862 36307->36309 36310 13227fa wsprintfA 36307->36310 36311 1321c50 25 API calls 36308->36311 36314 1322873 SHSetValueA 36309->36314 36593 1331861 36309->36593 36310->36309 36312 132290a 36311->36312 36315 1322914 GetComputerNameA 36312->36315 36314->36308 36316 132293b 36315->36316 36317 132294b 36315->36317 36319 13335f8 ___std_exception_copy 25 API calls 36316->36319 36320 1321cd0 26 API calls 36317->36320 36319->36317 36321 1322986 36320->36321 36322 1322660 3 API calls 36321->36322 36323 13229a6 36322->36323 36324 13229bb 36323->36324 36325 13232a9 36323->36325 36326 1322a0b GetUserNameA 36324->36326 36328 1322a01 36324->36328 36329 13232b3 36324->36329 36617 132ece2 26 API calls 2 library calls 36325->36617 36330 1322a42 36326->36330 36331 1322a52 36326->36331 36328->36326 36618 1331810 25 API calls ___std_exception_copy 36329->36618 36333 13335f8 ___std_exception_copy 25 API calls 36330->36333 36335 1321cd0 26 API calls 36331->36335 36333->36331 36334 13232b8 36619 132ece2 26 API calls 2 library calls 36334->36619 36337 1322a8b 36335->36337 36339 1322660 3 API calls 36337->36339 36338 13232c2 36620 1331810 25 API calls ___std_exception_copy 36338->36620 36341 1322aab 36339->36341 36341->36334 36343 1322ac0 36341->36343 36342 13232c7 36621 132ece2 26 API calls 2 library calls 36342->36621 36343->36338 36346 1322b06 36343->36346 36345 13232d1 36622 1331810 25 API calls ___std_exception_copy 36345->36622 36596 13234c0 36346->36596 36349 13232d6 36623 132ece2 26 API calls 2 library calls 36349->36623 36352 1322b5c 36357 1321cd0 26 API calls 36352->36357 36353 1322b4c 36355 13335f8 ___std_exception_copy 25 API calls 36353->36355 36354 13232e0 36624 1331810 25 API calls ___std_exception_copy 36354->36624 36355->36352 36359 1322b96 36357->36359 36358 13232e5 36625 132ece2 26 API calls 2 library calls 36358->36625 36361 1322660 3 API calls 36359->36361 36363 1322bb6 36361->36363 36362 13232ef 36626 1331810 25 API calls ___std_exception_copy 36362->36626 36363->36342 36365 1322bcb 36363->36365 36365->36345 36367 1322c11 36365->36367 36366 13232f4 36627 132ece2 26 API calls 2 library calls 36366->36627 36371 1322c4c GlobalMemoryStatusEx 36367->36371 36369 13232fe 36628 1331810 25 API calls ___std_exception_copy 36369->36628 36373 1322c67 __aulldiv 36371->36373 36372 1323303 36629 132ece2 26 API calls 2 library calls 36372->36629 36605 1322740 36373->36605 36375 132330d 36630 1331810 25 API calls ___std_exception_copy 36375->36630 36379 1323312 36631 132ece2 26 API calls 2 library calls 36379->36631 36381 132331c 36632 1331810 25 API calls ___std_exception_copy 36381->36632 36382 1321cd0 26 API calls 36384 1322cf8 36382->36384 36386 1322660 3 API calls 36384->36386 36387 1322d18 36386->36387 36387->36349 36388 1322d2d 36387->36388 36388->36354 36389 1322d7d GetLogicalDriveStringsA 36388->36389 36391 1322d73 36388->36391 36390 1322fa1 36389->36390 36395 1322daa 36389->36395 36392 1322740 44 API calls 36390->36392 36391->36389 36393 1322fb1 36392->36393 36398 1321cd0 26 API calls 36393->36398 36394 1322de1 GetDriveTypeA 36394->36395 36396 1322ded GetDiskFreeSpaceExA 36394->36396 36395->36394 36397 1322e50 36395->36397 36396->36395 36400 1322740 44 API calls 36397->36400 36399 1322fea 36398->36399 36401 1322660 3 API calls 36399->36401 36402 1322ee0 36400->36402 36403 132300a 36401->36403 36406 1321cd0 26 API calls 36402->36406 36403->36366 36404 132301f 36403->36404 36404->36369 36405 132306f RegOpenKeyExA 36404->36405 36407 1322f9c 36404->36407 36408 1323091 RegQueryValueExA 36405->36408 36409 13230c7 36405->36409 36411 1322f19 36406->36411 36407->36405 36408->36409 36412 13230d7 36408->36412 36410 13335f8 ___std_exception_copy 25 API calls 36409->36410 36410->36412 36413 1322660 3 API calls 36411->36413 36415 1321cd0 26 API calls 36412->36415 36414 1322f39 36413->36414 36414->36358 36416 1322f4e 36414->36416 36417 1323116 36415->36417 36416->36362 36416->36405 36416->36407 36418 1322660 3 API calls 36417->36418 36419 1323136 36418->36419 36419->36372 36420 132314b 36419->36420 36420->36375 36421 132319b GetNativeSystemInfo 36420->36421 36423 1323191 36420->36423 36422 13231b2 36421->36422 36608 13335f8 36422->36608 36423->36421 36426 1321cd0 26 API calls 36427 1323206 36426->36427 36428 1322660 3 API calls 36427->36428 36429 1323226 36428->36429 36429->36379 36430 132323b 36429->36430 36430->36381 36431 132327a 36430->36431 36432 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36431->36432 36433 13232a5 wsprintfA CreateSemaphoreA 36432->36433 36433->36268 36433->36269 36435 13338c9 36434->36435 36436 13338dd 36434->36436 36649 1335cc1 14 API calls __dosmaperr 36435->36649 36640 13337de 36436->36640 36439 13338ce 36650 1331800 25 API calls ___std_exception_copy 36439->36650 36442 13338f2 CreateThread 36444 1333911 GetLastError 36442->36444 36448 133391d 36442->36448 36660 13336d2 36442->36660 36443 13338d9 36443->36275 36651 1335c8b 14 API calls __dosmaperr 36444->36651 36652 1333750 36448->36652 36450 1326b84 ___scrt_fastfail 36449->36450 36451 1326b99 RegEnumKeyExW 36450->36451 36452 1327150 36451->36452 36475 1326cbc ___scrt_fastfail 36451->36475 36453 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36452->36453 36455 1327168 36453->36455 36454 1326cc2 StrStrW 36456 1326cd8 StrStrW 36454->36456 36454->36475 36455->36279 36457 1326cee wsprintfW RegOpenKeyExW 36456->36457 36456->36475 36457->36475 36458 1327116 RegEnumKeyExW 36458->36452 36458->36454 36459 1322020 3 API calls 36459->36475 36460 1321ff0 3 API calls 36461 1326d8c RegQueryValueExA 36460->36461 36461->36475 36462 1326dea RegQueryValueExA 36462->36475 36463 1327093 RegCloseKey 36463->36475 36465 1321c50 25 API calls 36465->36475 36466 132716c 36682 1322520 26 API calls 36466->36682 36467 1321b40 26 API calls 36467->36475 36469 1327189 36470 13271bf 36469->36470 36683 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36469->36683 36684 132ece2 26 API calls 2 library calls 36470->36684 36473 13271ee 36685 1331810 25 API calls ___std_exception_copy 36473->36685 36475->36454 36475->36458 36475->36459 36475->36460 36475->36462 36475->36463 36475->36465 36475->36466 36475->36467 36475->36473 36681 1326240 59 API calls 3 library calls 36475->36681 36483 1321c50 25 API calls 36482->36483 36500 13280a6 36483->36500 36484 1321b40 26 API calls 36484->36500 36485 1321b40 26 API calls 36507 13281fa 36485->36507 36486 13286ae 36489 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36486->36489 36488 1321cd0 26 API calls 36488->36507 36490 13286ce 36489->36490 36490->36269 36490->36283 36493 13286d2 36712 132ece2 26 API calls 2 library calls 36493->36712 36494 1321b40 26 API calls 36512 1328432 36494->36512 36497 13286dc 36713 1331810 25 API calls ___std_exception_copy 36497->36713 36500->36484 36500->36493 36500->36497 36500->36507 36686 1325930 36500->36686 36700 1322520 26 API calls 36500->36700 36701 1322190 26 API calls 3 library calls 36500->36701 36506 1325c90 25 API calls 36506->36507 36507->36485 36507->36488 36507->36493 36507->36497 36507->36506 36507->36512 36702 13286f0 26 API calls 36507->36702 36703 13287d0 59 API calls 36507->36703 36704 1325a20 45 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 36507->36704 36705 1322520 26 API calls 36507->36705 36706 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36507->36706 36509 1325c90 25 API calls 36509->36512 36512->36486 36512->36493 36512->36494 36512->36497 36512->36509 36707 13286f0 26 API calls 36512->36707 36708 13287d0 59 API calls 36512->36708 36709 1325a20 45 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 36512->36709 36710 1322520 26 API calls 36512->36710 36711 13224e0 RaiseException EnterCriticalSection LeaveCriticalSection 36512->36711 36515 1327d19 36514->36515 36516 1327fff 36514->36516 36515->36516 36518 1327d30 socket 36515->36518 36517 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36516->36517 36519 1328018 36517->36519 36520 1327d50 htons inet_addr connect 36518->36520 36521 1327d95 36518->36521 36519->36286 36522 1327d87 closesocket 36520->36522 36714 1327670 36521->36714 36522->36521 36524 1321b40 26 API calls 36531 1327db7 36524->36531 36525 1321cd0 26 API calls 36525->36531 36526 1325930 30 API calls 36526->36531 36527 132dedc 3 API calls 36534 1327ea3 36527->36534 36528 1328055 36720 1331810 25 API calls ___std_exception_copy 36528->36720 36531->36516 36531->36524 36531->36525 36531->36526 36531->36528 36531->36534 36534->36527 36534->36528 36534->36531 36718 13276a0 26 API calls 2 library calls 36534->36718 36719 1327a70 54 API calls 2 library calls 36534->36719 36725 1323330 36535->36725 36538 132ad23 setsockopt 36539 132ad4a 36538->36539 36541 132aeb7 36538->36541 36540 1331861 37 API calls 36539->36540 36542 132ad4f 36540->36542 36543 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36541->36543 36545 1327670 69 API calls 36542->36545 36544 132aeeb 36543->36544 36544->36286 36546 132ade7 36545->36546 36547 1327670 69 API calls 36546->36547 36548 132ae09 36546->36548 36547->36546 36549 1327670 69 API calls 36548->36549 36551 132ae13 36549->36551 36550 132ae27 send 36550->36541 36550->36551 36551->36541 36551->36550 36552 132ae4d 36551->36552 36738 132d660 36552->36738 36554 132ae5d 36554->36541 36743 132aef0 36554->36743 36556 132ae89 36556->36541 36557 132ae8d setsockopt 36556->36557 36557->36541 36558->36289 36560 1335a13 36559->36560 36561 1335a0d 36559->36561 36585 1335a19 36560->36585 36587 13375d8 6 API calls __dosmaperr 36560->36587 36586 1337599 6 API calls __dosmaperr 36561->36586 36564 1335a31 36565 1337210 __dosmaperr 14 API calls 36564->36565 36564->36585 36567 1335a41 36565->36567 36566 1335a98 SetLastError 36570 132a656 36566->36570 36571 1335aad 36566->36571 36568 1335a60 36567->36568 36569 1335a49 36567->36569 36589 13375d8 6 API calls __dosmaperr 36568->36589 36588 13375d8 6 API calls __dosmaperr 36569->36588 36570->36262 36592 13355b1 37 API calls __CreateFrameInfo 36571->36592 36575 1335a6c 36578 1335a81 36575->36578 36579 1335a70 36575->36579 36576 1335a57 36582 1335cd4 _free 14 API calls 36576->36582 36591 1335824 14 API calls __dosmaperr 36578->36591 36590 13375d8 6 API calls __dosmaperr 36579->36590 36582->36585 36583 1335a8c 36584 1335cd4 _free 14 API calls 36583->36584 36584->36585 36585->36566 36586->36560 36587->36564 36588->36576 36589->36575 36590->36576 36591->36583 36594 13359f6 pre_c_initialization 37 API calls 36593->36594 36595 1331866 36594->36595 36595->36309 36598 1323513 36596->36598 36597 1323523 GetAdaptersAddresses 36597->36598 36603 132356c 36597->36603 36598->36597 36601 1323567 36598->36601 36599 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36600 1322b41 lstrlenA 36599->36600 36600->36352 36600->36353 36601->36599 36602 13235d4 wsprintfW lstrlenW 36602->36602 36602->36603 36603->36601 36603->36602 36604 1322740 44 API calls 36603->36604 36604->36603 36633 1322700 36605->36633 36609 1333613 36608->36609 36610 1333605 36608->36610 36637 1335cc1 14 API calls __dosmaperr 36609->36637 36610->36609 36615 133362a 36610->36615 36612 133361b 36638 1331800 25 API calls ___std_exception_copy 36612->36638 36614 13231c6 36614->36426 36615->36614 36639 1335cc1 14 API calls __dosmaperr 36615->36639 36634 132271a ___scrt_initialize_default_local_stdio_options 36633->36634 36635 13335d4 44 API calls 36634->36635 36636 1322724 36635->36636 36636->36382 36637->36612 36638->36614 36639->36612 36641 1337210 __dosmaperr 14 API calls 36640->36641 36642 13337ef 36641->36642 36643 1335cd4 _free 14 API calls 36642->36643 36644 13337fc 36643->36644 36645 1333803 GetModuleHandleExW 36644->36645 36646 1333820 36644->36646 36645->36646 36647 1333750 16 API calls 36646->36647 36648 1333828 36647->36648 36648->36442 36648->36448 36649->36439 36650->36443 36651->36448 36653 133375c 36652->36653 36659 1333780 36652->36659 36654 1333762 CloseHandle 36653->36654 36655 133376b 36653->36655 36654->36655 36656 1333771 FreeLibrary 36655->36656 36657 133377a 36655->36657 36656->36657 36658 1335cd4 _free 14 API calls 36657->36658 36658->36659 36659->36275 36661 13336de __FrameHandler3::FrameUnwindToState 36660->36661 36662 13336f2 36661->36662 36663 13336e5 GetLastError ExitThread 36661->36663 36664 13359f6 pre_c_initialization 37 API calls 36662->36664 36665 13336f7 36664->36665 36674 13377bd 36665->36674 36669 133370e 36680 1333947 17 API calls 36669->36680 36675 13377cf GetPEB 36674->36675 36676 1333702 36674->36676 36675->36676 36677 13377e2 36675->36677 36676->36669 36679 13376f3 5 API calls __dosmaperr 36676->36679 36678 133745f LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 36677->36678 36678->36676 36679->36669 36681->36475 36682->36469 36683->36470 36687 132597a 36686->36687 36688 132597c getaddrinfo 36686->36688 36687->36688 36689 13259b4 36688->36689 36693 1325991 36688->36693 36690 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36689->36690 36691 13259c2 36690->36691 36691->36500 36692 13259c6 RtlIpv4AddressToStringA 36694 13259f0 36692->36694 36693->36689 36693->36692 36695 13259ad freeaddrinfo 36693->36695 36694->36694 36696 1321cd0 26 API calls 36694->36696 36695->36689 36697 1325a05 freeaddrinfo 36696->36697 36698 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36697->36698 36699 1325a1c 36698->36699 36699->36500 36700->36500 36701->36500 36702->36507 36703->36507 36704->36507 36705->36507 36706->36507 36707->36512 36708->36512 36709->36512 36710->36512 36711->36512 36715 1327680 36714->36715 36721 1327640 36715->36721 36718->36534 36719->36534 36722 1327652 ___scrt_initialize_default_local_stdio_options 36721->36722 36723 1333551 69 API calls 36722->36723 36724 132765c 36723->36724 36724->36531 36726 1323360 36725->36726 36727 1331861 37 API calls 36726->36727 36732 132336e 36726->36732 36727->36726 36728 1321b40 26 API calls 36728->36732 36729 1323484 36730 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36729->36730 36733 13234ac setsockopt 36730->36733 36731 13234b2 36755 1331810 25 API calls ___std_exception_copy 36731->36755 36732->36728 36732->36731 36737 13233cc ___scrt_uninitialize_crt 36732->36737 36733->36538 36733->36541 36735 1321b40 26 API calls 36735->36737 36737->36729 36737->36731 36737->36735 36739 132d674 36738->36739 36740 132d6ab 36738->36740 36741 132d69f 36739->36741 36742 132d680 send 36739->36742 36740->36554 36741->36554 36742->36739 36742->36740 36744 132af20 Sleep 36743->36744 36745 132b0c8 36744->36745 36749 132af34 ___scrt_uninitialize_crt 36744->36749 36747 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36745->36747 36746 132af36 recv 36746->36745 36746->36749 36748 132b0d7 36747->36748 36748->36556 36749->36744 36749->36745 36749->36746 36750 132afa4 36749->36750 36752 132b035 ___scrt_uninitialize_crt ___scrt_fastfail 36749->36752 36750->36749 36751 132afb0 recv 36750->36751 36751->36745 36751->36750 36753 132decb __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36752->36753 36754 132b0c2 36753->36754 36754->36556 36757 1335d0e 36758 1335d4c 36757->36758 36759 1335d1c __dosmaperr 36757->36759 36765 1335cc1 14 API calls __dosmaperr 36758->36765 36759->36758 36760 1335d37 RtlAllocateHeap 36759->36760 36764 1334651 EnterCriticalSection LeaveCriticalSection __dosmaperr 36759->36764 36760->36759 36762 1335d4a 36760->36762 36764->36759 36765->36762 36766 1221fcf 36769 1221fdb ___DestructExceptionObject 36766->36769 36767 1221fea 36768 1222004 dllmain_raw 36768->36767 36771 122201e dllmain_crt_dispatch 36768->36771 36769->36767 36769->36768 36770 1221fff 36769->36770 36780 1221c20 9 API calls _ValidateLocalCookies 36770->36780 36771->36767 36771->36770 36773 122203f 36775 122206b 36773->36775 36781 1221c20 9 API calls _ValidateLocalCookies 36773->36781 36774 1222074 dllmain_crt_dispatch 36774->36767 36776 1222087 dllmain_raw 36774->36776 36775->36767 36775->36774 36778 12220b9 36776->36778 36778->36767 36779 1222057 dllmain_crt_dispatch dllmain_raw 36779->36775 36780->36773 36781->36779 36782 41b2ef 36783 41b30c 36782->36783 36784 41b344 GetEnvironmentStrings GetCommandLineA 36783->36784 36785 41b35d 36784->36785 36786 41b3c5 36785->36786 36801 415dc7 36785->36801 36815 415dc8 36785->36815 36787 41b432 36786->36787 36791 41b3cb 36786->36791 36829 409bd1 36787->36829 36788 41b449 36848 41a8ec VirtualFree VirtualFree ExitProcess EnterCriticalSection LeaveCriticalSection 36788->36848 36790 41b452 36846 41b45c GetStartupInfoA 36791->36846 36794 41b417 GetModuleHandleA 36795 41b426 36794->36795 36847 41a8ec VirtualFree VirtualFree ExitProcess EnterCriticalSection LeaveCriticalSection 36795->36847 36797 41b42f 36797->36790 36802 415dde 36801->36802 36803 419018 7 API calls 36802->36803 36804 415de5 36803->36804 36805 415dfe 36804->36805 36849 413a9c 7 API calls 36804->36849 36807 419018 7 API calls 36805->36807 36808 415e1c 36807->36808 36809 415e35 36808->36809 36850 413a9c 7 API calls 36808->36850 36811 419018 7 API calls 36809->36811 36812 415e52 36811->36812 36814 415e6b 36812->36814 36851 413a9c 7 API calls 36812->36851 36814->36785 36816 415dde 36815->36816 36817 419018 7 API calls 36816->36817 36818 415de5 36817->36818 36819 415dfe 36818->36819 36852 413a9c 7 API calls 36818->36852 36821 419018 7 API calls 36819->36821 36822 415e1c 36821->36822 36823 415e35 36822->36823 36853 413a9c 7 API calls 36822->36853 36825 419018 7 API calls 36823->36825 36826 415e52 36825->36826 36828 415e6b 36826->36828 36854 413a9c 7 API calls 36826->36854 36828->36785 36830 409be4 36829->36830 36855 41b030 36830->36855 36832 409bf0 36833 409c0d GetModuleHandleA 36832->36833 36867 40a85c LoadStringA lstrlenA lstrcpyA 36833->36867 36835 409c2a 36836 419018 7 API calls 36835->36836 36845 409c2f 36835->36845 36837 409c6f 36836->36837 36868 40a155 38 API calls 36837->36868 36839 409d04 36869 40a3ea 36 API calls 36839->36869 36841 409d26 36870 40a009 VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 36841->36870 36843 409da0 36871 40a343 FreeLibrary VirtualFree VirtualFree EnterCriticalSection LeaveCriticalSection 36843->36871 36845->36788 36846->36794 36847->36797 36848->36790 36849->36805 36850->36809 36851->36814 36852->36819 36853->36823 36854->36828 36856 41b042 SetConsoleCtrlHandler 36855->36856 36857 41b05f 36855->36857 36856->36857 36858 41b07b 36857->36858 36859 41b06b 36857->36859 36865 41b070 36858->36865 36873 41c1ec 9 API calls 36858->36873 36872 41a834 9 API calls 36859->36872 36862 41b091 36863 419b74 7 API calls 36862->36863 36862->36865 36864 41b0aa 36863->36864 36864->36865 36874 41a834 9 API calls 36864->36874 36865->36832 36867->36835 36868->36839 36869->36841 36870->36843 36871->36845 36872->36865 36873->36862 36874->36865
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: $%s\%s\$Classes$DEFAULT$F$I$Prox$R$S$V$W$\$\$\$d$e$e$f$i$i$i$list<T> too long$n$n$n$r$r$r$r$s$s$t$t$u$ver$w$ySer
          • API String ID: 0-1802518369
          • Opcode ID: e4cb014bd5efa6b85734bad3866cdda21279c68ec4dc4fd1aef965209ef0d07f
          • Instruction ID: 5dd53da6e36507aa0db7df5d50f014044c269457fbe023b9e68297f8dc7dda85
          • Opcode Fuzzy Hash: e4cb014bd5efa6b85734bad3866cdda21279c68ec4dc4fd1aef965209ef0d07f
          • Instruction Fuzzy Hash: 83A2F7B1D002299FDB18DF68CD85BEEBBB5FF45308F148258D905AB381DB75AA44CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 507 1322760-13227da SHGetValueA 508 13227e9-13227f8 CoCreateGuid 507->508 509 13227dc-13227e4 507->509 511 1322862 508->511 512 13227fa-132285f wsprintfA 508->512 510 13228fa-1322939 call 1321c50 call 132e13d GetComputerNameA 509->510 522 132293b-132294b call 13335f8 510->522 523 132294e-132296e 510->523 514 1322864-1322871 call 1331861 511->514 512->511 519 1322873-1322881 514->519 521 1322884-13228c6 519->521 521->521 524 13228c8-13228f4 SHSetValueA 521->524 522->523 526 1322970-1322975 523->526 524->510 526->526 528 1322977-13229b5 call 1321cd0 call 1322660 526->528 533 13229bb-13229da 528->533 534 13232a9-13232ae call 132ece2 528->534 535 1322a0b-1322a40 GetUserNameA 533->535 536 13229dc-13229eb 533->536 540 13232b3 call 1331810 534->540 541 1322a42-1322a52 call 13335f8 535->541 542 1322a55-1322a72 535->542 538 1322a01-1322a08 call 132df0c 536->538 539 13229ed-13229fb 536->539 538->535 539->538 539->540 548 13232b8-13232bd call 132ece2 540->548 541->542 546 1322a75-1322a7a 542->546 546->546 550 1322a7c-1322aba call 1321cd0 call 1322660 546->550 554 13232c2 call 1331810 548->554 550->548 559 1322ac0-1322adf 550->559 558 13232c7-13232cc call 132ece2 554->558 561 13232d1 call 1331810 558->561 562 1322b10-1322b4a call 13234c0 lstrlenA 559->562 563 1322ae1-1322af0 559->563 568 13232d6-13232db call 132ece2 561->568 573 1322b5f-1322b7f 562->573 574 1322b4c-1322b5c call 13335f8 562->574 565 1322af2-1322b00 563->565 566 1322b06-1322b0d call 132df0c 563->566 565->554 565->566 566->562 576 13232e0 call 1331810 568->576 575 1322b80-1322b85 573->575 574->573 575->575 578 1322b87-1322bc5 call 1321cd0 call 1322660 575->578 582 13232e5-13232ea call 132ece2 576->582 578->558 589 1322bcb-1322bea 578->589 586 13232ef call 1331810 582->586 590 13232f4-13232f9 call 132ece2 586->590 591 1322c1b-1322c3a 589->591 592 1322bec-1322bfb 589->592 596 13232fe call 1331810 590->596 597 1322c41-1322c4a 591->597 594 1322c11-1322c18 call 132df0c 592->594 595 1322bfd-1322c0b 592->595 594->591 595->561 595->594 604 1323303-1323308 call 132ece2 596->604 597->597 600 1322c4c-1322c65 GlobalMemoryStatusEx 597->600 601 1322c96-1322ca7 600->601 602 1322c67-1322c94 call 1341250 600->602 606 1322cad-1322cdf call 1322740 601->606 602->606 608 132330d call 1331810 604->608 614 1322ce2-1322ce7 606->614 613 1323312-1323317 call 132ece2 608->613 617 132331c-1323321 call 1331810 613->617 614->614 616 1322ce9-1322d27 call 1321cd0 call 1322660 614->616 616->568 624 1322d2d-1322d4c 616->624 625 1322d4e-1322d5d 624->625 626 1322d7d-1322da4 GetLogicalDriveStringsA 624->626 629 1322d73-1322d7a call 132df0c 625->629 630 1322d5f-1322d6d 625->630 627 1322fa1-1322fd1 call 1322740 626->627 628 1322daa-1322db7 626->628 639 1322fd4-1322fd9 627->639 632 1322e76-1322e94 628->632 633 1322dbd-1322ddb 628->633 629->626 630->576 630->629 638 1322e9a-1322f00 call 13415d0 * 2 call 1322740 632->638 637 1322de1-1322deb GetDriveTypeA 633->637 640 1322e39-1322e3e 637->640 641 1322ded-1322e33 GetDiskFreeSpaceExA 637->641 656 1322f03-1322f08 638->656 639->639 643 1322fdb-1323019 call 1321cd0 call 1322660 639->643 644 1322e40-1322e45 640->644 641->640 643->590 657 132301f-132303e 643->657 644->644 648 1322e47-1322e4e 644->648 648->637 651 1322e50-1322e74 648->651 651->638 656->656 658 1322f0a-1322f48 call 1321cd0 call 1322660 656->658 659 1323040-132304f 657->659 660 132306f-132308f RegOpenKeyExA 657->660 658->582 677 1322f4e-1322f6d 658->677 662 1323051-132305f 659->662 663 1323065-132306c call 132df0c 659->663 664 1323091-13230c5 RegQueryValueExA 660->664 665 13230c7-13230d7 call 13335f8 660->665 662->596 662->663 663->660 664->665 669 13230da-13230fa 664->669 665->669 671 1323100-1323105 669->671 671->671 674 1323107-1323145 call 1321cd0 call 1322660 671->674 674->604 684 132314b-132316a 674->684 677->660 679 1322f73-1322f82 677->679 679->663 681 1322f88-1322f96 679->681 681->586 683 1322f9c 681->683 683->663 685 132319b-13231b0 GetNativeSystemInfo 684->685 686 132316c-132317b 684->686 687 13231b2-13231b7 685->687 688 13231b9 685->688 689 1323191-1323198 call 132df0c 686->689 690 132317d-132318b 686->690 691 13231be-13231e9 call 13335f8 687->691 688->691 689->685 690->608 690->689 696 13231f0-13231f5 691->696 696->696 697 13231f7-1323235 call 1321cd0 call 1322660 696->697 697->613 702 132323b-1323253 697->702 703 1323284-13232a8 call 132df3d call 132decb 702->703 704 1323255-1323264 702->704 706 1323266-1323274 704->706 707 132327a-1323281 call 132df0c 704->707 706->617 706->707 707->703
          APIs
          • SHGetValueA.SHLWAPI(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\DemeterID,Product ID,00000004,00000000,?,7B2C007C,00000003,00000000,00000000), ref: 013227D2
          • CoCreateGuid.COMBASE(?), ref: 013227F0
          • wsprintfA.USER32 ref: 01322859
          • SHSetValueA.SHLWAPI(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\DemeterID,Product ID,00000004,00000000,00000004), ref: 013228F4
          • GetComputerNameA.KERNEL32(00000000,00000100), ref: 01322931
          • GetUserNameA.ADVAPI32(00000000,00000100), ref: 01322A38
          • lstrlenA.KERNEL32(00000000,00000007,?,00000000,00000000,00000001), ref: 01322B42
          • GlobalMemoryStatusEx.KERNELBASE(?,00000007,?,00000000,00000000,00000001), ref: 01322C5D
          • __aulldiv.LIBCMT ref: 01322C83
          • GetLogicalDriveStringsA.KERNEL32(00000104,?), ref: 01322D9C
          • GetDriveTypeA.KERNELBASE(00000000), ref: 01322DE2
          • GetDiskFreeSpaceExA.KERNELBASE(00000000,?,?,?), ref: 01322E03
          • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000101,?,00000007,?,00000000,00000000,00000001), ref: 01323087
          • RegQueryValueExA.KERNELBASE(?,ProductName,00000000,?,00000000,?), ref: 013230BD
          • GetNativeSystemInfo.KERNELBASE(?,00000007,?,00000000,00000000,00000001), ref: 013231A2
          • std::_Xinvalid_argument.LIBCPMT ref: 013232AE
          • std::_Xinvalid_argument.LIBCPMT ref: 013232BD
          • std::_Xinvalid_argument.LIBCPMT ref: 013232CC
          • std::_Xinvalid_argument.LIBCPMT ref: 013232DB
          • std::_Xinvalid_argument.LIBCPMT ref: 013232EA
          • std::_Xinvalid_argument.LIBCPMT ref: 013232F9
          • std::_Xinvalid_argument.LIBCPMT ref: 01323308
          • std::_Xinvalid_argument.LIBCPMT ref: 01323317
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Xinvalid_argumentstd::_$Value$DriveName$ComputerCreateDiskFreeGlobalGuidInfoLogicalMemoryNativeOpenQuerySpaceStatusStringsSystemTypeUser__aulldivlstrlenwsprintf
          • String ID: %.1f GB / %.1f GB$%08X%04X%04X%02X%02X%02X%02X%02X%02X%02X%02X$%lld GB$0 GB / 0 GB$@$Product ID$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Microsoft\Windows\CurrentVersion\DemeterID$list<T> too long$unknown$x64$x86
          • API String ID: 3813084420-3657519226
          • Opcode ID: a2eac15bdd8b0eeb88e97a0c19c77953c64889cfbe49ca48049fa124373a6430
          • Instruction ID: 9ee71bfda199bc38ce376521b5932b06f6f8b89d20457c2bbf1fbd8df8b31d65
          • Opcode Fuzzy Hash: a2eac15bdd8b0eeb88e97a0c19c77953c64889cfbe49ca48049fa124373a6430
          • Instruction Fuzzy Hash: FC62B6719002299FDB24EF28CD48BEEBBB5FF45308F1481E8E509A7295DB759A84CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 727 1221670-1221697 728 1221746 727->728 729 122169d-122169f 727->729 730 1221748-1221787 728->730 731 12216a0-12216c0 729->731 735 1221b83-1221b95 call 1221cae 730->735 736 122178d-1221790 730->736 731->731 732 12216c2-12216d4 731->732 734 12216d6-12216ed 732->734 734->734 737 12216ef-12216fe 734->737 736->735 739 1221796-12217b0 736->739 740 1221700-1221717 737->740 739->735 742 12217b6-12217be 739->742 740->740 743 1221719-1221726 740->743 744 12217c0-12217c5 742->744 745 1221728-122173f 743->745 746 12217c7-12217d8 744->746 747 12217e4-12217ee 744->747 745->745 748 1221741-1221744 745->748 746->747 749 12217da-12217dd 746->749 747->744 750 12217f0-12217f2 747->750 748->730 749->747 751 12217df-12217e2 749->751 750->735 752 12217f8-1221804 750->752 751->747 752->735 753 122180a-1221823 VirtualAlloc 752->753 753->735 754 1221829-1221837 753->754 755 1221839-122183d 754->755 756 122184e-1221859 754->756 757 1221840-122184c 755->757 758 122185b-122185e 756->758 759 12218ae-12218b6 756->759 757->756 757->757 760 1221860-1221865 758->760 761 12218c0-12218c7 759->761 762 12218b8-12218be 759->762 763 1221867-1221870 760->763 764 1221899-12218a9 760->764 765 122191e-1221925 761->765 766 12218c9 761->766 762->761 762->765 763->764 768 1221872-122187c 763->768 764->760 771 12218ab 764->771 769 12219aa-12219b2 765->769 770 122192b-1221933 765->770 767 12218d0-12218d5 766->767 772 12218d7-12218e1 767->772 773 122191b 767->773 774 1221893-1221896 768->774 775 122187e 768->775 776 1221a50-1221a64 call 132e20b 769->776 777 12219b8 769->777 770->769 778 1221935-1221940 770->778 771->759 779 12218e3-12218f4 772->779 780 1221914-1221919 772->780 773->765 774->764 781 1221880-122188e 775->781 796 1221a66-1221aa9 776->796 782 12219c0-12219e3 777->782 783 1221942-1221952 LoadLibraryA 778->783 784 12219a7 778->784 786 12218f6-1221909 779->786 787 122190c-122190f 779->787 780->767 780->773 781->781 788 1221890 781->788 789 12219e5-12219ee 782->789 790 1221a3d-1221a4a 782->790 783->735 791 1221958-122195f 783->791 784->769 786->787 787->779 792 1221911 787->792 788->774 789->790 793 12219f0-1221a34 VirtualProtect 789->793 790->776 790->782 794 1221963-122196a 791->794 795 1221961 791->795 792->780 793->735 797 1221a3a 793->797 798 122199a-12219a5 794->798 799 122196c-122196e 794->799 795->794 801 1221ae5-1221af2 796->801 802 1221aab-1221ab3 796->802 797->790 798->783 798->784 800 1221971-1221976 799->800 803 1221978-122197b 800->803 804 122197d-1221980 800->804 806 1221b6c-1221b82 call 1221cae 801->806 807 1221af4-1221aff call 1221ca0 801->807 805 1221ab9-1221ac1 802->805 802->806 808 1221982-1221995 803->808 804->808 805->806 809 1221ac7-1221ae4 call 1221cae 805->809 813 1221b00-1221b09 807->813 808->800 820 1221997 808->820 818 1221b31-1221b57 call 1221cae 813->818 819 1221b0b-1221b0e 813->819 822 1221b10-1221b1c 819->822 820->798 824 1221b2b-1221b2f 822->824 825 1221b1e-1221b29 822->825 824->818 824->822 825->824 827 1221b58-1221b62 825->827 827->806 830 1221b64-1221b6a 827->830 830->813
          APIs
          • VirtualAlloc.KERNELBASE(00000000,-00000FFF,00001000,00000004), ref: 0122181A
          • LoadLibraryA.KERNELBASE(?), ref: 0122194B
          • VirtualProtect.KERNELBASE(?,?,?,00000000), ref: 01221A30
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: Virtual$AllocLibraryLoadProtect
          • String ID: .$0$3$CEFProcessForkHaCreateRemoteThreWaitForSingleObjGetModuleFileNamWriteProcessMemo$asjg98oji4tp0-fposdJDSIOGOPSDFGOEW824PIGR165G6S5$e$k$l$ndle$r$rEx
          • API String ID: 1403325721-2088186737
          • Opcode ID: 7a2144a6005dfe0644a42c4bf83ea5ce6003c0e899103f6071507b9a7ded3b6e
          • Instruction ID: 16ecf11b8664ace583f47ad5c03a1052f1860e45d99f0635cf115c309a80b47f
          • Opcode Fuzzy Hash: 7a2144a6005dfe0644a42c4bf83ea5ce6003c0e899103f6071507b9a7ded3b6e
          • Instruction Fuzzy Hash: 20028E31A1022A9BDB24CFADC880BADBBF5AF88310F194169D949EF255E770E855CB50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1068 132acb0-132ad1d call 1323330 setsockopt 1071 132aed2-132aeee call 132df3d call 132decb 1068->1071 1072 132ad23-132ad44 setsockopt 1068->1072 1072->1071 1074 132ad4a-132ad5b call 1331861 1072->1074 1079 132ad72-132ad93 1074->1079 1080 132ad5d 1074->1080 1083 132ad96-132ad9b 1079->1083 1082 132ad60-132ad70 1080->1082 1082->1079 1082->1082 1084 132ada1-132ada6 1083->1084 1085 132ad9d-132ad9f 1083->1085 1086 132ada8-132adaa 1084->1086 1087 132adae-132adb3 1084->1087 1085->1084 1086->1087 1088 132adb5-132adb7 1087->1088 1089 132adbb-132adc0 1087->1089 1088->1089 1090 132adc2-132adc4 1089->1090 1091 132adc8-132adcd 1089->1091 1090->1091 1092 132add5-132addb 1091->1092 1093 132adcf-132add1 1091->1093 1092->1083 1094 132addd-132adec call 1327670 1092->1094 1093->1092 1097 132adf0-132ae07 call 1327670 1094->1097 1100 132ae09-132ae1f call 1327670 1097->1100 1100->1071 1103 132ae25 1100->1103 1104 132ae27-132ae40 send 1103->1104 1104->1071 1105 132ae46-132ae4b 1104->1105 1105->1104 1106 132ae4d-132ae62 call 132d660 1105->1106 1106->1071 1109 132ae64-132ae68 1106->1109 1109->1071 1110 132ae6a-132ae6e 1109->1110 1110->1071 1111 132ae70-132ae74 1110->1111 1111->1071 1112 132ae76-132ae84 call 132aef0 1111->1112 1114 132ae89-132ae8b 1112->1114 1114->1071 1115 132ae8d-132aeb5 setsockopt 1114->1115 1115->1071 1116 132aeb7-132aebb 1115->1116 1116->1071 1117 132aebd-132aecf 1116->1117 1117->1071
          APIs
          • setsockopt.WS2_32(?,0000FFFF,00001006,?,00000004), ref: 0132AD19
          • setsockopt.WS2_32(?,0000FFFF,00001005,?,00000004), ref: 0132AD3B
          • send.WS2_32(?,00000317,00000005,00000000), ref: 0132AE38
          • setsockopt.WS2_32(?,0000FFFF,00001006,00001B58,00000004), ref: 0132AEAD
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: setsockopt$send
          • String ID: %d $key:
          • API String ID: 28939370-40514971
          • Opcode ID: 9f058232208796ef4093c9be4e5b210f11f582d81fa9a389312e146f8c07fb88
          • Instruction ID: cb84353e3f8045a4b0140ef8f0850ad16b5282a82eb63b94bb3cfc539eb4ff00
          • Opcode Fuzzy Hash: 9f058232208796ef4093c9be4e5b210f11f582d81fa9a389312e146f8c07fb88
          • Instruction Fuzzy Hash: CF613871A0025A5BEF21DFACCC80AFFBBB8AF45308F0841ADD545EB682E670D945C761
          APIs
          • Sleep.KERNELBASE(0000000A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0132AE89,?), ref: 0132AF22
          • recv.WS2_32(?,?,00000005,00000000), ref: 0132AF47
          • recv.WS2_32(?,00000000,00000000,00000000), ref: 0132AFBC
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: recv$Sleep
          • String ID:
          • API String ID: 1123280612-0
          • Opcode ID: 73481402c15ea69d03eb8ba3930f9a92279197ca0fbe111f9d210097aa04f358
          • Instruction ID: 7bd83a215c2d1e3b27c002d8cc5a5053eea57675367a8e9432d56a4c2a062e32
          • Opcode Fuzzy Hash: 73481402c15ea69d03eb8ba3930f9a92279197ca0fbe111f9d210097aa04f358
          • Instruction Fuzzy Hash: A951F671E002299BCB11EFACCC44AEEBBB4EF59318F144159E814F7342D739A945CBA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 380 1326b30-1326cb6 call 132f530 * 2 RegEnumKeyExW 385 1327150-132716b call 132decb 380->385 386 1326cbc 380->386 388 1326cc2-1326cd2 StrStrW 386->388 390 1326cd8-1326ce8 StrStrW 388->390 391 13270fc-132714a call 132f530 RegEnumKeyExW 388->391 390->391 393 1326cee-1326d33 wsprintfW RegOpenKeyExW 390->393 391->385 391->388 393->391 395 1326d39-1326dd7 call 1322020 call 1321ff0 RegQueryValueExA 393->395 400 1327065-1327079 call 1321c50 395->400 401 1326ddd-1326e08 call 132e13d RegQueryValueExA 395->401 406 1327093-13270a8 RegCloseKey 400->406 407 132707b 400->407 408 1326e0a-1326e13 call 132df3d 401->408 409 1326e18-1326e31 call 1326240 401->409 412 13270c3-13270f6 call 132df0c call 1321c50 call 132df0c 406->412 413 13270aa 406->413 410 1327080-1327091 call 132df0c 407->410 408->400 422 1326e33-1326e3b call 132df3d 409->422 423 1326e40-1326e66 call 132df3d 409->423 410->406 412->391 417 13270b0-13270c1 call 132df0c 413->417 417->412 434 132705f 422->434 423->400 432 1326e6c 423->432 435 1326e72-1326e9b call 1321b40 432->435 434->400 439 1326ea1-1326ead 435->439 440 1327176 435->440 441 1326eb0-1326ef7 call 1321b40 439->441 442 1327178-1327196 call 1322520 440->442 447 1326f64-1326f6f 441->447 448 1326ef9-1326efc 441->448 449 13271e4-13271e9 call 132ece2 442->449 450 1327198-13271cc call 13224e0 442->450 454 1326f71-1326f7c 447->454 455 1326f9c-1326fa4 447->455 452 1326f11-1326f14 448->452 453 1326efe 448->453 460 13271ee-1327207 call 1331810 449->460 450->449 466 13271ce-13271dd 450->466 464 1326f16-1326f1a 452->464 465 1326f4a 452->465 461 1326f00-1326f04 453->461 462 1326f92-1326f99 call 132df0c 454->462 463 1326f7e-1326f8c 454->463 458 1326faa-1326fb0 455->458 459 132716c-1327174 455->459 458->441 459->442 479 1327209-132723a call 1327570 460->479 480 132726d-132726e 460->480 461->464 469 1326f06-1326f0f 461->469 462->455 463->460 463->462 471 1326f43-1326f48 464->471 472 1326f1c-1326f1f 464->472 468 1326f4c-1326f4e 465->468 466->449 475 1326f50-1326f5c 468->475 476 1326f5e 468->476 469->452 469->461 471->468 472->465 473 1326f21-1326f27 472->473 473->471 478 1326f29-1326f2c 473->478 475->476 481 1326fb5-1326fbe 475->481 476->447 478->465 482 1326f2e-1326f34 478->482 496 132724e-132726c call 132df0c 479->496 497 132723c-132724a 479->497 483 1326fc0-1326fd1 481->483 484 1326ff1-1327018 481->484 482->471 486 1326f36-1326f39 482->486 487 1326fd3-1326fe1 483->487 488 1326fe7-1326fee call 132df0c 483->488 489 1327045-1327059 484->489 490 132701a-1327025 484->490 486->465 492 1326f3b-1326f41 486->492 487->460 487->488 488->484 489->434 489->435 494 1327027-1327035 490->494 495 132703b-1327042 call 132df0c 490->495 492->465 492->471 494->460 494->495 495->489 496->480 500 132726f-1327274 call 1331810 497->500 501 132724c 497->501 501->496
          APIs
          • RegEnumKeyExW.KERNELBASE(80000003,00000000,?,00000208,00000000,00000000,00000000,00000000,?,?,?,00000003,00000000,00000000), ref: 01326CAB
          • StrStrW.KERNELBASE(?,DEFAULT,?,?,?,00000003,00000000,00000000), ref: 01326CCE
          • StrStrW.SHLWAPI(?,Classes,?,?,?,00000003,00000000,00000000), ref: 01326CE4
          • wsprintfW.USER32 ref: 01326D08
          • RegOpenKeyExW.KERNELBASE(80000003,?,00000000,000F003F,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 01326D2B
          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 01326DCF
          • RegQueryValueExA.ADVAPI32(?,786F7250,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 01326E00
          • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 01327099
          • RegEnumKeyExW.KERNELBASE(80000003,00000001,?,00000208,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000003,00000000), ref: 0132713F
          • std::_Xinvalid_argument.LIBCPMT ref: 013271E9
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: EnumQueryValue$CloseOpenXinvalid_argumentstd::_wsprintf
          • String ID: $%s\%s\$Classes$DEFAULT$F$I$Prox$R$S$V$W$\$\$\$d$e$e$f$i$i$i$list<T> too long$n$n$n$r$r$r$r$s$s$t$t$u$ver$w$ySer
          • API String ID: 3975790278-1802518369
          • Opcode ID: 622bfe3eb8de4b10c95fe299cb75196e69992747f938ebf6b49c72dd73b214ff
          • Instruction ID: e9eb680251c0d01cb43cc12032d1ed55c3d0a847066ffdadd824b607cbc83db2
          • Opcode Fuzzy Hash: 622bfe3eb8de4b10c95fe299cb75196e69992747f938ebf6b49c72dd73b214ff
          • Instruction Fuzzy Hash: 6E12B3B1D002299FDB20DF58DC84BADBBBAFF55318F1441E9E508A7241DB75AA88CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 713 40897a-408a63 CreateFileA 714 408a69-408aac VirtualAlloc 713->714 715 408afe-408bce 713->715 720 408af2-408afc CloseHandle 714->720 721 408aae-408ad4 ReadFile 714->721 718 408bd0-408bd2 715->718 719 408bd7-408be7 715->719 722 409397-40939a 718->722 723 408bf0-408c4e 719->723 724 408be9-408beb 719->724 720->715 721->720 725 408ad6-408aed 721->725 724->722 725->722
          APIs
          • CreateFileA.KERNELBASE(00000000,80000000,00000000,00000000,00000004,00000000,00000000), ref: 00408A5A
          • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000040), ref: 00408AA3
          • ReadFile.KERNELBASE(000000FF,00000000,00000000,?,00000000), ref: 00408AC9
          • CloseHandle.KERNELBASE(000000FF), ref: 00408AFC
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: File$AllocCloseCreateHandleReadVirtual
          • String ID: 0$0$2$2$3$3$3$4$4$4$5$8$8$8$9$9$9$[$a$e$e$f$f$g$i$j$k$o$p$w
          • API String ID: 1642992456-4097334363
          • Opcode ID: d177e4d0b4d3f0f28d0a54269b2e28703b728717ca7bfb4088a550506f3a52a0
          • Instruction ID: 276268768fae61a3aa97a37b7a49644376cea3c02c5f615e84aec5e1b91e4cd2
          • Opcode Fuzzy Hash: d177e4d0b4d3f0f28d0a54269b2e28703b728717ca7bfb4088a550506f3a52a0
          • Instruction Fuzzy Hash: EB912D70904298DFEB15CFA8C844BDEBBB1AF58304F24809DD548BB382D7B65A85CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 832 132db10-132db81 call 132dedc call 132f530 lstrcpyA 837 132db92-132dbaf CreateMutexA 832->837 838 132db83-132db8c ReleaseMutex CloseHandle 832->838 839 132dbb1-132dbca GetLastError 837->839 840 132dbcd-132dbd5 837->840 838->837 839->840 841 132dbe6-132dbf4 840->841 842 132dbd7-132dbe0 ReleaseMutex CloseHandle 840->842 843 132dec2-132dec4 ExitProcess 841->843 844 132dbfa-132dcbb CreateMutexA call 1322020 * 2 call 1321ff0 call 132d6c0 call 132d800 841->844 842->841 855 132dce0 844->855 856 132dcbd-132dcde call 1321c50 844->856 858 132dce3-132dd13 call 1321c50 call 132df0c call 132d800 855->858 856->858 866 132dd33-132dd51 call 1321c50 call 132df0c 858->866 867 132dd15-132dd30 call 1321c50 858->867 874 132dd57-132dd9e call 1321b40 call 13340df call 13224e0 866->874 875 132de04 866->875 867->866 897 132dda0-132ddb9 874->897 898 132ddfa-132ddff call 132ece2 874->898 876 132de07-132de0c 875->876 879 132de12 876->879 880 132dea0-132deb5 call 13214c0 876->880 883 132de14-132de16 879->883 884 132de58-132de5d 879->884 880->843 890 132deb7-132debd call 1321180 880->890 883->880 887 132de1c 883->887 884->880 888 132de5f-132de62 884->888 891 132de20-132de40 call 13224e0 887->891 892 132de64-132de84 call 1322520 888->892 890->843 891->898 905 132de42-132de51 891->905 892->898 902 132de8a-132de99 892->902 903 132dde6-132ddee 897->903 904 132ddbb-132ddc7 897->904 898->875 902->880 906 132de9b-132de9e 902->906 903->876 910 132ddf0 903->910 907 132ddd9-132dde3 call 132df0c 904->907 908 132ddc9-132ddd7 904->908 905->880 909 132de53-132de56 905->909 906->892 907->903 908->907 911 132ddf5 call 1331810 908->911 909->891 910->874 911->898
          APIs
          • lstrcpyA.KERNEL32(00000000,askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG), ref: 0132DB69
          • ReleaseMutex.KERNEL32(?), ref: 0132DB84
          • CloseHandle.KERNEL32(?), ref: 0132DB8C
          • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 0132DBA1
          • GetLastError.KERNEL32 ref: 0132DBB1
          • ReleaseMutex.KERNEL32(?), ref: 0132DBD8
          • CloseHandle.KERNEL32(?), ref: 0132DBE0
          • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 0132DC09
          • std::_Xinvalid_argument.LIBCPMT ref: 0132DDFF
          • ExitProcess.KERNEL32 ref: 0132DEC4
          Strings
          • askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG, xrefs: 0132DB63
          • list<T> too long, xrefs: 0132DDFA
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Mutex$CloseCreateHandleRelease$ErrorExitLastProcessXinvalid_argumentlstrcpystd::_
          • String ID: askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG$list<T> too long
          • API String ID: 2710040054-1361808773
          • Opcode ID: cda2f1d4270498a628128d76acb14b89085056489bbf13c15c694803295c266f
          • Instruction ID: 4a8a61c03bbbcc8a5230b481f4dce5ca83516d62fbce21a79be8aeef91b36982
          • Opcode Fuzzy Hash: cda2f1d4270498a628128d76acb14b89085056489bbf13c15c694803295c266f
          • Instruction Fuzzy Hash: 26C14BB0D002299FDB14EFA8C954BEEFBB5FF58308F248119E519B7284DB746945CBA0

          Control-flow Graph

          APIs
          • InitializeCriticalSection.KERNEL32(00000020,7B2C007C,00000004,?,00000000), ref: 0132A637
            • Part of subcall function 013344E9: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0132A64D,00000000), ref: 013344FC
            • Part of subcall function 013344E9: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0133452D
            • Part of subcall function 01322760: SHGetValueA.SHLWAPI(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\DemeterID,Product ID,00000004,00000000,?,7B2C007C,00000003,00000000,00000000), ref: 013227D2
            • Part of subcall function 01322760: GetComputerNameA.KERNEL32(00000000,00000100), ref: 01322931
          • wsprintfA.USER32 ref: 0132A6D7
          • CreateSemaphoreA.KERNEL32(00000000,00000000,7FFFFFFF,?), ref: 0132A6F0
          • InitializeCriticalSection.KERNEL32(00000040), ref: 0132A705
            • Part of subcall function 0132DEDC: __CxxThrowException@8.LIBVCRUNTIME ref: 0132E441
            • Part of subcall function 0132DEDC: __CxxThrowException@8.LIBVCRUNTIME ref: 0132E45E
          • Sleep.KERNELBASE(0000000A), ref: 0132A759
          • GetTickCount.KERNEL32 ref: 0132A7A6
          • GetTickCount.KERNEL32 ref: 0132A7D2
          • Sleep.KERNELBASE(000003E8), ref: 0132A7F5
          • shutdown.WS2_32(0000003C,00000002), ref: 0132A835
          • closesocket.WS2_32(0000003C), ref: 0132A83D
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CountCriticalException@8InitializeSectionSleepThrowTickTime$ComputerCreateFileNameSemaphoreSystemUnothrow_t@std@@@Value__ehfuncinfo$??2@closesocketshutdownwsprintf
          • String ID: x%d
          • API String ID: 404457191-126850396
          • Opcode ID: 9a9a2786fbc38e2d972464ddf7a4742e18c919931200aee55ea408f7c9c45dc0
          • Instruction ID: 85592dcd915431ee0b6c4eb9f67577181a6e73ed60764710bdf1a7280694e84d
          • Opcode Fuzzy Hash: 9a9a2786fbc38e2d972464ddf7a4742e18c919931200aee55ea408f7c9c45dc0
          • Instruction Fuzzy Hash: 2B71C274A00315DFDB24EF68D884B9ABBF5FF58304F104169E60AAB790EB70B944CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 967 412074-41209f call 41c528 SetHandleCount 970 4120a1 967->970 971 4120a7-4120cc GetStartupInfoA 967->971 970->971 972 4120d2-4120e5 971->972 973 41216c-412171 971->973 972->973 974 4120eb-4120fd 972->974 975 4121c0-4121c6 973->975 976 412173-412199 GetStdHandle * 3 973->976 977 41213b-412145 974->977 978 4120ff-412107 974->978 979 41219e-41219f call 4105f0 976->979 980 41214f-412155 977->980 981 412109 978->981 982 41210e-412111 978->982 986 4121a4-4121a7 979->986 984 412147-41214c 980->984 985 412157-412169 call 40d1cc 980->985 981->982 987 412113 982->987 988 412118-41211b 982->988 984->980 985->973 990 4121b1 986->990 991 4121a9-4121af 986->991 987->988 992 412124 988->992 993 41211d-412122 988->993 995 4121b7-4121be 990->995 991->995 996 412129-412139 992->996 993->996 995->975 995->979 996->977 996->978
          APIs
            • Part of subcall function 0041C528: EnterCriticalSection.KERNEL32(004239FC,?,00412EE4,?,creating stream lock,00000000,?,?,00411151,?,00000000,00420250,?,00413984,00420250), ref: 0041C530
            • Part of subcall function 0041C528: InitializeCriticalSection.KERNEL32(?,004239FC,?,00412EE4,?,creating stream lock,00000000,?,?,00411151,?,00000000,00420250,?,00413984,00420250), ref: 0041C55E
            • Part of subcall function 0041C528: LeaveCriticalSection.KERNEL32(004239FC,?,004239FC,?,00412EE4,?,creating stream lock,00000000,?,?,00411151,?,00000000,00420250,?,00413984), ref: 0041C585
          • SetHandleCount.KERNEL32(00000032), ref: 00412092
          • GetStartupInfoA.KERNEL32(?), ref: 004120BC
          • GetStdHandle.KERNEL32(000000F6), ref: 00412175
          • GetStdHandle.KERNEL32(000000F5,000000F6), ref: 00412181
          • GetStdHandle.KERNEL32(000000F4,000000F5,000000F6), ref: 0041218D
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Handle$CriticalSection$CountEnterInfoInitializeLeaveStartup
          • String ID: creating global handle lock$t:B
          • API String ID: 3255421519-54552273
          • Opcode ID: df9442e1680a95799462763464bb6d188a3c1a3e5e6f7249e83d71a998f705ee
          • Instruction ID: 0ea7f76ca1b6aed72b73a66dde49da59dfb8d24c70f5eb80e5666bb39963684a
          • Opcode Fuzzy Hash: df9442e1680a95799462763464bb6d188a3c1a3e5e6f7249e83d71a998f705ee
          • Instruction Fuzzy Hash: 7D313571600201ABD324DF25CDC1AAA77E2EB40324F64463FE686C22D1D7BC98D6CB5D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 997 1327cc0-1327d13 998 1327d19-1327d1f 997->998 999 1327fff-132801e call 132decb 997->999 998->999 1000 1327d25-1327d2c 998->1000 1002 1327d30-1327d4e socket 1000->1002 1003 1327d2e 1000->1003 1005 1327d50-1327d81 htons inet_addr connect 1002->1005 1006 1327d95-1327da2 1002->1006 1003->1002 1009 1327d87-1327d8f closesocket 1005->1009 1007 1327da6-1327dd4 call 1327670 1006->1007 1008 1327da4 1006->1008 1007->999 1012 1327dda 1007->1012 1008->1007 1009->1006 1013 1327de0-1327e15 call 1321b40 1012->1013 1016 1327e18-1327e1d 1013->1016 1016->1016 1017 1327e1f-1327e61 call 1321cd0 call 1325930 1016->1017 1022 1327ea3-1327eed call 132dedc call 13276a0 call 1327a70 1017->1022 1023 1327e63-1327e6d 1017->1023 1052 1327f21-1327f47 call 132df0c 1022->1052 1053 1327eef-1327ef8 1022->1053 1025 1327e9b-1327e9e 1023->1025 1026 1327e6f-1327e7b 1023->1026 1029 1327f78-1327f87 1025->1029 1027 1327e91-1327e98 call 132df0c 1026->1027 1028 1327e7d-1327e8b 1026->1028 1027->1025 1028->1027 1031 1328055-132805a call 1331810 1028->1031 1034 1327fba-1327fca 1029->1034 1035 1327f89-1327f95 1029->1035 1042 1327ff4-1327ff9 1034->1042 1043 1327fcc-1327fd8 1034->1043 1040 1327f97-1327fa5 1035->1040 1041 1327fab-1327fb8 call 132df0c 1035->1041 1040->1031 1040->1041 1041->1034 1042->999 1042->1013 1048 1327fea-1327ff1 call 132df0c 1043->1048 1049 1327fda-1327fe8 1043->1049 1048->1042 1049->1031 1049->1048 1062 1327f75 1052->1062 1063 1327f49-1327f55 1052->1063 1056 1327f14-1327f1e call 132df0c 1053->1056 1057 1327efa-1327f0b 1053->1057 1056->1052 1057->1031 1060 1327f11 1057->1060 1060->1056 1062->1029 1064 1327f57-1327f65 1063->1064 1065 1327f6b-1327f72 call 132df0c 1063->1065 1064->1031 1064->1065 1065->1062
          APIs
          • socket.WS2_32(00000002,00000001,00000006), ref: 01327D40
          • htons.WS2_32(?), ref: 01327D5A
          • inet_addr.WS2_32(?), ref: 01327D65
          • connect.WS2_32(?,?,00000010), ref: 01327D79
          • closesocket.WS2_32(?), ref: 01327D89
            • Part of subcall function 01327A70: socket.WS2_32(00000002,00000001,00000006), ref: 01327B25
            • Part of subcall function 01327A70: connect.WS2_32(00000000,?,00000010), ref: 01327B3D
            • Part of subcall function 01327A70: setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 01327B63
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: connectsocket$closesockethtonsinet_addrsetsockopt
          • String ID: ip : %s port : %d
          • API String ID: 655186869-1577030829
          • Opcode ID: e15cc969f7928f5dcde393a9d402d23692bd28197269e75b7e6a84d428b08e6e
          • Instruction ID: 65b432bbd9391240a08cbb6e743e4d37190f7328fd480f51e7935c8cd75b4b3f
          • Opcode Fuzzy Hash: e15cc969f7928f5dcde393a9d402d23692bd28197269e75b7e6a84d428b08e6e
          • Instruction Fuzzy Hash: A8B1EF719002189FDB14EFACC884B9DFBB1FF59318F248658E815AB395D731AD45CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1118 401000-40101d 1119 401024-41b366 call 40dc18 GetModuleHandleA call 41706c call 417504 call 4115bc call 40de70 GetEnvironmentStrings GetCommandLineA call 41a93c call 41b190 1118->1119 1120 40101f-401022 1118->1120 1136 41b3b0-41b3c3 call 41b198 1119->1136 1137 41b368-41b372 1119->1137 1120->1119 1142 41b3c5-41b3c9 1136->1142 1143 41b3ae 1136->1143 1139 41b376-41b385 call 41b198 1137->1139 1147 41b374 1139->1147 1148 41b387-41b38f 1139->1148 1145 41b432-41b452 call 409bd1 call 41a8ec 1142->1145 1146 41b3cb-41b3d1 1142->1146 1179 41b3ae call 415dc7 1143->1179 1180 41b3ae call 415dc8 1143->1180 1163 41b453-41b459 1145->1163 1149 41b3d4-41b3d8 1146->1149 1147->1139 1150 41b3a5-41b3aa 1148->1150 1154 41b3d3 1149->1154 1155 41b3da-41b3dc 1149->1155 1151 41b391-41b3a2 1150->1151 1152 41b3ac 1150->1152 1151->1150 1152->1136 1154->1149 1155->1154 1157 41b3de-41b3e1 1155->1157 1160 41b3e3-41b3e6 1157->1160 1161 41b3e8-41b3ea 1157->1161 1162 41b3ed-41b3f1 1160->1162 1161->1162 1164 41b3f3-41b3f5 1162->1164 1165 41b3fb-41b3fe 1162->1165 1164->1165 1166 41b3f7-41b3f9 1164->1166 1167 41b400-41b401 1165->1167 1168 41b404-41b408 1165->1168 1166->1165 1169 41b3ec 1166->1169 1167->1168 1170 41b40a-41b40c 1168->1170 1171 41b40e-41b410 1168->1171 1169->1162 1170->1171 1172 41b403 1170->1172 1171->1172 1173 41b412-41b430 call 41b45c GetModuleHandleA call 41a8ec 1171->1173 1172->1168 1173->1163 1179->1136 1180->1136
          APIs
          • GetModuleHandleA.KERNEL32(00000000,`.B), ref: 00401035
          • GetEnvironmentStrings.KERNEL32 ref: 0041B344
          • GetCommandLineA.KERNEL32 ref: 0041B34E
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CommandEnvironmentHandleLineModuleStrings
          • String ID: @3O$`.B
          • API String ID: 1584138308-1970850373
          • Opcode ID: 3fb45a655024feba313da01b91921573050467ea3c01706844517f71734fca6f
          • Instruction ID: 4488c69faa4ad87b40207625eb41881ce4cb12c3af05c99afcb201778fb6ab85
          • Opcode Fuzzy Hash: 3fb45a655024feba313da01b91921573050467ea3c01706844517f71734fca6f
          • Instruction Fuzzy Hash: 0B4127B0A04204ABDB209F659CC2BE737B5EB49308F64411BE95587392D77C98D3CB9E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1182 13372d5-13372e1 1183 1337388-133738b 1182->1183 1184 1337391 1183->1184 1185 13372e6-13372f7 1183->1185 1186 1337393-1337397 1184->1186 1187 1337304-133731d LoadLibraryExW 1185->1187 1188 13372f9-13372fc 1185->1188 1191 133736f-1337378 1187->1191 1192 133731f-1337328 GetLastError 1187->1192 1189 1337302 1188->1189 1190 1337385 1188->1190 1195 1337381-1337383 1189->1195 1190->1183 1191->1195 1196 133737a-133737b FreeLibrary 1191->1196 1193 133732a-133733c call 1335600 1192->1193 1194 133735f 1192->1194 1193->1194 1202 133733e-1337350 call 1335600 1193->1202 1198 1337361-1337363 1194->1198 1195->1190 1199 1337398-133739a 1195->1199 1196->1195 1198->1191 1201 1337365-133736d 1198->1201 1199->1186 1201->1190 1202->1194 1205 1337352-133735d LoadLibraryExW 1202->1205 1205->1198
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: api-ms-$ext-ms-
          • API String ID: 0-537541572
          • Opcode ID: 65ec2b89e345bf7505a8308e3bfbe4fa9ea6fe4936448f3e317dcee30738c33a
          • Instruction ID: 9e9881f37fcbdce37609e5b52ab295d5d3e63a86df2d146dd538e43a57b77517
          • Opcode Fuzzy Hash: 65ec2b89e345bf7505a8308e3bfbe4fa9ea6fe4936448f3e317dcee30738c33a
          • Instruction Fuzzy Hash: D821EBF6A05215FBDB324A29AC46B1B375CAF85778F150114FE46B7291DA30ED00C6E4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1206 408c5f 1207 408d02-408d06 1206->1207 1208 408c65-408c71 1206->1208 1209 408d20-408d24 1207->1209 1210 408d08-408d1d 1207->1210 1211 408c73-408c7c 1208->1211 1212 408c7e-408c97 1208->1212 1216 408d26-408d28 1209->1216 1217 408d2d-408d49 VirtualAlloc 1209->1217 1210->1209 1213 408c55-408c5c 1211->1213 1214 408ca4-408cba 1212->1214 1215 408c99-408ca2 1212->1215 1213->1206 1218 408cc0-408cd8 1214->1218 1215->1218 1219 409397-40939a 1216->1219 1220 408d52-408d82 1217->1220 1221 408d4b-408d4d 1217->1221 1222 408cf4-408cfd 1218->1222 1223 408cda-408ce6 1218->1223 1224 408d85-408d89 1220->1224 1221->1219 1222->1213 1223->1222 1225 408ce8-408cf1 1223->1225 1226 408db2 1224->1226 1227 408d8b-408db0 1224->1227 1225->1222 1228 408db9-408dc3 1226->1228 1227->1224 1229 408dc9-408dd5 1228->1229 1230 408e7d-408e8d 1228->1230 1231 408ddb-408dfb 1229->1231 1232 408e6f-408e78 1229->1232 1233 408ea5-408eb7 1230->1233 1234 408e8f-408e9f 1230->1234 1231->1232 1235 408dfd-408e2e 1231->1235 1232->1228 1237 408eba-408ec0 1233->1237 1234->1233 1236 408f71-408f83 1234->1236 1238 408e31-408e35 1235->1238 1239 408f89-408f8f 1236->1239 1240 4090dd-4090ef 1236->1240 1237->1236 1241 408ec6-408ecd 1237->1241 1242 408e37-408e5c 1238->1242 1243 408e5e-408e6b 1238->1243 1239->1240 1244 408f95-408fb2 1239->1244 1245 4090fa-409104 1240->1245 1241->1236 1246 408ed3-408ef7 1241->1246 1242->1238 1243->1232 1244->1240 1253 408fb8-408ffc 1244->1253 1248 4092b2-409369 1245->1248 1249 40910a-4091d0 1245->1249 1250 408f02-408f0b 1246->1250 1259 40936e-40936f call 1222100 1248->1259 1254 4091d2 1249->1254 1255 4091d7-4091ed 1249->1255 1251 408f60-408f6c 1250->1251 1252 408f0d-408f20 1250->1252 1251->1237 1260 408f22-408f5c 1252->1260 1261 408f5e 1252->1261 1269 409005-40900b 1253->1269 1270 408ffe-409000 1253->1270 1256 4090f1-4090f7 1254->1256 1257 4091f4-4091fd 1255->1257 1258 4091ef 1255->1258 1256->1245 1262 409209-409212 1257->1262 1263 4091ff 1257->1263 1258->1256 1266 409375-409380 call 4093aa 1259->1266 1260->1261 1261->1250 1267 409214 1262->1267 1268 40921e-409226 1262->1268 1263->1262 1277 409385-40938e call 1221ba0 1266->1277 1267->1268 1272 409232-40923b 1268->1272 1273 409228 1268->1273 1274 40901d-409026 1269->1274 1275 40900d-40901b 1269->1275 1270->1219 1278 409247-409273 1272->1278 1279 40923d 1272->1279 1273->1272 1280 40902c-40903e 1274->1280 1275->1280 1284 409394 1277->1284 1281 409281-4092a4 VirtualProtect 1278->1281 1282 409275-40927e 1278->1282 1279->1278 1283 409041-409047 1280->1283 1285 4092a6-4092a8 1281->1285 1286 4092ad 1281->1286 1282->1281 1287 4090d8 1283->1287 1288 40904d-40906c 1283->1288 1284->1219 1285->1219 1286->1248 1287->1240 1289 409080-40908c 1288->1289 1290 40906e-40907e 1288->1290 1291 409092-4090d3 1289->1291 1290->1291 1291->1283
          APIs
          • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004), ref: 00408D40
          • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000), ref: 004092A0
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Virtual$AllocProtect
          • String ID: $@$NvSmartMaxSetState
          • API String ID: 2447062925-3527548009
          • Opcode ID: b706ec27801de8936b598a472a119f9f1197134b4707f3b077e3fa00cdc51dcb
          • Instruction ID: 1f3e7c0fa9221bd570d4e02ee678290249f37a8e9c7276dc5efa7c34f4a1f29b
          • Opcode Fuzzy Hash: b706ec27801de8936b598a472a119f9f1197134b4707f3b077e3fa00cdc51dcb
          • Instruction Fuzzy Hash: 5F32C170D04219CFDB18CF98C994BADBBB2BF48304F1481AAD4496B392C775AE85CF54

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1295 13234c0-132350c 1296 1323513-132351b 1295->1296 1296->1296 1297 132351d 1296->1297 1298 1323523-1323536 GetAdaptersAddresses 1297->1298 1299 1323538-1323540 1298->1299 1300 132356c-132356e 1298->1300 1303 1323542-1323548 call 132df3d 1299->1303 1304 132354b-1323565 call 132e13d 1299->1304 1301 13236d1 1300->1301 1302 1323574-1323584 1300->1302 1308 13236d7-13236d9 1301->1308 1306 13236e4-13236f6 call 132decb 1302->1306 1307 132358a 1302->1307 1303->1304 1304->1298 1316 1323567 1304->1316 1311 1323590-1323595 1307->1311 1308->1306 1312 13236db-13236e1 call 132df3d 1308->1312 1317 13236c0-13236cb 1311->1317 1318 132359b 1311->1318 1312->1306 1316->1308 1317->1301 1317->1311 1320 13235a0-13235a3 1318->1320 1322 13235a9-13235ce 1320->1322 1323 13236af-13236b4 1320->1323 1325 13235d4-1323646 wsprintfW lstrlenW 1322->1325 1323->1320 1324 13236ba 1323->1324 1324->1317 1325->1325 1326 1323648-1323656 1325->1326 1326->1323 1327 1323658 1326->1327 1328 1323660-1323670 1327->1328 1329 1323672-1323676 1328->1329 1330 132367a-132367d 1328->1330 1329->1328 1331 1323678 1329->1331 1330->1323 1332 132367f-1323681 1330->1332 1331->1323 1332->1323 1333 1323683-13236ac call 1322740 1332->1333 1333->1323
          APIs
          • GetAdaptersAddresses.IPHLPAPI(00000000,00000010,00000000,00000000,?), ref: 01323531
          • wsprintfW.USER32 ref: 013235F0
          • lstrlenW.KERNEL32(?), ref: 013235FA
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: AdaptersAddresseslstrlenwsprintf
          • String ID: %$.
          • API String ID: 3037317441-3975786864
          • Opcode ID: bd215ea4a974906067d08aac08176a92b5e5a54c66d1e4edac1134716e61b406
          • Instruction ID: a0eeaeeb972f8dd3bfc131d341ffd3a442e68e1d44a84f45824e327032a39052
          • Opcode Fuzzy Hash: bd215ea4a974906067d08aac08176a92b5e5a54c66d1e4edac1134716e61b406
          • Instruction Fuzzy Hash: DD516D75A412299FDB25EF68DC88BE9B7F5BF48318F1444E9D409A7201DB359A84CF40

          Control-flow Graph

          APIs
            • Part of subcall function 0041B030: SetConsoleCtrlHandler.KERNEL32(0041B00C,00000001,?,?,?,?,00409BF0,00000002,00408301), ref: 0041B053
          • GetModuleHandleA.KERNEL32(?), ref: 00409C15
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: ConsoleCtrlHandleHandlerModule
          • String ID: D$could not load string resources$rw32core.dll
          • API String ID: 790560346-991251983
          • Opcode ID: b4ae5d54a3b2b48167bdee9764b971dd1d3d7d94c218ad073930a8c0fdf8e7b2
          • Instruction ID: 8b9188f9c0cb86c5b46988c305a2b7c115439bc794083b693f425d7668405b60
          • Opcode Fuzzy Hash: b4ae5d54a3b2b48167bdee9764b971dd1d3d7d94c218ad073930a8c0fdf8e7b2
          • Instruction Fuzzy Hash: B441B272D10208AACB04EBE1ED46EDD77B4FF04304F10852EF8047A2D1EB795A55CB5A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1383 41b2ef-41b302 1384 41b30c-41b366 call 417504 call 4115bc call 40de70 GetEnvironmentStrings GetCommandLineA call 41a93c call 41b190 1383->1384 1385 41b307 call 41706c 1383->1385 1396 41b3b0-41b3c3 call 41b198 1384->1396 1397 41b368-41b372 1384->1397 1385->1384 1402 41b3c5-41b3c9 1396->1402 1403 41b3ae 1396->1403 1399 41b376-41b385 call 41b198 1397->1399 1407 41b374 1399->1407 1408 41b387-41b38f 1399->1408 1405 41b432-41b446 call 409bd1 1402->1405 1406 41b3cb-41b3d1 1402->1406 1439 41b3ae call 415dc7 1403->1439 1440 41b3ae call 415dc8 1403->1440 1413 41b449-41b452 call 41a8ec 1405->1413 1409 41b3d4-41b3d8 1406->1409 1407->1399 1410 41b3a5-41b3aa 1408->1410 1414 41b3d3 1409->1414 1415 41b3da-41b3dc 1409->1415 1411 41b391-41b3a2 1410->1411 1412 41b3ac 1410->1412 1411->1410 1412->1396 1423 41b453-41b459 1413->1423 1414->1409 1415->1414 1417 41b3de-41b3e1 1415->1417 1420 41b3e3-41b3e6 1417->1420 1421 41b3e8-41b3ea 1417->1421 1422 41b3ed-41b3f1 1420->1422 1421->1422 1424 41b3f3-41b3f5 1422->1424 1425 41b3fb-41b3fe 1422->1425 1424->1425 1426 41b3f7-41b3f9 1424->1426 1427 41b400-41b401 1425->1427 1428 41b404-41b408 1425->1428 1426->1425 1429 41b3ec 1426->1429 1427->1428 1430 41b40a-41b40c 1428->1430 1431 41b40e-41b410 1428->1431 1429->1422 1430->1431 1432 41b403 1430->1432 1431->1432 1433 41b412-41b430 call 41b45c GetModuleHandleA call 41a8ec 1431->1433 1432->1428 1433->1423 1439->1396 1440->1396
          APIs
          • GetEnvironmentStrings.KERNEL32 ref: 0041B344
          • GetCommandLineA.KERNEL32 ref: 0041B34E
          • GetModuleHandleA.KERNEL32(00000000,00000000,004F3342,00000000), ref: 0041B41D
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CommandEnvironmentHandleLineModuleStrings
          • String ID: @3O
          • API String ID: 1584138308-2647879139
          • Opcode ID: e6017f7ab082a5a4d2e50590958008fce340485f06153e9b2fa526acebc32c48
          • Instruction ID: 65cd2ee007ac636b7045d2a9173efb36a5798c14885be1cb4df2e39278447cb9
          • Opcode Fuzzy Hash: e6017f7ab082a5a4d2e50590958008fce340485f06153e9b2fa526acebc32c48
          • Instruction Fuzzy Hash: 4C3127B0A043089ADB309F658C817EB37A5EB06304F54415BE8A18B392D77C98D2CBDE
          APIs
          • getaddrinfo.WS2_32(?,00000000,00000001,00000000), ref: 01325987
          • freeaddrinfo.WS2_32(00000000), ref: 013259AE
          • RtlIpv4AddressToStringA.NTDLL(?,?), ref: 013259E3
          • freeaddrinfo.WS2_32(00000000,?,?), ref: 01325A08
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: freeaddrinfo$AddressIpv4Stringgetaddrinfo
          • String ID:
          • API String ID: 1652273897-0
          • Opcode ID: 92bee078804525b0f685456edefbb75c42096b0974b234fca82447c5241572c0
          • Instruction ID: b1230abf897f3ec4581b48441590d19cb87f34b26b8f75ab69de02550711224d
          • Opcode Fuzzy Hash: 92bee078804525b0f685456edefbb75c42096b0974b234fca82447c5241572c0
          • Instruction Fuzzy Hash: 9031E370E0020D9FDF14DFA8D944AEEB7B9FF5A318F104259E405BB115EB71AA85CB50
          APIs
          • GetStdHandle.KERNEL32(000000F6), ref: 012271FD
          • GetFileType.KERNELBASE(00000000), ref: 0122720F
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: FileHandleType
          • String ID: @GP
          • API String ID: 3000768030-1535696100
          • Opcode ID: a626ef345b1358897be5dc3151bbd003324606da5cb09d770ff0053ebb60b5cb
          • Instruction ID: 366d393b676f604182dc2f0971ffbe4537d70eea6ddee94b81818ccb0eb1cfa4
          • Opcode Fuzzy Hash: a626ef345b1358897be5dc3151bbd003324606da5cb09d770ff0053ebb60b5cb
          • Instruction Fuzzy Hash: 5111E43112C7636AD7344D3E9C9C52A7E95ABA7230B380B1AF6B6C66F2C670D586C241
          APIs
            • Part of subcall function 01226BBF: GetEnvironmentStringsW.KERNEL32 ref: 01226BC8
            • Part of subcall function 01226BBF: _free.LIBCMT ref: 01226C27
            • Part of subcall function 01226BBF: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 01226C36
          • _free.LIBCMT ref: 01224775
          • _free.LIBCMT ref: 0122477C
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$EnvironmentStrings$Free
          • String ID: xO
          • API String ID: 2490078468-4170594468
          • Opcode ID: 11a364c618111a38071e8aab01b05c9bb92d3e508106b40d6acba31c8d3726da
          • Instruction ID: 99b9a1f4ccb48167dbadd6726367de4544c341e8d742d167988530f5c75d88b4
          • Opcode Fuzzy Hash: 11a364c618111a38071e8aab01b05c9bb92d3e508106b40d6acba31c8d3726da
          • Instruction Fuzzy Hash: 02E02B239369B379D239373D7C806BD16494B92270F11032AED30C70C1DFB8444249D5
          APIs
          • CreateThread.KERNELBASE(00000000,00000000,Function_000136D2,00000000,00000000,00000000), ref: 01333905
          • GetLastError.KERNEL32(?,?,?,0132A754,00000000,00000000), ref: 01333911
          • __dosmaperr.LIBCMT ref: 01333918
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CreateErrorLastThread__dosmaperr
          • String ID:
          • API String ID: 2744730728-0
          • Opcode ID: 5439d0efbf7f609896b83819b27710e3a0fb3a55751de23a1dfc8ddc011a6f6a
          • Instruction ID: ffc3a787303e8a6f35c908065f667cc9e92f6d2ebfe314ef05bc6eae92522a1e
          • Opcode Fuzzy Hash: 5439d0efbf7f609896b83819b27710e3a0fb3a55751de23a1dfc8ddc011a6f6a
          • Instruction Fuzzy Hash: CC01B17250020AEFDF169FA9DC05BAF3BA9FF80369F008158F801A6250DB34DA10DB98
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Process$CurrentExitSleep
          • String ID:
          • API String ID: 4116356188-0
          • Opcode ID: 6e97861924b91695c3f4481a14cf2f38bf9a92adc1058ab5f6cd5e096b2bcb84
          • Instruction ID: 9bd20a4a53928e5b5333128021a119e5af63278b911fab37eae15d989e7643d0
          • Opcode Fuzzy Hash: 6e97861924b91695c3f4481a14cf2f38bf9a92adc1058ab5f6cd5e096b2bcb84
          • Instruction Fuzzy Hash: 14E08C38900230CFDB316B74A40C75B3EAABF5A32AF015425E40577599CF706404CFA1
          APIs
            • Part of subcall function 01325A20: StrStrA.SHLWAPI(00000031,32k1-jk-f-12121482014902184021jf0j10jf031jf01,?,?,?,?,?,?,?,?,?,?,?,0132850F,?,00000000), ref: 01325AEF
            • Part of subcall function 01325A20: lstrlenA.KERNEL32(32k1-jk-f-12121482014902184021jf0j10jf031jf01,?,?,?,?,?,?,?,?,?,?,?,0132850F,?,00000000), ref: 01325B09
          • std::_Xinvalid_argument.LIBCPMT ref: 013286D7
            • Part of subcall function 0132ECE2: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0132ECEE
            • Part of subcall function 0132ECE2: __CxxThrowException@8.LIBVCRUNTIME ref: 0132ECFC
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Exception@8ThrowXinvalid_argumentlstrlenstd::_std::invalid_argument::invalid_argument
          • String ID: list<T> too long
          • API String ID: 882462350-4027344264
          • Opcode ID: e0dd6d7a0be129661cde273daaab803c8090f80d5221494767dd519e4c465c00
          • Instruction ID: ec324595413f4bba27d4748eb357e2473264eb65fc1b3bc7213504d988c4264d
          • Opcode Fuzzy Hash: e0dd6d7a0be129661cde273daaab803c8090f80d5221494767dd519e4c465c00
          • Instruction Fuzzy Hash: 9D129071910229DFDB18EF58CD80BAEBBB6BF54318F1482D8D509A7385D730AA85CF51
          APIs
          • GetModuleFileNameA.KERNEL32(00000000,00D220A0,000000FF), ref: 0041AC78
          Strings
          • Out of memory in _setargv0, xrefs: 0041AC60
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: FileModuleName
          • String ID: Out of memory in _setargv0
          • API String ID: 514040917-2942948061
          • Opcode ID: b130977185ede6975fc81d0e498ff539f6ff8050e4efa39814ce17f4fecb8756
          • Instruction ID: 8a7ad9b2d21991a1cb191d9ba2d548ed6a3c143766770e086a5f2f1e622fcc32
          • Opcode Fuzzy Hash: b130977185ede6975fc81d0e498ff539f6ff8050e4efa39814ce17f4fecb8756
          • Instruction Fuzzy Hash: 77D05EB13893122AE2146AD96EC3F7112498714709F50002BF7044A1D1DAD80DE0411D
          APIs
            • Part of subcall function 00406A78: lstrcmpiA.KERNEL32(00000000,?), ref: 00406AE5
          • GetModuleHandleA.KERNEL32(?), ref: 00406D9F
          • LoadLibraryA.KERNEL32(?,?,00008000), ref: 00406DE5
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: HandleLibraryLoadModulelstrcmpi
          • String ID:
          • API String ID: 1807310131-0
          • Opcode ID: 65269b10310d135794c3f9778b72bdcdfff03c5285d6f81311c37d00341f240e
          • Instruction ID: dbd80ae6ca460460c6c685332eb3614416d1502347f7d3d9015c66c16be920aa
          • Opcode Fuzzy Hash: 65269b10310d135794c3f9778b72bdcdfff03c5285d6f81311c37d00341f240e
          • Instruction Fuzzy Hash: 17615075D04208EFCB04DFA4D885B9EBBB5BF45304F1081AEE815AB381DB39AA45CF95
          APIs
          • GetStdHandle.KERNEL32(000000F6), ref: 0133711C
          • GetFileType.KERNELBASE(00000000), ref: 0133712E
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: FileHandleType
          • String ID:
          • API String ID: 3000768030-0
          • Opcode ID: f8b7932761701d4068e97f9a5a855c4f2b75feb4e6f382095bdc33d869235744
          • Instruction ID: a0a7dfe90f06062a98c69da66501a2c2f18608db4aa4ddb5a172193dbe992f5c
          • Opcode Fuzzy Hash: f8b7932761701d4068e97f9a5a855c4f2b75feb4e6f382095bdc33d869235744
          • Instruction Fuzzy Hash: DE11ECF790479147D7304E3D8C88A22BEAAA7D6238F24071AE6B6D65F2D730D445D248
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 47426f0a99a9ae0b765c2024be68fea99a6ef9775fef4e67f7e51cb592b18550
          • Instruction ID: 8eb5367055503b9645777a1b4983ca9471419231227fab5f31a21fac5a6c47ab
          • Opcode Fuzzy Hash: 47426f0a99a9ae0b765c2024be68fea99a6ef9775fef4e67f7e51cb592b18550
          • Instruction Fuzzy Hash: 4301B5777102255FEB269D6EEC8095A3BAAABC43347148120FA14EB148DB31E4018794
          APIs
          • GetLastError.KERNEL32(01349A28,0000000C), ref: 013336E5
          • ExitThread.KERNEL32 ref: 013336EC
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ErrorExitLastThread
          • String ID:
          • API String ID: 1611280651-0
          • Opcode ID: dea0784346f93db8dd479dd0023ca46dfc4495208ef2ae1260f6d06ddd0cac98
          • Instruction ID: 9aeafd35ab94ee4ae45eefc41ae8aef831810e2f0257edb29c82d5b4fc9ed951
          • Opcode Fuzzy Hash: dea0784346f93db8dd479dd0023ca46dfc4495208ef2ae1260f6d06ddd0cac98
          • Instruction Fuzzy Hash: 12F0C2759002069FDB11BFB8D849A6E3B75FF84728F104248F006A7651CB346941DFA5
          APIs
          • __CxxThrowException@8.LIBVCRUNTIME ref: 0132E441
            • Part of subcall function 0132F437: RaiseException.KERNEL32(?,?,?,0132E463,?,?,?,?,?,?,?,?,0132E463,?,013497BC), ref: 0132F497
          • __CxxThrowException@8.LIBVCRUNTIME ref: 0132E45E
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionRaise
          • String ID:
          • API String ID: 3476068407-0
          • Opcode ID: 89363efe53cf2840974abcd4474f6e625b6ac01f82a30f79710f927faed61f9d
          • Instruction ID: 858037ecd8b7f064a28b7dc7566e6972f5b9c9f0d8d50ac087a55f6ad101c9b1
          • Opcode Fuzzy Hash: 89363efe53cf2840974abcd4474f6e625b6ac01f82a30f79710f927faed61f9d
          • Instruction Fuzzy Hash: 29F0B43180021E77CB04FAEDE849D9E3B6C592012CB908175EA28A1490EB70E65682D0
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 3ca24af4ab2577f874c32e62f6a3d0441db063e56d9d03d5cca0fa4daa7c8df9
          • Instruction ID: d6fddb3ffa3d6922ece75a31ac1cc23740a418bb4390fcc70fa72849c2d78220
          • Opcode Fuzzy Hash: 3ca24af4ab2577f874c32e62f6a3d0441db063e56d9d03d5cca0fa4daa7c8df9
          • Instruction Fuzzy Hash: 01F049B451430ABBDB30EFA4F849B5DBBE4BB44354F004418EA54832A4E734E61ADBA6
          APIs
          • GetCommandLineW.KERNEL32(?), ref: 0132DAFB
          • CommandLineToArgvW.SHELL32(00000000), ref: 0132DB02
            • Part of subcall function 0132DB10: lstrcpyA.KERNEL32(00000000,askg-9dwkaJU90TAE4320-FOKE904116FSAG156JEWG), ref: 0132DB69
            • Part of subcall function 0132DB10: ReleaseMutex.KERNEL32(?), ref: 0132DB84
            • Part of subcall function 0132DB10: CloseHandle.KERNEL32(?), ref: 0132DB8C
            • Part of subcall function 0132DB10: CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 0132DBA1
            • Part of subcall function 0132DB10: GetLastError.KERNEL32 ref: 0132DBB1
            • Part of subcall function 0132DB10: ReleaseMutex.KERNEL32(?), ref: 0132DBD8
            • Part of subcall function 0132DB10: CloseHandle.KERNEL32(?), ref: 0132DBE0
            • Part of subcall function 0132DB10: CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 0132DC09
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Mutex$CloseCommandCreateHandleLineRelease$ArgvErrorLastlstrcpy
          • String ID:
          • API String ID: 2550419470-0
          • Opcode ID: 571543bbde7795d2a397e14597f35a3d58182bc5d70590e4e06ca39c8e1922d5
          • Instruction ID: da5770ca2bbae9b78daf8cfed6ec23ff5e37e9bc9a30b754d66ce3b33e27b5b3
          • Opcode Fuzzy Hash: 571543bbde7795d2a397e14597f35a3d58182bc5d70590e4e06ca39c8e1922d5
          • Instruction Fuzzy Hash: 2CD09E7890020CABC724AFF9ED4C64EBBBCEF04701F604965E601A7504DE34B6048B65
          APIs
          • WSAStartup.WS2_32(00000202,?), ref: 013211BE
            • Part of subcall function 0132A5F0: InitializeCriticalSection.KERNEL32(00000020,7B2C007C,00000004,?,00000000), ref: 0132A637
            • Part of subcall function 0132A5F0: wsprintfA.USER32 ref: 0132A6D7
            • Part of subcall function 0132A5F0: CreateSemaphoreA.KERNEL32(00000000,00000000,7FFFFFFF,?), ref: 0132A6F0
            • Part of subcall function 0132A5F0: InitializeCriticalSection.KERNEL32(00000040), ref: 0132A705
            • Part of subcall function 0132A5F0: Sleep.KERNELBASE(0000000A), ref: 0132A759
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalInitializeSection$CreateSemaphoreSleepStartupwsprintf
          • String ID:
          • API String ID: 3317758546-0
          • Opcode ID: 4c81feced85962bf8b62701cd1180b5fb970b65f0d34985ca3941e4a9c15baea
          • Instruction ID: edbf412dcd36a821c88790b92d921fbcb0de391923f7dbe01b605b84474fe9bd
          • Opcode Fuzzy Hash: 4c81feced85962bf8b62701cd1180b5fb970b65f0d34985ca3941e4a9c15baea
          • Instruction Fuzzy Hash: 2251B471D00319ABEB10EF98CC85BDEBBB8FF29708F144159E504BB281E7755648CBA0
          APIs
            • Part of subcall function 01337210: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,01335B98,00000001,00000364,00000008,000000FF,?,?,01335CC6,01335CFA,?,?,01335318), ref: 01337251
          • _free.LIBCMT ref: 0133A4A1
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: AllocateHeap_free
          • String ID:
          • API String ID: 614378929-0
          • Opcode ID: 4f0f330ebff77c45126fbbde768a9c9102f7250cbf911937bfa4c27d9d66663d
          • Instruction ID: bf9d2f10a591cb8a1fc6adfd50a062f382ff7457d8e25ae5c5f9cfc849a84c6d
          • Opcode Fuzzy Hash: 4f0f330ebff77c45126fbbde768a9c9102f7250cbf911937bfa4c27d9d66663d
          • Instruction Fuzzy Hash: 140149726043176FD321CF6CC88599AFB98FB843B4F140629E595F76C0E770A810C7A8
          APIs
          • send.WS2_32(00000000,?,?,00000000), ref: 0132D68C
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: send
          • String ID:
          • API String ID: 2809346765-0
          • Opcode ID: ce92ef8ce3c56a1c7a3a299b16c27714ff06663fa5f8d34e63d89ea573728392
          • Instruction ID: 17d4033c8aa1af6e2066c15b942fe28f5980432f899d2cdda4ba7a8a3b21eee6
          • Opcode Fuzzy Hash: ce92ef8ce3c56a1c7a3a299b16c27714ff06663fa5f8d34e63d89ea573728392
          • Instruction Fuzzy Hash: 50F0E9327011286BD3306AADAD84AB7F7ACDFC5675F61436AFD0CD7280E562DC4142E0
          APIs
          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,01335B98,00000001,00000364,00000008,000000FF,?,?,01335CC6,01335CFA,?,?,01335318), ref: 01337251
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: 062865fdea024dc7dfd2e5db7a6a34cc3258e963db5cdbb19335f55d32cc2247
          • Instruction ID: d289ac25eee2510c81f2024fda546871248a1e006a52efeaf4b14a105fee3f47
          • Opcode Fuzzy Hash: 062865fdea024dc7dfd2e5db7a6a34cc3258e963db5cdbb19335f55d32cc2247
          • Instruction Fuzzy Hash: 07F0E2B1601229A7EB311A6E9844B5A7B4CAFC27B8B188112FE14F6184CF20E40186EC
          APIs
          • RtlAllocateHeap.NTDLL(00000000,013339DF,?,?,01333B05,?,?,01333AD8,?,00000000,?,?,?,?,013339DF,?), ref: 01335D40
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: b5fd08a50633f6ea2b0c6674437db1abd57bc3dd1f4e9634f27b53a78c19cc75
          • Instruction ID: 5f2320dd6a8753aa74aa4b130a1c809ae7e9ff7c887679c277be71be64ac5b96
          • Opcode Fuzzy Hash: b5fd08a50633f6ea2b0c6674437db1abd57bc3dd1f4e9634f27b53a78c19cc75
          • Instruction Fuzzy Hash: C5E02275100626A7EB312A6D9C0CB9FBE5C9FD13B9F080120ED14AA490CF20D8438AEC
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: 855b6c7354ddf3431956d7bb09b244747a57efe484c7028d1ad1b2b387a83e7a
          • Instruction ID: ece91d78cbcfa15b7b69ddd655c9d6869e5b97ae9f703c7545144adfe790bb62
          • Opcode Fuzzy Hash: 855b6c7354ddf3431956d7bb09b244747a57efe484c7028d1ad1b2b387a83e7a
          • Instruction Fuzzy Hash: 13D0A7332582085A9A10DBF1FCC180A735DF281238B904112E00C82515C67BB5D189A8
          APIs
          • GlobalMemoryStatus.KERNEL32 ref: 00419E7F
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: GlobalMemoryStatus
          • String ID:
          • API String ID: 1890195054-0
          • Opcode ID: caea38b1e1c07932f35114d039bd7da8db6486b9ea794cca1521de716290f2de
          • Instruction ID: dc1190e6d1d7193cfc3b50af8069e1585b856c148f341bb7123317756b66f15c
          • Opcode Fuzzy Hash: caea38b1e1c07932f35114d039bd7da8db6486b9ea794cca1521de716290f2de
          • Instruction Fuzzy Hash: D0B092344046106BE2106B29CD82B5EB290AB84728FC44608B4F8463C2E77D52A48B8B
          APIs
          • VirtualAlloc.KERNEL32(00000000,004108A6,00002000,00000001,00D20000,?,00419812,0040F8A8,00000004,004108A7,00000000,004108A7,004108AA), ref: 00419368
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 86a125e0cd4dfdb7b2e82ac6f3cfd80f3c3788dbbc83177cf6d2894eb4e25684
          • Instruction ID: 4604f6e08d200e8b283d5d0738b7955d8eabfef7505b35234b0acc47fb15d85f
          • Opcode Fuzzy Hash: 86a125e0cd4dfdb7b2e82ac6f3cfd80f3c3788dbbc83177cf6d2894eb4e25684
          • Instruction Fuzzy Hash: FCF01D703983089FEB20DF95ECD5BA677E5FB54318F504532E9148B3A5D3B9ACC18618
          APIs
          • VirtualAlloc.KERNEL32(00000004,00001000,00001000,00000004,0040E8A8,0040E8A8,00D20000,?,00419924,00000004,0040E8A8,00000000,004108A7,004108AA), ref: 004193A7
            • Part of subcall function 004193DC: VirtualFree.KERNEL32(00D20000,004199EF,00004000,?,004199EF,00D20000,0041B356,0041B452,00000000), ref: 004193EC
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Virtual$AllocFree
          • String ID:
          • API String ID: 2087232378-0
          • Opcode ID: 4d27b5ec2ced0ea1a562c02fa45f95318fd3b614bc5d91e31200cd29130165be
          • Instruction ID: beb6835c91bf043c98e0cbc95115ed4b284aba5560e972d4f03f207468a66b83
          • Opcode Fuzzy Hash: 4d27b5ec2ced0ea1a562c02fa45f95318fd3b614bc5d91e31200cd29130165be
          • Instruction Fuzzy Hash: 59E06572A4035826E62114659CA1BDBA64CCB49BF5F140126FE549A7C4D1E9AD8180A8
          APIs
          • VirtualAlloc.KERNEL32(00000000,004108A6,00002000,00000001,00D20000,?,00419812,0040F8A8,00000004,004108A7,00000000,004108A7,004108AA), ref: 00419368
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 80775a99b22b372225d3981e10d81926afe722e07feb01a3dd8d2f6286754185
          • Instruction ID: deda021343847105b1e30ba58a0d79ed6ba3bf1789be43f8b9147956badc29a3
          • Opcode Fuzzy Hash: 80775a99b22b372225d3981e10d81926afe722e07feb01a3dd8d2f6286754185
          • Instruction Fuzzy Hash: 59F0A7303883089EEB30CBA0ECD5BA637E4EB54308F100136F814CB2E1C2B49CC1C618
          APIs
            • Part of subcall function 013241E0: WideCharToMultiByte.KERNEL32(00000000,00000000,-00000005,000000FF,00000000,00000000,00000000,00000000,00000008,00000006), ref: 013242F4
          • AllocateAndInitializeSid.ADVAPI32 ref: 0132377D
          • CheckTokenMembership.ADVAPI32(00000000,00000000,?), ref: 01323794
          • FreeSid.ADVAPI32(00000000), ref: 0132379E
          • WTSEnumerateSessionsA.WTSAPI32(00000000,00000000,00000001,00000000,00000000), ref: 01323805
          • WTSQuerySessionInformationA.WTSAPI32(00000000,?,00000005,?,?,?,?,?), ref: 01323877
          • lstrcpyA.KERNEL32(?,?), ref: 013238A7
          • WTSFreeMemory.WTSAPI32(?), ref: 013238B4
          • lstrcmpA.KERNEL32(?,?), ref: 013238C6
          • WTSFreeMemory.WTSAPI32(00000000), ref: 013238FD
          • GetCurrentProcess.KERNEL32 ref: 01323918
          • WTSQueryUserToken.WTSAPI32(?,00000000), ref: 01323932
          • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,00000000), ref: 0132396C
          • SetTokenInformation.ADVAPI32(00000000,0000000C,?,00000004), ref: 01323986
          • CreateProcessAsUserA.ADVAPI32(?,00000044,00000000,00000000,00000000,00000000,00000430,00000000,00000000,00000012,?), ref: 01323A10
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Token$Free$InformationMemoryProcessQueryUser$AllocateByteCharCheckCreateCurrentDuplicateEnumerateInitializeMembershipMultiSessionSessionsWidelstrcmplstrcpy
          • String ID: D$GetSessionByUserName Error!$SYSTEM$Start Clnt program error!$StartBeCtrlAsUser Error!
          • API String ID: 3661800896-3660129879
          • Opcode ID: 03943313209ce52f0e71d4d8bab6b691c83ee96388ce8eb06697238a1f8fd26d
          • Instruction ID: 49c251c370f1fca392b13906c6b74af529c6b124a7ff69ae573699423777cab6
          • Opcode Fuzzy Hash: 03943313209ce52f0e71d4d8bab6b691c83ee96388ce8eb06697238a1f8fd26d
          • Instruction Fuzzy Hash: 17B18F75608355AFE7709F29D845B9BBBE9FFC8B08F04491EF98896240DB71E404CB92
          APIs
          • EnterCriticalSection.KERNEL32(005197C8,?,?,759230D0), ref: 0132AA9C
          • select.WS2_32(00000000,00000000,?,00000000,00000000), ref: 0132AAD6
          • GetLastError.KERNEL32(?,?,759230D0), ref: 0132AAE0
          • Sleep.KERNEL32(00000064,?,?,759230D0), ref: 0132AAF0
          • send.WS2_32(?,?,?,00000000), ref: 0132AB0D
          • shutdown.WS2_32(?,00000002), ref: 0132AB34
          • LeaveCriticalSection.KERNEL32(00000000,?,?,759230D0), ref: 0132AB40
          • LeaveCriticalSection.KERNEL32(00000000,?,?,759230D0), ref: 0132AB6A
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$Leave$EnterErrorLastSleepselectsendshutdown
          • String ID:
          • API String ID: 3229098634-0
          • Opcode ID: 770a0e7ad6b0ae6c7a709bcf36d363e90eebd679f00d78227a8ca66ea277d74b
          • Instruction ID: 72efd6e800d16f8f62d84e649d80807f521f33b01990a07b7c874e0280aec309
          • Opcode Fuzzy Hash: 770a0e7ad6b0ae6c7a709bcf36d363e90eebd679f00d78227a8ca66ea277d74b
          • Instruction Fuzzy Hash: 5291F872A002698FDB249F2CCC857D9BBF4AF19304F0541E9E949DB642D635DE86CF90
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 98ef900633e176a05decd4d65eaf5a432056b18d8361148eece7bfb8d0319df1
          • Instruction ID: 8e9b97f1082dd26b644dec1bf0b54e36b4df78435e7100c98221bc0ab041b9b5
          • Opcode Fuzzy Hash: 98ef900633e176a05decd4d65eaf5a432056b18d8361148eece7bfb8d0319df1
          • Instruction Fuzzy Hash: 2441FC316006145ACB64CB38CCC05DB77A6AF84734B14C75EEA7ACB2E5DB78D9818754
          APIs
          • FindFirstFileA.KERNEL32(?,?), ref: 0040B716
          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0040B78D
          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 0040B7A4
          • FindClose.KERNEL32(?,?,?), ref: 0040B7AC
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: FileTime$Find$CloseDateFirstLocal
          • String ID:
          • API String ID: 2659516521-0
          • Opcode ID: dea8fbccc65a181ac425a463d04661afa5eba7fac8154edd41207b22717e1493
          • Instruction ID: 4929490dea871780ca7be77c83795aa3982875203bf53442b6df949735526af2
          • Opcode Fuzzy Hash: dea8fbccc65a181ac425a463d04661afa5eba7fac8154edd41207b22717e1493
          • Instruction Fuzzy Hash: 6E117C75904208ABCB00DB54CC85BEEB779EF84314F04C1AAF8186B282D7759A959B98
          APIs
          • LoadLibraryA.KERNEL32(00409D04), ref: 0040A17A
          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0040A1CE
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: DllGetClassObject
          • API String ID: 2574300362-1075368562
          • Opcode ID: f5f30b048913f1e9f425c9767ad0071fb0976a97aa455a6337e709e40ac58349
          • Instruction ID: b1edd1a73f61097262ab9e8d0ddc22597cbed8dd85478b753700806d9e88f448
          • Opcode Fuzzy Hash: f5f30b048913f1e9f425c9767ad0071fb0976a97aa455a6337e709e40ac58349
          • Instruction Fuzzy Hash: 9B313071A40308BAEB20DB91DC43FDD7775AB48B04F10857AF905792C0E7B6AA64CB69
          APIs
          • GetSystemInfo.KERNEL32(?), ref: 00405922
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: InfoSystem
          • String ID:
          • API String ID: 31276548-0
          • Opcode ID: 9fb9587b60405596d460b12b6166390c64b8876fc0ab6e5e20dc957524d17fc8
          • Instruction ID: 5870528404904ba449a60c71dc331c2b8c4045fc2800e8edcf186cf51ddcd41c
          • Opcode Fuzzy Hash: 9fb9587b60405596d460b12b6166390c64b8876fc0ab6e5e20dc957524d17fc8
          • Instruction Fuzzy Hash: 54E0A0F2204805C6D71054BCE949767AA45C341330F5882338501B2AC9D13C8E291E4F
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Version
          • String ID:
          • API String ID: 1889659487-0
          • Opcode ID: 7a2138aa7d4df6c13af0f123527adcc838332f574bafe668b30a7c3000a8475f
          • Instruction ID: 0d6a264ec3b851e270e6285b47e00a54ca44b1e0e399a80f758534443d972ac8
          • Opcode Fuzzy Hash: 7a2138aa7d4df6c13af0f123527adcc838332f574bafe668b30a7c3000a8475f
          • Instruction Fuzzy Hash: BEC092B2184A088AE211224A9456773B24DC710320F50403B6E589A2D2D96ED9929DDE
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: HeapProcess
          • String ID:
          • API String ID: 54951025-0
          • Opcode ID: 31462a421bdd72fd5bcf83c965c8c5ce2810c701f0a64081e847c965bf3d349d
          • Instruction ID: a445e37f1c3de6d7e4d8d87b48e98492d8f806958bc7a0f2f0780632db88022f
          • Opcode Fuzzy Hash: 31462a421bdd72fd5bcf83c965c8c5ce2810c701f0a64081e847c965bf3d349d
          • Instruction Fuzzy Hash: A4A02470100100DFC7304F34F10C30D37DCF5047C03044015F404C0014D7354144D700
          APIs
          • LoadLibraryA.KERNEL32(Kernel32.dll,00000000,00000000,7B2C007C,?,00000000), ref: 0132A11C
          • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 0132A137
          • WTSQuerySessionInformationA.WTSAPI32(00000000,00000000,00000005,00000000,?), ref: 0132A244
          • lstrcpyA.KERNEL32(?,00000000), ref: 0132A271
          • WTSFreeMemory.WTSAPI32(00000000), ref: 0132A27D
          • WTSFreeMemory.WTSAPI32(00000000), ref: 0132A347
          Strings
          • Load Wtsapi32.dll error!, xrefs: 0132A153
          • GetProcAddress WTSGetActiveConsoleSessionId error!, xrefs: 0132A13F
          • GetProcAddress WTSQueryUserToken error!, xrefs: 0132A168
          • Load Kernel32.dll error!, xrefs: 0132A124
          • Kernel32.dll, xrefs: 0132A117
          • WTSGetActiveConsoleSessionId, xrefs: 0132A131
          • WTSEnumerateSessionsA error!, xrefs: 0132A1A3
          • WTSQueryUserToken, xrefs: 0132A15A
          • Wtsapi32.dll, xrefs: 0132A146
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: FreeMemory$AddressInformationLibraryLoadProcQuerySessionlstrcpy
          • String ID: GetProcAddress WTSGetActiveConsoleSessionId error!$GetProcAddress WTSQueryUserToken error!$Kernel32.dll$Load Kernel32.dll error!$Load Wtsapi32.dll error!$WTSEnumerateSessionsA error!$WTSGetActiveConsoleSessionId$WTSQueryUserToken$Wtsapi32.dll
          • API String ID: 1218814447-111287784
          • Opcode ID: 3077d194e725dea77941fe1a3968c86255c91babeb95c96822873cbaadfad974
          • Instruction ID: 806ccedac02ab2244d11530838cb3c873054e421c8508225ca5a5f62e2380d57
          • Opcode Fuzzy Hash: 3077d194e725dea77941fe1a3968c86255c91babeb95c96822873cbaadfad974
          • Instruction Fuzzy Hash: F1A1B971900239ABDB25EB64CC45FDEB7B8EF58708F1041D9E608B7691DB716A84CF90
          APIs
          • socket.WS2_32(00000002,00000001,00000006), ref: 01327B25
          • connect.WS2_32(00000000,?,00000010), ref: 01327B3D
          • setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 01327B63
          • recv.WS2_32(00000000,00002000,00002000,00000000), ref: 01327BC1
          • StrStrA.SHLWAPI(00000000,), ref: 01327BD3
          • shutdown.WS2_32(00000000,00000002), ref: 01327BED
          • closesocket.WS2_32(00000000), ref: 01327BF4
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: closesocketconnectrecvsetsockoptshutdownsocket
          • String ID: $HTTP$lish
          • API String ID: 12264450-1280769669
          • Opcode ID: 992a438a5a648760d6fb54446f7348117f7264a4b1d2bd401f21f41e75879fa0
          • Instruction ID: 662e17d8ff7517e5bbcb4d0d5f0df6a47bcbee4a9504e49c51c5a395eebbebd0
          • Opcode Fuzzy Hash: 992a438a5a648760d6fb54446f7348117f7264a4b1d2bd401f21f41e75879fa0
          • Instruction Fuzzy Hash: C1612671A002299BEB10AFBCAC84BBEBB7CBF25714F044125F905A7281EB309545C7A1
          APIs
          • EnterCriticalSection.KERNEL32(?), ref: 01324B15
          • LeaveCriticalSection.KERNEL32(?), ref: 01324BA5
          • LeaveCriticalSection.KERNEL32(?), ref: 01324C48
          • std::_Xinvalid_argument.LIBCPMT ref: 01324C5E
            • Part of subcall function 0132ECE2: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0132ECEE
            • Part of subcall function 0132ECE2: __CxxThrowException@8.LIBVCRUNTIME ref: 0132ECFC
          • WaitForSingleObject.KERNEL32(FFFFFFFF,00000001,0000002E,01000005,?,?,0000000E,00000000,FFFFFFFF,?,?,?,?), ref: 01324D8C
          • select.WS2_32(00000000,?,00000000,00000000,01000005), ref: 01324DD2
          • recv.WS2_32(FFFFFFFF,?,0000FFEB,00000000), ref: 01324DEA
          • WaitForSingleObject.KERNEL32(00000064,00000001,?,?,?), ref: 01324E0F
            • Part of subcall function 01324F60: EnterCriticalSection.KERNEL32(?,?,?,FFFFFFFF,?,01324E31,?,00000000,?,?,?), ref: 01324F78
            • Part of subcall function 01324F60: LeaveCriticalSection.KERNEL32(00000000,?,?,?,01324E31,?,00000000,?,?,?), ref: 0132500C
          • shutdown.WS2_32(FFFFFFFF,00000002), ref: 01324E60
          • closesocket.WS2_32(FFFFFFFF), ref: 01324E67
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$Leave$EnterObjectSingleWait$Exception@8ThrowXinvalid_argumentclosesocketrecvselectshutdownstd::_std::invalid_argument::invalid_argument
          • String ID: d$list<T> too long
          • API String ID: 3101977790-3395611635
          • Opcode ID: 52dc604cb6e11f569a63571f77cebccd0bb6289566a44a279f7417c17784ec82
          • Instruction ID: 6de691d19ec8edd51238539719917f55efb2e55925856108f5369a058e3ed153
          • Opcode Fuzzy Hash: 52dc604cb6e11f569a63571f77cebccd0bb6289566a44a279f7417c17784ec82
          • Instruction Fuzzy Hash: 47E1D471A00228DFDB24DF58C884BAEBBF5FF88314F144169E95AAB391D770A940CF90
          APIs
          • GetTickCount.KERNEL32 ref: 0132CDBE
            • Part of subcall function 0132D370: SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D385
            • Part of subcall function 0132D370: SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D392
            • Part of subcall function 0132D370: SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D39F
            • Part of subcall function 0132D370: SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D3AC
            • Part of subcall function 0132D370: TerminateThread.KERNEL32(?,00000000,?,00000000,7B2C007C,?,00000000), ref: 0132D3DC
            • Part of subcall function 0132D370: TerminateThread.KERNEL32(?,00000000,?,00000000,7B2C007C,?,00000000), ref: 0132D40F
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D425
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D432
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D43F
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D44C
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D459
            • Part of subcall function 0132D370: CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D466
          • CloseHandle.KERNEL32(?), ref: 0132CDEA
          • CloseHandle.KERNEL32(?), ref: 0132CE06
          • WaitNamedPipeA.KERNEL32(00000104,00000000), ref: 0132CE22
          • CreateFileA.KERNEL32(00000104,40000000,00000000,00000000,00000003,00000080,00000000), ref: 0132CE50
          • CloseHandle.KERNEL32(?), ref: 0132CE78
          • Sleep.KERNEL32(00000064), ref: 0132CE88
          • WaitNamedPipeA.KERNEL32(00000000,00000000), ref: 0132CE91
          • CreateFileA.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000080,00000000), ref: 0132CEB3
          • Sleep.KERNEL32(00000064), ref: 0132CECD
          • GetTickCount.KERNEL32 ref: 0132CED3
          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0132CEFB
          • CreateThread.KERNEL32(00000000,00000000,0132CFF0,?,00000000,00000000), ref: 0132CF16
          • CloseHandle.KERNEL32(?), ref: 0132CF26
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseHandle$Event$Create$Thread$CountFileNamedPipeSleepTerminateTickWait
          • String ID:
          • API String ID: 1774339238-0
          • Opcode ID: 1c77733e1f2c2cab38984c341acf0d78afac0bd676560c3ea8c211c09900e628
          • Instruction ID: b49b55ca5e2b26df8a566dfbecdbc0756673d3e1523c87f1ca94e51ca41c8189
          • Opcode Fuzzy Hash: 1c77733e1f2c2cab38984c341acf0d78afac0bd676560c3ea8c211c09900e628
          • Instruction Fuzzy Hash: 9341B071640710ABE7306B38AC49B5F7BA9AF01B35F204B19F679F61D0CBB0B9458B58
          APIs
          • SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D385
          • SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D392
          • SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D39F
          • SetEvent.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D3AC
          • TerminateThread.KERNEL32(?,00000000,?,00000000,7B2C007C,?,00000000), ref: 0132D3DC
          • CloseHandle.KERNEL32(?,?,00000000,7B2C007C,?,00000000), ref: 0132D3E5
          • TerminateThread.KERNEL32(?,00000000,?,00000000,7B2C007C,?,00000000), ref: 0132D40F
          • CloseHandle.KERNEL32(?,?,00000000,7B2C007C,?,00000000), ref: 0132D418
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D425
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D432
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D43F
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D44C
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D459
          • CloseHandle.KERNEL32(?,75922EE0,00000000,0132CFA9,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132D466
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseHandle$Event$TerminateThread
          • String ID:
          • API String ID: 1027209558-0
          • Opcode ID: 1ccad4e13d1fd7746222f89fa609f2828c5ac5e3e3da311510e9cb97c9b65a67
          • Instruction ID: 68aca0aa52c9d9eb28127e08365084e86fab3821db937ddaad0f2e708780e37a
          • Opcode Fuzzy Hash: 1ccad4e13d1fd7746222f89fa609f2828c5ac5e3e3da311510e9cb97c9b65a67
          • Instruction Fuzzy Hash: BC31EB706407159BE734BBBAD888B97B7EDAF64704F15481DE55AE3290CFB4F440CA60
          APIs
          • ___free_lconv_mon.LIBCMT ref: 0133AB3E
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A6F4
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A706
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A718
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A72A
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A73C
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A74E
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A760
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A772
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A784
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A796
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A7A8
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A7BA
            • Part of subcall function 0133A6D7: _free.LIBCMT ref: 0133A7CC
          • _free.LIBCMT ref: 0133AB33
            • Part of subcall function 01335CD4: HeapFree.KERNEL32(00000000,00000000,?,01335318), ref: 01335CEA
            • Part of subcall function 01335CD4: GetLastError.KERNEL32(?,?,01335318), ref: 01335CFC
          • _free.LIBCMT ref: 0133AB55
          • _free.LIBCMT ref: 0133AB6A
          • _free.LIBCMT ref: 0133AB75
          • _free.LIBCMT ref: 0133AB97
          • _free.LIBCMT ref: 0133ABAA
          • _free.LIBCMT ref: 0133ABB8
          • _free.LIBCMT ref: 0133ABC3
          • _free.LIBCMT ref: 0133ABFB
          • _free.LIBCMT ref: 0133AC02
          • _free.LIBCMT ref: 0133AC1F
          • _free.LIBCMT ref: 0133AC37
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
          • String ID:
          • API String ID: 161543041-0
          • Opcode ID: d7fd11fdf193229c95e423969b03f3e36d90427df2c296dbaa0c81a637d23bba
          • Instruction ID: 4ae255e86a7e6f4049cdebd48e29054b3da73465e710037dda377e21f28c23d2
          • Opcode Fuzzy Hash: d7fd11fdf193229c95e423969b03f3e36d90427df2c296dbaa0c81a637d23bba
          • Instruction Fuzzy Hash: CB31A1316047059FEF25AA3CD984B9AB7F9EF8035CF244919E295DB1A0DFB5E880C718
          APIs
          • ___free_lconv_mon.LIBCMT ref: 01227F00
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E04
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E16
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E28
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E3A
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E4C
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E5E
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E70
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E82
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229E94
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229EA6
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229EB8
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229ECA
            • Part of subcall function 01229DE7: _free.LIBCMT ref: 01229EDC
          • _free.LIBCMT ref: 01227EF5
            • Part of subcall function 012257D7: HeapFree.KERNEL32(00000000,00000000,?,01224A34), ref: 012257ED
            • Part of subcall function 012257D7: GetLastError.KERNEL32(?,?,01224A34), ref: 012257FF
          • _free.LIBCMT ref: 01227F17
          • _free.LIBCMT ref: 01227F2C
          • _free.LIBCMT ref: 01227F37
          • _free.LIBCMT ref: 01227F59
          • _free.LIBCMT ref: 01227F6C
          • _free.LIBCMT ref: 01227F7A
          • _free.LIBCMT ref: 01227F85
          • _free.LIBCMT ref: 01227FBD
          • _free.LIBCMT ref: 01227FC4
          • _free.LIBCMT ref: 01227FE1
          • _free.LIBCMT ref: 01227FF9
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
          • String ID:
          • API String ID: 161543041-0
          • Opcode ID: b4d5be496ced77409db7bfd69a5b4472b426a41061743106462fef63569e94de
          • Instruction ID: b5bd0f40bf312fcaf1eb0cdff868e41fbaf6a1053ce2424f17f09122fc1370f7
          • Opcode Fuzzy Hash: b4d5be496ced77409db7bfd69a5b4472b426a41061743106462fef63569e94de
          • Instruction Fuzzy Hash: 5B313031529623FFEB25AA39DC44FBE77E8AF20210F208419F699D7590DB75E940CB60
          APIs
          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,7B2C007C,?,?), ref: 01324005
          • lstrcpyA.KERNEL32(00000000,5C2E5C5C,?,?,?,?,?,?,?,?,?,?,?,?,?,7B2C007C), ref: 013240B6
          • lstrcatA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,7B2C007C), ref: 013240C4
          • lstrcpyA.KERNEL32(-00000104,5C2E5C5C,?,?,?,?,?,?,?,?,?,?,?,?,?,7B2C007C), ref: 013240D1
          • lstrcatA.KERNEL32(-00000104,?,?,?,?,?,?,?,?,?,?,?,?,?,?,7B2C007C), ref: 013240DE
          • LeaveCriticalSection.KERNEL32(?), ref: 013241AD
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSectionlstrcatlstrcpy$EnterLeave
          • String ID: \\.\$pipe$read_pipe_session%d$wirte_pipe_session%d
          • API String ID: 2748643047-1936593525
          • Opcode ID: 9e2a7482bfa33662fa1be4df7979a429a6d0055a26ecc180f97eb300a203098f
          • Instruction ID: a644279fea0697b3450cd263c16e026cca2270d3ce27438fa6cdf08db0126bfd
          • Opcode Fuzzy Hash: 9e2a7482bfa33662fa1be4df7979a429a6d0055a26ecc180f97eb300a203098f
          • Instruction Fuzzy Hash: 3A71C0B18003149BE721EF28DC44BEABBB8FF18708F1401ADE5596B281D7B57695CB94
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$___from_strstr_to_strchr
          • String ID: H/Q
          • API String ID: 3409252457-2411224165
          • Opcode ID: 1b5dd56b267a3849da2324e7c3abdd1a0c1392e415c62b3bc518964108112f4f
          • Instruction ID: cc493da6f09a177443ffdd3b2a88fcd3249d60d5a58908db6cbb5d7f0de08194
          • Opcode Fuzzy Hash: 1b5dd56b267a3849da2324e7c3abdd1a0c1392e415c62b3bc518964108112f4f
          • Instruction Fuzzy Hash: 26510971D05316AFEF21AFBCC840A6DBBA8AF9531CF04426DE690D7291EA729540CB5C
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 1dc3eb7a6c15011a52b0d20b8678eaa2137d9c968b4ae4c8d5a5555bc171689e
          • Instruction ID: ad8011d039e9fab09595ca860196251c156ceeab8435819ccc5815ae5ef3f6b3
          • Opcode Fuzzy Hash: 1dc3eb7a6c15011a52b0d20b8678eaa2137d9c968b4ae4c8d5a5555bc171689e
          • Instruction Fuzzy Hash: EB21877690410DAFCF41EF98C880DDD7BB9BF58258F114165A615DF120EB71EA44CB84
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 90f2110b7c8a4b3d87876adf4f7262b6fe29ed00af9aac651c079666d3635641
          • Instruction ID: 2d7f6e54a688a5f351334a15fb82712b6679a4331bdf9dd5f3de9da166bd5df9
          • Opcode Fuzzy Hash: 90f2110b7c8a4b3d87876adf4f7262b6fe29ed00af9aac651c079666d3635641
          • Instruction Fuzzy Hash: FB21A77A91015DFFCB45EF94C880DEE7BB9BF18240B1081A5F6159B560EB31DA44CF80
          APIs
          • WinHttpSendRequest.WINHTTP(?,00000000,00000000,00000000,00000000,00000000,00000000,7B2C007C,00000000,00000000,00000000), ref: 01328FEE
          • WinHttpReceiveResponse.WINHTTP(?,00000000), ref: 01329002
          • WinHttpQueryDataAvailable.WINHTTP(?,?,00000000,00000000,00000000), ref: 01329089
          • WinHttpReadData.WINHTTP(?,?,?,?), ref: 013290F0
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Http$Data$AvailableQueryReadReceiveRequestResponseSend
          • String ID: list<T> too long
          • API String ID: 1320465519-4027344264
          • Opcode ID: b3cd7fa492b81bd94b1f6d13c34b7b8a424b838b3a19b8ea9b12dd88d4d12725
          • Instruction ID: ffb6d00882a6227f47c6adbf10f1c3214b9e0b4cb649c75e88296dcb89e9edc1
          • Opcode Fuzzy Hash: b3cd7fa492b81bd94b1f6d13c34b7b8a424b838b3a19b8ea9b12dd88d4d12725
          • Instruction Fuzzy Hash: AFB19375A00226EFDB10EFA8D884B9AFBF5FF59718F244168E515AB344D731B904CBA0
          APIs
          • GetCurrentDirectoryA.KERNEL32(00000103,?,?,?,?,?,00411C9E,00000000,?,?), ref: 00411CC6
          • GetLogicalDrives.KERNEL32 ref: 00411D2F
          • GetFullPathNameA.KERNEL32(?,00000103,?,?,?,?,?,?,00411C9E,00000000,?,?), ref: 00411D68
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CurrentDirectoryDrivesFullLogicalNamePath
          • String ID: .$:$:$\
          • API String ID: 3194430532-3772505838
          • Opcode ID: ddf981ba07639a143628a9e050639d1ae56430046a539d517d2774fd35372d29
          • Instruction ID: 907cad0c699b0da60b69837769f1e6e4ba428848692302a1e1449a7497e7268b
          • Opcode Fuzzy Hash: ddf981ba07639a143628a9e050639d1ae56430046a539d517d2774fd35372d29
          • Instruction Fuzzy Hash: D131BC317042489ECB10DB74DC817DF77A4AF61344F1481ABEA4197281DABCDAC6CBA9
          APIs
          • GetModuleFileNameA.KERNEL32(00000000,?,00000050,Semaphore error ,?), ref: 0041A565
          • MessageBoxA.USER32(00000000,0041C5DF,00000001,00000000), ref: 0041A5A7
          • GetStdHandle.KERNEL32(000000F4,Semaphore error ,?), ref: 0041A5B0
          • WriteFile.KERNEL32(00000000,00421FC0,00000002,?,00000000,000000F4,Semaphore error ,?), ref: 0041A5C5
          • WriteFile.KERNEL32(00000000,0041C5DF,00000000,?,00000000,00000000,00421FC0,00000002,?,00000000,000000F4,Semaphore error ,?), ref: 0041A5DA
          • WriteFile.KERNEL32(00000000,00421FC3,00000002,?,00000000,00000000,0041C5DF,00000000,?,00000000,00000000,00421FC0,00000002,?,00000000,000000F4), ref: 0041A5ED
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: File$Write$HandleMessageModuleName
          • String ID: Semaphore error
          • API String ID: 1009477876-2356287382
          • Opcode ID: 8919c9ba0c548a3917a9b5e10e387ab53b232c0197472c344645c2999ab0dba4
          • Instruction ID: 3f577c9411447908690673fd36e9594b8fc9cd7cb36b6ef1ffcd97bd9945a508
          • Opcode Fuzzy Hash: 8919c9ba0c548a3917a9b5e10e387ab53b232c0197472c344645c2999ab0dba4
          • Instruction Fuzzy Hash: 9E21077064530479E620E2F19DCAFFB7B5C8B04318F54411BB514691C2EBBC9E9586BF
          APIs
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 0132B257
            • Part of subcall function 0132C2C0: InitializeCriticalSection.KERNEL32(?,7B2C007C,00000000,00000000), ref: 0132C3CA
            • Part of subcall function 0132C6C0: CreateSemaphoreW.KERNEL32(00000000,00000000,01FFFFFF,00000000,00000000,00000000,0132B2FA), ref: 0132C6D6
            • Part of subcall function 0132AEF0: Sleep.KERNELBASE(0000000A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0132AE89,?), ref: 0132AF22
            • Part of subcall function 0132AEF0: recv.WS2_32(?,?,00000005,00000000), ref: 0132AF47
            • Part of subcall function 0132AEF0: recv.WS2_32(?,00000000,00000000,00000000), ref: 0132AFBC
          • EnterCriticalSection.KERNEL32(00000020,?,00000000,00000000,?,00000000,00000000), ref: 0132B38B
          • LeaveCriticalSection.KERNEL32(?), ref: 0132B422
          • shutdown.WS2_32(?,00000002), ref: 0132BE09
          • closesocket.WS2_32(?), ref: 0132BE12
          • EnterCriticalSection.KERNEL32(00000000,?,00000000,00000000), ref: 0132BE28
          • LeaveCriticalSection.KERNEL32(?), ref: 0132BE66
          • Sleep.KERNEL32(00000000), ref: 0132BE82
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$CreateEnterLeaveSleeprecv$EventInitializeSemaphoreclosesocketshutdown
          • String ID:
          • API String ID: 3003696879-0
          • Opcode ID: 729bb134ebfc701674b4d5d9077a2602274ea2695e1c5ea86eb966786c9a1dc9
          • Instruction ID: 2fd95c4bd49db3bc0a4d260f04ba9f518f6711513e59fa4811180148929295de
          • Opcode Fuzzy Hash: 729bb134ebfc701674b4d5d9077a2602274ea2695e1c5ea86eb966786c9a1dc9
          • Instruction Fuzzy Hash: 6CB17F7190022A9BDB34EB18DC50BEDB7B9FF14308F4441A9E55AA7694EB706E84CF90
          APIs
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,0132CE19), ref: 0132D282
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0132D292
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0132D2A2
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0132D2B2
          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0132D2C2
          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0132D2D2
          • CreateThread.KERNEL32(00000000,00000000,0132D5B0,00000000,00000000,00000000), ref: 0132D2EE
          • CreateThread.KERNEL32(00000000,00000000,0132D4C0,00000000,00000000,00000000), ref: 0132D304
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Create$Event$Thread
          • String ID:
          • API String ID: 2525963256-0
          • Opcode ID: 16c80d83f0e4ef41818f0d5a5feec753e278b93a6ec87df25f56a7f685944f79
          • Instruction ID: 48b521f54f05d52ee9814ae03338b6243408dc3b5637a402c9852bb93d11e85b
          • Opcode Fuzzy Hash: 16c80d83f0e4ef41818f0d5a5feec753e278b93a6ec87df25f56a7f685944f79
          • Instruction Fuzzy Hash: 5F21CA70BC0725BAFA356AB99C4EFD6A9A0AB44B14F240116F3186E1D0C7F5B094CAC8
          APIs
          • GetCPInfo.KERNEL32(?,?,?,7FFFFFFF,?,H/Q,0133F283,?,?,?,?,?,?,?,?,H/Q), ref: 0133F06A
          • __alloca_probe_16.LIBCMT ref: 0133F120
          • __alloca_probe_16.LIBCMT ref: 0133F1B6
          • __freea.LIBCMT ref: 0133F221
          • __freea.LIBCMT ref: 0133F22D
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: __alloca_probe_16__freea$Info
          • String ID: H/Q
          • API String ID: 2330168043-2411224165
          • Opcode ID: 94a4e1c1e6d8677e8ebd4c5209d51cc47306a70cc6d455ba1798e81d432806d4
          • Instruction ID: 1ab7ce98f58fb8606a396a37022f9ae0c700473b3cea6737ef16a40083849da6
          • Opcode Fuzzy Hash: 94a4e1c1e6d8677e8ebd4c5209d51cc47306a70cc6d455ba1798e81d432806d4
          • Instruction Fuzzy Hash: FA81D776D0020A9BEF209E6CD840EEFBFBD9FD921CF980155E904E7250D725C845CBAA
          APIs
          • WaitForSingleObject.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0132479C
          • WaitForSingleObject.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?), ref: 013247C8
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 013247D4
          • shutdown.WS2_32(000002FC,00000002), ref: 013247ED
          • closesocket.WS2_32(000002FC), ref: 013247F6
          • ReleaseSemaphore.KERNEL32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0132480A
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01324813
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseHandleObjectSingleWait$ReleaseSemaphoreclosesocketshutdown
          • String ID:
          • API String ID: 3217053743-0
          • Opcode ID: 8a51621f2c2b0a392adf1be37c0416e700b68534d0ddeddf5258288efd9e5d6a
          • Instruction ID: c8fa59b3fde7957629b1e4f2e275ed4dd4c74dd1d0230c76e6a69434195a59e7
          • Opcode Fuzzy Hash: 8a51621f2c2b0a392adf1be37c0416e700b68534d0ddeddf5258288efd9e5d6a
          • Instruction Fuzzy Hash: 6D610972600115EFCB24AFACDD419AEBBBAFF94324F14423AE525E7250DB31A911CB90
          APIs
          • StrStrA.SHLWAPI(00000031,32k1-jk-f-12121482014902184021jf0j10jf031jf01,?,?,?,?,?,?,?,?,?,?,?,0132850F,?,00000000), ref: 01325AEF
          • lstrlenA.KERNEL32(32k1-jk-f-12121482014902184021jf0j10jf031jf01,?,?,?,?,?,?,?,?,?,?,?,0132850F,?,00000000), ref: 01325B09
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: lstrlen
          • String ID: 0j10jf031jf01$1jf01$32k1-jk-f-12121482014902184021jf0j10jf031jf01
          • API String ID: 1659193697-1419504729
          • Opcode ID: 65623f42a82125cc4325222500f54e9e1f46caf2665b57bbe902c2b1f557762c
          • Instruction ID: 8b05c40699af5142ea1d412d78f70c2a0b17989bc7b398246d03ea9812e02e8a
          • Opcode Fuzzy Hash: 65623f42a82125cc4325222500f54e9e1f46caf2665b57bbe902c2b1f557762c
          • Instruction Fuzzy Hash: 7BA1B230D08298DFDF02DBA8D4847DDBFF5AF16348F54408AE451BB242D3BA5A4ACB65
          APIs
          • _ValidateLocalCookies.LIBCMT ref: 0132F30B
          • ___except_validate_context_record.LIBVCRUNTIME ref: 0132F313
          • _ValidateLocalCookies.LIBCMT ref: 0132F3A1
          • __IsNonwritableInCurrentImage.LIBCMT ref: 0132F3CC
          • _ValidateLocalCookies.LIBCMT ref: 0132F421
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
          • String ID: csm
          • API String ID: 1170836740-1018135373
          • Opcode ID: 8ab7c86629445aadefa4e71db4d7e942228d33a23c980702df96828c9b69981e
          • Instruction ID: d93ce6ce13fcd468a2c268646e03698d932328f5d6d2f246e8bebc9469814d9e
          • Opcode Fuzzy Hash: 8ab7c86629445aadefa4e71db4d7e942228d33a23c980702df96828c9b69981e
          • Instruction Fuzzy Hash: 6B41D634A002199BCF10EF6DC844A9EBBB9EF8532CF148255EA15AB355D731EA05CF91
          APIs
          • _ValidateLocalCookies.LIBCMT ref: 012228FB
          • ___except_validate_context_record.LIBVCRUNTIME ref: 01222903
          • _ValidateLocalCookies.LIBCMT ref: 01222991
          • __IsNonwritableInCurrentImage.LIBCMT ref: 012229BC
          • _ValidateLocalCookies.LIBCMT ref: 01222A11
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
          • String ID: csm
          • API String ID: 1170836740-1018135373
          • Opcode ID: 9ecf99eebf57c4624058f904409324758e09dc5ea94c5de8fcb4b7ead76b8e50
          • Instruction ID: fe44f7592b02444534f9a82e68a16a93dc5d6f79d467aabae35e5d6baa04df5d
          • Opcode Fuzzy Hash: 9ecf99eebf57c4624058f904409324758e09dc5ea94c5de8fcb4b7ead76b8e50
          • Instruction Fuzzy Hash: 8F419234F2022AFBCB20DF68C844AAEBFA5BF44364F248155E915AB351D772DA11CB91
          APIs
          • GetTickCount.KERNEL32 ref: 0132D11C
          • PeekNamedPipe.KERNEL32(?,?,00010000,?,?,?,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D167
          • Sleep.KERNEL32(00000001,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D173
          • SetEvent.KERNEL32(?,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D192
          • ReadFile.KERNEL32(?,00010000,00010000,?,00000000,01323CEB,00000000,?,?,00010000), ref: 0132D1DB
          • SetEvent.KERNEL32(?,?,00010000), ref: 0132D1FF
          • SetEvent.KERNEL32(?,?,00010000), ref: 0132D24C
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Event$CountFileNamedPeekPipeReadSleepTick
          • String ID:
          • API String ID: 1884357934-0
          • Opcode ID: 6854af779aa8e73dbec5541697e4b533a99996dad573bacfda51bffad24264c5
          • Instruction ID: 72f5957d32ec52c875c84e84e5d0d048921595e5a7ffc7371451c92ff9d68d72
          • Opcode Fuzzy Hash: 6854af779aa8e73dbec5541697e4b533a99996dad573bacfda51bffad24264c5
          • Instruction Fuzzy Hash: 2E411C71A002299BDB25DF58DC84FDAB7A9FF4C344F1000A5F948A7154CBB0AAD4DB94
          APIs
          • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,00519788,00000000,005128F8), ref: 0132CCEE
          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0132CD02
          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0132CD60
          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0132CD6D
          • Process32NextW.KERNEL32(?,0000022C), ref: 0132CD7C
            • Part of subcall function 0132CCB0: CloseHandle.KERNEL32(?), ref: 0132CD31
          • CloseHandle.KERNEL32(?), ref: 0132CD8C
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
          • String ID:
          • API String ID: 2696918072-0
          • Opcode ID: 3e2fcc3e226e836e5b904d46b6fb281b44dbc51f4c4f864199dcf84edc12daf3
          • Instruction ID: 86b74a9fa418236b543e066b1dc407e332879551355b5fc10e959d310dcdbb35
          • Opcode Fuzzy Hash: 3e2fcc3e226e836e5b904d46b6fb281b44dbc51f4c4f864199dcf84edc12daf3
          • Instruction Fuzzy Hash: C021A435A41228ABDB30BF68BC49BAE7BB9EF05714F1001D9E909A7180DB356E45CF50
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: api-ms-$ext-ms-
          • API String ID: 0-537541572
          • Opcode ID: 703b94b9943000f9d02adc948eeb2abe70db5e9cdfb999fad222c8981467fe59
          • Instruction ID: 2b4e0c78a1a434adc30977a8a02e904e947ebfd3b1f7ec1be207b73f0e5e8a23
          • Opcode Fuzzy Hash: 703b94b9943000f9d02adc948eeb2abe70db5e9cdfb999fad222c8981467fe59
          • Instruction Fuzzy Hash: 29210A33A6523EBBDB324E689C49B6E3B589F01BA0F150510EE06E7285D674ED41C6E0
          APIs
          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0132D4CF
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0132D4E8
          • WaitForSingleObject.KERNEL32(?,0000000A,?), ref: 0132D518
          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 0132D52D
          • CloseHandle.KERNEL32(?), ref: 0132D562
          • CloseHandle.KERNEL32(?), ref: 0132D57E
          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0132D592
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ObjectSingleWait$CloseHandle
          • String ID:
          • API String ID: 1103153922-0
          • Opcode ID: f7cc57f42988277ad00e453ad9e4d4c63afb224ab850f37857e5075b889470e5
          • Instruction ID: 362f38761e55b68e8b7cc8ef04045343f0966989bdb4038830c762165037a95c
          • Opcode Fuzzy Hash: f7cc57f42988277ad00e453ad9e4d4c63afb224ab850f37857e5075b889470e5
          • Instruction Fuzzy Hash: BC21A571300616ABE7746AB9EC88B56F799BB1031DF344724FA29E11E4DBA0E4D1CA80
          APIs
            • Part of subcall function 0133A83E: _free.LIBCMT ref: 0133A863
          • _free.LIBCMT ref: 0133A8C4
            • Part of subcall function 01335CD4: HeapFree.KERNEL32(00000000,00000000,?,01335318), ref: 01335CEA
            • Part of subcall function 01335CD4: GetLastError.KERNEL32(?,?,01335318), ref: 01335CFC
          • _free.LIBCMT ref: 0133A8CF
          • _free.LIBCMT ref: 0133A8DA
          • _free.LIBCMT ref: 0133A92E
          • _free.LIBCMT ref: 0133A939
          • _free.LIBCMT ref: 0133A944
          • _free.LIBCMT ref: 0133A94F
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 36ae34d8c498a0ee66199fbf192589ce521e20ed501f52a735bdbc3930427aff
          • Instruction ID: 21a3a16bde6ee4a295cac477706dca2f1298a656de0ad67f5756c5e7b5ae9de9
          • Opcode Fuzzy Hash: 36ae34d8c498a0ee66199fbf192589ce521e20ed501f52a735bdbc3930427aff
          • Instruction Fuzzy Hash: E8115171580B05AAE920BBB4CC45FCBBFEC5F91708F400915A3DDEF090DA65B5058794
          APIs
            • Part of subcall function 01229F4E: _free.LIBCMT ref: 01229F73
          • _free.LIBCMT ref: 01229FD4
            • Part of subcall function 012257D7: HeapFree.KERNEL32(00000000,00000000,?,01224A34), ref: 012257ED
            • Part of subcall function 012257D7: GetLastError.KERNEL32(?,?,01224A34), ref: 012257FF
          • _free.LIBCMT ref: 01229FDF
          • _free.LIBCMT ref: 01229FEA
          • _free.LIBCMT ref: 0122A03E
          • _free.LIBCMT ref: 0122A049
          • _free.LIBCMT ref: 0122A054
          • _free.LIBCMT ref: 0122A05F
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: b348e3f783d6a82b4bb9dd030ff3c08d20ef0319aa47b717d37a187bcb2f7b16
          • Instruction ID: 4205006c5e697a81742937365857255ca4b3ef28aa849fe782551afebeba2522
          • Opcode Fuzzy Hash: b348e3f783d6a82b4bb9dd030ff3c08d20ef0319aa47b717d37a187bcb2f7b16
          • Instruction Fuzzy Hash: CF1156319A5B35FADA60BBB0CC45FEFB79CAF12700F404814F39AA6490EB35A5448B50
          APIs
          • GetEnvironmentVariableA.KERNEL32(?,?,00000104), ref: 00410FA8
          • SetEnvironmentVariableA.KERNEL32(0000003D,?,?,?,00000104), ref: 00410FC7
            • Part of subcall function 00412240: GetLastError.KERNEL32(00410D49,?,?,00410BE1,00000000,00000000,?,?,00410BE1,?,?,00000000), ref: 00412240
          • SetCurrentDirectoryA.KERNEL32(?,?,?,00000104), ref: 00410FD7
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: EnvironmentVariable$CurrentDirectoryErrorLast
          • String ID: :$=
          • API String ID: 2603090644-2134709475
          • Opcode ID: 3333373e7f2a2e62c7d39c8f06278b636757890a912a2a3d75bc94472799b3f5
          • Instruction ID: de6e492b85b864edf4cc986593a57bca3a3f60b318ef2d687048410b08edfedb
          • Opcode Fuzzy Hash: 3333373e7f2a2e62c7d39c8f06278b636757890a912a2a3d75bc94472799b3f5
          • Instruction Fuzzy Hash: D71127304083C7A8D72287798841BDBFF645F16348F1481CBD59496283D7FD9ACAD36A
          APIs
          • SetEvent.KERNEL32(00000000,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132CF57
          • WaitForSingleObject.KERNEL32(00000000,000003E8,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132CF6A
          • TerminateThread.KERNEL32(00000000,00000000,?,00000000,7B2C007C,?,00000000), ref: 0132CF7C
          • CloseHandle.KERNEL32(00000000,?,00000000,7B2C007C,?,00000000), ref: 0132CF85
          • CloseHandle.KERNEL32(00000000,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132CF96
          • CloseHandle.KERNEL32(?,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132CFB9
          • CloseHandle.KERNEL32(?,00519788,00000000,0132AC3B,?,00000000,7B2C007C,?,00000000), ref: 0132CFD5
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseHandle$EventObjectSingleTerminateThreadWait
          • String ID:
          • API String ID: 3210639814-0
          • Opcode ID: d4c656ebb46d4093dd1d3103a2a4734690053752f4ec9217c4103f63a5c13e3f
          • Instruction ID: 9b906ec42569b28a7a6f3f6511e6f9fc8789014738052572e06025da53916e16
          • Opcode Fuzzy Hash: d4c656ebb46d4093dd1d3103a2a4734690053752f4ec9217c4103f63a5c13e3f
          • Instruction Fuzzy Hash: 301130702007116BEB34AB3ED848F1BBBE9AF00314F158A19E569D32E0DB74E889CB50
          APIs
          • SetCurrentDirectoryA.KERNEL32(?,?,0040B065,?), ref: 00410E05
          • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?,0040B065,?), ref: 00410E20
            • Part of subcall function 00412240: GetLastError.KERNEL32(00410D49,?,?,00410BE1,00000000,00000000,?,?,00410BE1,?,?,00000000), ref: 00412240
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CurrentDirectory$ErrorLast
          • String ID: :$:$=
          • API String ID: 1128942804-2191499938
          • Opcode ID: b0aa4e63f355d2f5778741a7c3e2e632ad7bfc9513194cda444bfe7fb904ee19
          • Instruction ID: e0c2c857becbd3c8f47ed9a43efd6d2c68a516e6a8bcae1fca0655ced50fd386
          • Opcode Fuzzy Hash: b0aa4e63f355d2f5778741a7c3e2e632ad7bfc9513194cda444bfe7fb904ee19
          • Instruction Fuzzy Hash: B801FC7188838954CB31A3B68C417DF77785B11348F0444CBA48495252DBFD8BC5C76F
          APIs
          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0041A70C
          • GetProcAddress.KERNEL32(00000000,GetProcAddress), ref: 0041A719
          • GetVersionExA.KERNEL32 ref: 0041A73E
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AddressHandleModuleProcVersion
          • String ID: Borland32$GetProcAddress$kernel32.dll
          • API String ID: 3310240892-88975745
          • Opcode ID: a428a6786f6c01b51ee1a8eeaef24e5087bee44a3e217bedb3c3b6c5caf7210d
          • Instruction ID: ed6b18fe7ce9bf2566eea959f4d369b0ed1d1afbb2c80f75fe456d9b0f56b118
          • Opcode Fuzzy Hash: a428a6786f6c01b51ee1a8eeaef24e5087bee44a3e217bedb3c3b6c5caf7210d
          • Instruction Fuzzy Hash: 7EF096B43C630146D3206F20AE85BA27AF4A710305FA8401774714B2E2D7BCC7D69A6F
          APIs
          • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 013380DF
          • __fassign.LIBCMT ref: 013382C4
          • __fassign.LIBCMT ref: 013382E1
          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01338329
          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 01338369
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 01338411
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
          • String ID:
          • API String ID: 1735259414-0
          • Opcode ID: 5c70d388a937d0f1cb313994b1dc1f834c884c4be83e067baea4087e91747b55
          • Instruction ID: c45ca3d1121d8eb7b5ee6e6e3b5f97ff39c7ae29d2c7ac22a05d90b6c03df023
          • Opcode Fuzzy Hash: 5c70d388a937d0f1cb313994b1dc1f834c884c4be83e067baea4087e91747b55
          • Instruction Fuzzy Hash: B7C19175D002598FDB11CFE8C8809EDBBB5EF88318F2842AAE955F7341D631A946CF64
          APIs
          • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 012290E7
          • __fassign.LIBCMT ref: 012292CC
          • __fassign.LIBCMT ref: 012292E9
          • WriteFile.KERNEL32(?,01227887,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01229331
          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 01229371
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 01229419
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
          • String ID:
          • API String ID: 1735259414-0
          • Opcode ID: 5ec113d05914b9ffb1da4e5d88f502a0ccf6af9f5008b9c2bdd74c660db52322
          • Instruction ID: c306cedc411372ae6223ce99dca873a069e2a783d6aaf3d63ba6381e407fba01
          • Opcode Fuzzy Hash: 5ec113d05914b9ffb1da4e5d88f502a0ccf6af9f5008b9c2bdd74c660db52322
          • Instruction Fuzzy Hash: 41C1D271D10269AFCF15CFE8D8809EDBBB9FF08308F28416AE915B7241D6319A46CF60
          APIs
          • GetLastError.KERNEL32(?,?,0132F6AB,0132EE90), ref: 0132F6C2
          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0132F6D0
          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0132F6E9
          • SetLastError.KERNEL32(00000000,?,0132F6AB,0132EE90), ref: 0132F73B
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ErrorLastValue___vcrt_
          • String ID:
          • API String ID: 3852720340-0
          • Opcode ID: 0a575d0d5b5322cf82298b5c9043e7b6636bb8bba584d763eaccae5e1bc2d40c
          • Instruction ID: e66fe9fa77e011f505d2316ce5df9e4a4dc8359138a3f70ab91373e5dec80695
          • Opcode Fuzzy Hash: 0a575d0d5b5322cf82298b5c9043e7b6636bb8bba584d763eaccae5e1bc2d40c
          • Instruction Fuzzy Hash: 4101D83A5097266FE639397CBC8452B2E6CEB557BDB200329F520D81F5EF5198059344
          APIs
          • GetLastError.KERNEL32(00000001,?,01222A78,012222B0,01221E0B,?,01222028,?,00000001,?,?,00000001,?,01231E28,0000000C,0122211C), ref: 01222E34
          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 01222E42
          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01222E5B
          • SetLastError.KERNEL32(00000000,01222028,?,00000001,?,?,00000001,?,01231E28,0000000C,0122211C,?,00000001,?), ref: 01222EAD
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ErrorLastValue___vcrt_
          • String ID:
          • API String ID: 3852720340-0
          • Opcode ID: 1f4506ca36e195de2674a1ff479408c53a8851a5725046b6a999284a285cdae3
          • Instruction ID: 135da10e59da89699518801eea82664579c7b78b2f82f481eea8151688d09e2c
          • Opcode Fuzzy Hash: 1f4506ca36e195de2674a1ff479408c53a8851a5725046b6a999284a285cdae3
          • Instruction Fuzzy Hash: 1B01FC32538337FDE73575BCBD88A7F6B55FB156757300229E610850E5EF5A5802A340
          APIs
          • WaitForSingleObject.KERNEL32(?,00000001), ref: 0132D5C6
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0132D5D8
          • WaitForSingleObject.KERNEL32(?,?), ref: 0132D5EA
          • WaitForSingleObject.KERNEL32(?,00000001), ref: 0132D5FB
          • CloseHandle.KERNEL32(?), ref: 0132D624
          • CloseHandle.KERNEL32(?), ref: 0132D640
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ObjectSingleWait$CloseHandle
          • String ID:
          • API String ID: 1103153922-0
          • Opcode ID: 84a8b8a2daec6048a15555b0f736a9420a8b65f826eaa13e3067d740365f126f
          • Instruction ID: b65595ec7aab836e163f5d45d578d0b78d4f411aa0d4d3805a2f932fe5c5d727
          • Opcode Fuzzy Hash: 84a8b8a2daec6048a15555b0f736a9420a8b65f826eaa13e3067d740365f126f
          • Instruction Fuzzy Hash: EA01F97220071556EB307AFDEC04F97BBEAAF90774F210625E679D21E0DB71E4418B60
          APIs
          • GetFullPathNameA.KERNEL32(?,00000104,00000000,?,?,004112C1,00000000), ref: 00411BEA
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: FullNamePath
          • String ID: :$:$\
          • API String ID: 608056474-3089822572
          • Opcode ID: 0f7d0844f87900af5a3f9987fe86b541753271bfd51b48c8026395d9f879259a
          • Instruction ID: 18e07f53c16697aaca46239d161a3705be786d2aab2814a16cf95fef61e3ccd5
          • Opcode Fuzzy Hash: 0f7d0844f87900af5a3f9987fe86b541753271bfd51b48c8026395d9f879259a
          • Instruction Fuzzy Hash: 77219E327882592ADB2897359C819DF669D5F51364F24061FFA53972C1F8BCCDC082AD
          Strings
          • C:\Windows\Logs\logs\brcc.exe, xrefs: 0133968A
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: C:\Windows\Logs\logs\brcc.exe
          • API String ID: 0-3000847071
          • Opcode ID: 67b8d65ed9cdf5d5a2f65cb0f49d0615cd01b34144122aa8e5f40f00e62bc55c
          • Instruction ID: 3c8b48ab4bfea7309768074153c7f15ea2706bc0964cb396910e144a9f42df9c
          • Opcode Fuzzy Hash: 67b8d65ed9cdf5d5a2f65cb0f49d0615cd01b34144122aa8e5f40f00e62bc55c
          • Instruction Fuzzy Hash: F121A47160020AEFDB22AF799C80AAB77ADEFD037CB104614F86597191DB71EC40C7A8
          Strings
          • C:\Windows\Logs\logs\brcc.exe, xrefs: 01226048
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: C:\Windows\Logs\logs\brcc.exe
          • API String ID: 0-3000847071
          • Opcode ID: 9a290b65175a7a6c39f4a2c086f516b77d5878265cc32e1712357ac6728fb662
          • Instruction ID: f0a46e281d341107a19ffa5ede419c6450a9e5ac13f97bf839eb2de8279ce75b
          • Opcode Fuzzy Hash: 9a290b65175a7a6c39f4a2c086f516b77d5878265cc32e1712357ac6728fb662
          • Instruction Fuzzy Hash: 22219F72620237BFDB21AF658D80D7E77ADEF002A47208614FD25A7252EB75ED40C7A0
          APIs
          • FreeConsole.KERNEL32 ref: 01221C30
          • GetCurrentProcess.KERNEL32(00000000), ref: 01221C58
          • GetModuleHandleA.KERNEL32(00000000), ref: 01221C62
          • WriteProcessMemory.KERNEL32(00000000,00006DEA,01233860,00002890,?), ref: 01221C7E
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: Process$ConsoleCurrentFreeHandleMemoryModuleWrite
          • String ID: d
          • API String ID: 749819067-2564639436
          • Opcode ID: 637d19cbce9da3e2baa4d6030bdedb21607a36059f498ac4e4f40c5ac5a0b55a
          • Instruction ID: 0ece0021f5064b1a82269039f0adf2d968b387b4930c9af4424f9dea56722fa1
          • Opcode Fuzzy Hash: 637d19cbce9da3e2baa4d6030bdedb21607a36059f498ac4e4f40c5ac5a0b55a
          • Instruction Fuzzy Hash: 8AF0A435A2021CFBCB34EFB4E80DFAE7764EB14301F40416DE9065B180DA799A14CB95
          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,01333D0B,?,?,01333CD3,?,?,?), ref: 01333D2B
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01333D3E
          • FreeLibrary.KERNEL32(00000000,?,?,01333D0B,?,?,01333CD3,?,?,?), ref: 01333D61
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: 87302ef7f3b20dbf94efd7b32bc6b8b3f20365e1635deaa9ea0c50403112069d
          • Instruction ID: 69749b7acf9d291085188502c8496f9b8e48da5b6cbb7b9f0f8f33fd3281ff8a
          • Opcode Fuzzy Hash: 87302ef7f3b20dbf94efd7b32bc6b8b3f20365e1635deaa9ea0c50403112069d
          • Instruction Fuzzy Hash: 06F08238640218FBEB219B55E80DB9E7FA9FF4075AF104154F604B2250CB709A04DB94
          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,01224354,?,?,0122431C,?,00000001,?), ref: 012243B7
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 012243CA
          • FreeLibrary.KERNEL32(00000000,?,?,01224354,?,?,0122431C,?,00000001,?), ref: 012243ED
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: 711a73f43e4e10523e911cfbb88b4df0ff9cd213febf61f5f3d054ee7027d489
          • Instruction ID: ec29639d76b478cae5d048f481bcc6b5ae82d36cad1a4b11fc5186e6f3c76aad
          • Opcode Fuzzy Hash: 711a73f43e4e10523e911cfbb88b4df0ff9cd213febf61f5f3d054ee7027d489
          • Instruction Fuzzy Hash: 64F0123161122DFBDB31AF95E90DB9D7E69EF04756F200064F605A1164CB788B01DB90
          APIs
          • EnterCriticalSection.KERNEL32(?,00000000,76EBFFB0), ref: 0132C765
          • LeaveCriticalSection.KERNEL32(?), ref: 0132C7ED
          • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0132C7FA
          • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF,00000000,76EBFFB0), ref: 0132C81D
          • CloseHandle.KERNEL32(?), ref: 0132C958
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$CloseEnterHandleLeaveMultipleObjectsReleaseSemaphoreWait
          • String ID:
          • API String ID: 3612733447-0
          • Opcode ID: 5562cb64c155ddc59bb9663b2d3dc8d3a1d0ce6dd15ddaeeda7b40f4bf68318b
          • Instruction ID: b4a521bbabab758300a3ed7d082e85075aea90e95aba0ec42b926561afb325f8
          • Opcode Fuzzy Hash: 5562cb64c155ddc59bb9663b2d3dc8d3a1d0ce6dd15ddaeeda7b40f4bf68318b
          • Instruction Fuzzy Hash: E7813939700B168FD724DF29C580A2AB7F6FF88314B15966CD9468BB51EB70F841CB40
          APIs
            • Part of subcall function 0132DEDC: __CxxThrowException@8.LIBVCRUNTIME ref: 0132E441
            • Part of subcall function 0132DEDC: __CxxThrowException@8.LIBVCRUNTIME ref: 0132E45E
            • Part of subcall function 01328870: StrStrA.SHLWAPI(00000000,0134832C,00000000,?,00000000,?,01328A67,?,00000000,00000000,?,00000000,00000000,759223A0,00000000,?), ref: 01328898
          • WinHttpConnect.WINHTTP(?,00000000,000001BB,00000000,?,00000000,00000000,?,00000000,00000000,759223A0), ref: 01328A8C
          • WinHttpConnect.WINHTTP(?,00000000,00000050,00000000,?,00000000,00000000,?,00000000,00000000,759223A0), ref: 01328AB9
          • WinHttpOpenRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000100), ref: 01328ADF
          • WinHttpCloseHandle.WINHTTP(?,?,?,?,?,00000000,00000000,?,00000000,00000000,759223A0,00000000,?,?,?,00000000), ref: 01328C26
          • WinHttpCloseHandle.WINHTTP(00000000,?,?,?,?,00000000,00000000,?,00000000,00000000,759223A0,00000000,?,?,?,00000000), ref: 01328C30
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Http$CloseConnectException@8HandleThrow$OpenRequest
          • String ID:
          • API String ID: 2135166240-0
          • Opcode ID: 0ac4a04f5aa33bc51c43ced22fa03e9e470ecc267e4a1d45e66dcfcddc6f3049
          • Instruction ID: c4a37b8b1685a1ee118c966decf9de271831ac59f80281e91e9a3a285e728100
          • Opcode Fuzzy Hash: 0ac4a04f5aa33bc51c43ced22fa03e9e470ecc267e4a1d45e66dcfcddc6f3049
          • Instruction Fuzzy Hash: 3B71F370A10225AFEF18EF68DC89B6E7BE5EF44308F140199E501DB290DB74EA14CBA5
          APIs
          • __alloca_probe_16.LIBCMT ref: 0133DF28
          • __alloca_probe_16.LIBCMT ref: 0133DFEE
          • __freea.LIBCMT ref: 0133E05A
            • Part of subcall function 01335D0E: RtlAllocateHeap.NTDLL(00000000,013339DF,?,?,01333B05,?,?,01333AD8,?,00000000,?,?,?,?,013339DF,?), ref: 01335D40
          • __freea.LIBCMT ref: 0133E063
          • __freea.LIBCMT ref: 0133E086
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: __freea$__alloca_probe_16$AllocateHeap
          • String ID:
          • API String ID: 1423051803-0
          • Opcode ID: 3d18fbc41c818fd4b4b1eb191936589ddeedb0b90f54ad064e7ac064560d984a
          • Instruction ID: 5ee33f3ce1df8c83301baf2e38556f089f02052470a7f119305393b0a32fa36f
          • Opcode Fuzzy Hash: 3d18fbc41c818fd4b4b1eb191936589ddeedb0b90f54ad064e7ac064560d984a
          • Instruction Fuzzy Hash: 5251D57260020AAFEB319FADCC41FBB7AA9DFD4758F550129FE189B140DB34DC5186A8
          APIs
          • getaddrinfo.WS2_32 ref: 01324A4B
          • socket.WS2_32(00000002,00000001,00000006), ref: 01324A91
          • connect.WS2_32(00000000,?,00000010), ref: 01324AA2
          • closesocket.WS2_32(00000000), ref: 01324AAD
          • freeaddrinfo.WS2_32(?,?,?,?,?,?,00000000,?), ref: 01324ACC
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: closesocketconnectfreeaddrinfogetaddrinfosocket
          • String ID:
          • API String ID: 1398928706-0
          • Opcode ID: d4fd7b31fa2b349862451dbcebc03854806f9f0ad6292478c32a7cd193fdde07
          • Instruction ID: 24b3b97e128d095bf275d7b9a62a2a9bfbd0f60bd14ecb62c86f3eb5760b21cf
          • Opcode Fuzzy Hash: d4fd7b31fa2b349862451dbcebc03854806f9f0ad6292478c32a7cd193fdde07
          • Instruction Fuzzy Hash: B941DE71604711ABE720DF2CD884B1ABBE8FF89318F044A1CF9559B291E770E984CB95
          APIs
          • _free.LIBCMT ref: 013351A5
          • _free.LIBCMT ref: 013351C5
          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01335226
          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01335238
          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01335245
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: __crt_fast_encode_pointer$_free
          • String ID:
          • API String ID: 366466260-0
          • Opcode ID: 6a305aeed15514b657a669884c2994e37ce13c65123381dd19b468b5af9576f3
          • Instruction ID: d468369e029d9640bbe1850050fa3ce9d30c93295387128677cc658219883b00
          • Opcode Fuzzy Hash: 6a305aeed15514b657a669884c2994e37ce13c65123381dd19b468b5af9576f3
          • Instruction Fuzzy Hash: D2418F36A00214ABDB14DFACC880A5EB7F6EFC9718F2545A9E615EB341DB71ED01CB84
          APIs
          • getaddrinfo.WS2_32 ref: 01324A4B
          • socket.WS2_32(00000002,00000001,00000006), ref: 01324A91
          • connect.WS2_32(00000000,?,00000010), ref: 01324AA2
          • closesocket.WS2_32(00000000), ref: 01324AAD
          • freeaddrinfo.WS2_32(?,?,?,?,?,?,00000000,?), ref: 01324ACC
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: closesocketconnectfreeaddrinfogetaddrinfosocket
          • String ID:
          • API String ID: 1398928706-0
          • Opcode ID: feed61895aa170cb9edc7b65ba66a19dd89d008b690dff4aa8a45627ba6f6228
          • Instruction ID: b2092c6bb99a8c54427f3dce572537940597729597955df47a57983c650af3c3
          • Opcode Fuzzy Hash: feed61895aa170cb9edc7b65ba66a19dd89d008b690dff4aa8a45627ba6f6228
          • Instruction Fuzzy Hash: 1B3100716083109FE320DF28D884B5BBBE8FF99714F000A0DF9859B291D770E945CB96
          APIs
          • _free.LIBCMT ref: 0133A7ED
            • Part of subcall function 01335CD4: HeapFree.KERNEL32(00000000,00000000,?,01335318), ref: 01335CEA
            • Part of subcall function 01335CD4: GetLastError.KERNEL32(?,?,01335318), ref: 01335CFC
          • _free.LIBCMT ref: 0133A7FF
          • _free.LIBCMT ref: 0133A811
          • _free.LIBCMT ref: 0133A823
          • _free.LIBCMT ref: 0133A835
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 1aa147fbbf0e2bffe7fb6cded79e8cb429f31c6d37cc316fdbcbfb4c66159509
          • Instruction ID: 9a1200189ee981dcc5899924072ae961dd61b7083bbd061edd7fa60c5b93c7c6
          • Opcode Fuzzy Hash: 1aa147fbbf0e2bffe7fb6cded79e8cb429f31c6d37cc316fdbcbfb4c66159509
          • Instruction Fuzzy Hash: C3F01876509201A7D520DA5CE5C5C55BFEDBB847187690905F249DB944CB70F881C758
          APIs
          • _free.LIBCMT ref: 01229EFD
            • Part of subcall function 012257D7: HeapFree.KERNEL32(00000000,00000000,?,01224A34), ref: 012257ED
            • Part of subcall function 012257D7: GetLastError.KERNEL32(?,?,01224A34), ref: 012257FF
          • _free.LIBCMT ref: 01229F0F
          • _free.LIBCMT ref: 01229F21
          • _free.LIBCMT ref: 01229F33
          • _free.LIBCMT ref: 01229F45
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: c9b46c344e3281aed4967c5b731080d169bcaf6ad7efc8062a6f7ce09b22c30b
          • Instruction ID: 2ec5efe928bbfd306409ec8fcedab3323c356c39a72fcc9a0810e34ab9b0ac11
          • Opcode Fuzzy Hash: c9b46c344e3281aed4967c5b731080d169bcaf6ad7efc8062a6f7ce09b22c30b
          • Instruction Fuzzy Hash: D5F06272429272BBDA74DA58F4C5D6E77D9BA10714F644809F314D7A44C734F8C08F94
          APIs
          • GetVersionExA.KERNEL32(?), ref: 0041C146
          • TlsAlloc.KERNEL32(?), ref: 0041C157
          • VirtualQuery.KERNEL32(?,?,0000001C,?), ref: 0041C16D
          • TlsSetValue.KERNEL32(00000002,?,?,?,0000001C,?), ref: 0041C17E
          • TlsAlloc.KERNEL32(00000002,?,?,?,0000001C,?), ref: 0041C183
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Alloc$QueryValueVersionVirtual
          • String ID:
          • API String ID: 4111955057-0
          • Opcode ID: 06af007b4eec81452ad544054d6988d1de5616cc37aef503ea9709310145ea34
          • Instruction ID: 6bbdd2b4b5edf6af37150abd3708f4bab93e34a9a32bf9389af1dab8ffb81e0b
          • Opcode Fuzzy Hash: 06af007b4eec81452ad544054d6988d1de5616cc37aef503ea9709310145ea34
          • Instruction Fuzzy Hash: CBF05EB55843019AC310EFA1DCC2ACB72ECAB49305F408A2EB56846241D7BDD5898FAA
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free
          • String ID: *?
          • API String ID: 269201875-2564092906
          • Opcode ID: 41310788077ad84f73b088b4c690feec08b2184f50f61266a694a4dc006c81b4
          • Instruction ID: f96c1f06e233643eedd7339b4cc4229ed737eed7ef355dc43a7b18b76382e175
          • Opcode Fuzzy Hash: 41310788077ad84f73b088b4c690feec08b2184f50f61266a694a4dc006c81b4
          • Instruction Fuzzy Hash: 41611B75E0061ADFDF15CFACC8806EDFBF9EF88318B144169E815E7300D6759A418B94
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free
          • String ID: *?
          • API String ID: 269201875-2564092906
          • Opcode ID: a6e5352a3b992cf3fca66862d0789d22ecaefdc5fee1cee6ce48d87a6a1b3f30
          • Instruction ID: 38ea9e1a859e755bf4d44d75277d4877a2be4b25c63d8d31f75bb3cf573b9ec0
          • Opcode Fuzzy Hash: a6e5352a3b992cf3fca66862d0789d22ecaefdc5fee1cee6ce48d87a6a1b3f30
          • Instruction Fuzzy Hash: 5A615F75D1022AAFDB15CFA8C8819EDFBF5EF48310B24816AE915E7340E775AE418F90
          APIs
            • Part of subcall function 01328C50: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,01328E0A,00000000,00000000,?,7B2C007C,?,00000000,00000000), ref: 01328C62
          • WinHttpOpen.WINHTTP(-00000038,00000003,00000000,00000000,00000000,?,00000000,?,?,00000001,00000000,01348334,00000001,00000000,00000000), ref: 01328EEB
          • WinHttpCloseHandle.WINHTTP(00000000,00000000,00000000,?,7B2C007C,?,00000000,00000000), ref: 01328F64
          Strings
          • InsertDeal error ctrl_session : %d, xrefs: 01329AB9
          • ctrl_session is already alive!, xrefs: 01329B78
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Http$CloseHandleOpenlstrlen
          • String ID: InsertDeal error ctrl_session : %d$ctrl_session is already alive!
          • API String ID: 1037772175-4264306204
          • Opcode ID: f311ee870a5ed0a08da9bff246a0c92eb8cb7c99ad53bafa3142374391666bf9
          • Instruction ID: f2b1344bf26b894ef37e276653570a5dd82102bc41ec3af665e36cae08742747
          • Opcode Fuzzy Hash: f311ee870a5ed0a08da9bff246a0c92eb8cb7c99ad53bafa3142374391666bf9
          • Instruction Fuzzy Hash: F461E371A10314AFDB24EFA8DC44BAEB7F9FF44708F140A6DE5469B250DB70A509CB94
          APIs
            • Part of subcall function 01323F10: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,7B2C007C,?,?), ref: 01324005
          • WideCharToMultiByte.KERNEL32(00000000,00000000,-00000005,000000FF,00000000,00000000,00000000,00000000,00000008,00000006), ref: 013242F4
          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 01324312
          • lstrcatA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0132374D), ref: 0132431A
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ByteCharMultiWide$CriticalEnterSectionlstrcat
          • String ID: "%s" %s %s %d %d
          • API String ID: 596324024-3196185087
          • Opcode ID: d256c96e702131955ee5dc625a4b7cbd607c67a7453393834175f57c41b2fc26
          • Instruction ID: 489116f2d0358a3bb12ad211489cfca432e9fc98cd0c9a7e98d9a1f21691bb43
          • Opcode Fuzzy Hash: d256c96e702131955ee5dc625a4b7cbd607c67a7453393834175f57c41b2fc26
          • Instruction Fuzzy Hash: 3841E271A00314ABEB10EFA8DC82FAEBBB5EF48718F244168E6447B2D1DB717950CB54
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: @3O$C:\Windows\Logs\logs\brcc.exe
          • API String ID: 0-3154386147
          • Opcode ID: 81886e6fe0d4f553047e06526af0bf2a91a2269068e0921633464cbfacaa2499
          • Instruction ID: ad15ef870dd830518dd632278110a2b4216d5caa22fe4683955dd63b4928b69c
          • Opcode Fuzzy Hash: 81886e6fe0d4f553047e06526af0bf2a91a2269068e0921633464cbfacaa2499
          • Instruction Fuzzy Hash: 71418275E04219ABDB22DF9DDC80EAEBBFCEFD5718F100166E504D7210DAB09A40DB68
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID:
          • String ID: @3O$C:\Windows\Logs\logs\brcc.exe
          • API String ID: 0-3154386147
          • Opcode ID: 830a9fe7ad7286949d7bba66ae064b417ac6743cccbbfb7f666eb9511bc38ddc
          • Instruction ID: e0bdc260b3c537141a66f9fc1696666371517d2c2b6c7094df88eb682b125a2c
          • Opcode Fuzzy Hash: 830a9fe7ad7286949d7bba66ae064b417ac6743cccbbfb7f666eb9511bc38ddc
          • Instruction Fuzzy Hash: 7741B671A20266BFDB26EF9DEC809BEBBFCEB95310F504066E50097240D7B19A10CB50
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free
          • String ID: H/Q$H/Q
          • API String ID: 269201875-1185417446
          • Opcode ID: 098c20cf4a9cc529acbcc39069a154e860351e2190015f03fc3ac808fcd8915e
          • Instruction ID: b4b9f75ab0fb66198435d4b732f6bf01f478cae79d699b1df35f3f6a832ed1a1
          • Opcode Fuzzy Hash: 098c20cf4a9cc529acbcc39069a154e860351e2190015f03fc3ac808fcd8915e
          • Instruction Fuzzy Hash: A1E09B2650751262EF31777D7C447AA6AD96BD233DF120316E520CA4D0EFB84842876D
          APIs
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _strrchr
          • String ID:
          • API String ID: 3213747228-0
          • Opcode ID: 89d3867b82b0976fe1c776ff820cdd3daf15d77787b346fed046d1ffa351ffb1
          • Instruction ID: e4084fd7ccbd2ab656f93f11da106cc700211092b8d61bc2bccf7400c46d2b12
          • Opcode Fuzzy Hash: 89d3867b82b0976fe1c776ff820cdd3daf15d77787b346fed046d1ffa351ffb1
          • Instruction Fuzzy Hash: 3EB149B2900246AFEB128F2CC8827FEBFF5EFD5358F144169D545AB241E6349B41CB68
          APIs
          • GetFileAttributesA.KERNEL32(?,0041C5DF,0041C5DF,?), ref: 00410778
          • CreateFileA.KERNEL32(?,80000000,?,0000000C,00000005,00000000,00000000,?,0041C5DF,0041C5DF,?), ref: 00410830
          • GetLastError.KERNEL32(?,80000000,?,0000000C,00000005,00000000,00000000,?,0041C5DF,0041C5DF,?), ref: 0041083C
          • CloseHandle.KERNEL32(00000000,0041C5DF,?), ref: 004108A9
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: File$AttributesCloseCreateErrorHandleLast
          • String ID:
          • API String ID: 2927643983-0
          • Opcode ID: ba856a4ba6674f7f666218bb8a514c498d2c70971a12776e079357004a2ab543
          • Instruction ID: 5b3f846bcc3e3e30ac9713d5588641192f2f67c46af0342cde409f785cf179b9
          • Opcode Fuzzy Hash: ba856a4ba6674f7f666218bb8a514c498d2c70971a12776e079357004a2ab543
          • Instruction Fuzzy Hash: D251E9316042089AE724EE68C9457EE3794EB45324F24812BE9398A3D1C7FCAEC1CF4D
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b4864721a5a36102f9656ef6adb4d487c187f0451b2f6f95ee90f5b6b6c91afb
          • Instruction ID: 057414cafeacebd5dd18e033e89752da518073493b29a9c485ec140fde96b898
          • Opcode Fuzzy Hash: b4864721a5a36102f9656ef6adb4d487c187f0451b2f6f95ee90f5b6b6c91afb
          • Instruction Fuzzy Hash: 2C517430B00249EFDB20DE98D8D4BEA7375EB41318F21C66AE9614B2D0D778D9C5CB99
          APIs
            • Part of subcall function 0132A4F0: EnterCriticalSection.KERNEL32(005197A8,?,?,00000000), ref: 0132A510
            • Part of subcall function 0132A4F0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000), ref: 0132A583
          • SetEvent.KERNEL32(?), ref: 01329D8E
          • WriteFile.KERNEL32(?,00010000,00010000,?,00000000), ref: 01329DCB
          • SetEvent.KERNEL32(?), ref: 01329DEF
          • SetEvent.KERNEL32(?), ref: 01329E25
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Event$CriticalSection$EnterFileLeaveWrite
          • String ID:
          • API String ID: 3153116817-0
          • Opcode ID: ed510b0654a540a7e4a05d32273dc46855f6ee1e9c3bb4ad277ec86e2a8d8344
          • Instruction ID: 5b0de11ba8fd945ef4d42940bf8a0eb268cabe1d7fa31a6424f3d53f86cf7080
          • Opcode Fuzzy Hash: ed510b0654a540a7e4a05d32273dc46855f6ee1e9c3bb4ad277ec86e2a8d8344
          • Instruction Fuzzy Hash: 04517F71E006399BDB649F28DC44BEAF7B4FF48708F0441A9E90DA7210DB30AA90CF90
          APIs
            • Part of subcall function 01333A63: _free.LIBCMT ref: 01333A71
            • Part of subcall function 013378AE: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,0133E050,?,00000000,00000000), ref: 0133795A
          • GetLastError.KERNEL32 ref: 01339095
          • __dosmaperr.LIBCMT ref: 0133909C
          • GetLastError.KERNEL32 ref: 013390DB
          • __dosmaperr.LIBCMT ref: 013390E2
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
          • String ID:
          • API String ID: 167067550-0
          • Opcode ID: b9b66510cd4cfb388a6f207f440305b700e6777963762741d593904e11c99e7b
          • Instruction ID: f569c526d651e59e84948a563b8249180c7b6a332a9e1f29f1fee648b66f1897
          • Opcode Fuzzy Hash: b9b66510cd4cfb388a6f207f440305b700e6777963762741d593904e11c99e7b
          • Instruction Fuzzy Hash: 5921B371600616EFDB216F6D8CC0A6BF7ADFF803AC7108618F82697150DB71ED4187A8
          APIs
            • Part of subcall function 01225EFD: _free.LIBCMT ref: 01225F0B
            • Part of subcall function 01226AD1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,01227887,01229A27,0000FDE9,00000000,?,?,?,012297A0,0000FDE9,00000000,?), ref: 01226B7D
          • GetLastError.KERNEL32 ref: 01225943
          • __dosmaperr.LIBCMT ref: 0122594A
          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 01225989
          • __dosmaperr.LIBCMT ref: 01225990
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
          • String ID:
          • API String ID: 167067550-0
          • Opcode ID: 72f7f95e1c4ce1deb4732fdcbc41a4a5bebca2fce00441c50fd54e177c084c4e
          • Instruction ID: 174287ac5c68fc70167b75b74f5dd685c2e1b64f3a50e3e66c72675f5f99b01f
          • Opcode Fuzzy Hash: 72f7f95e1c4ce1deb4732fdcbc41a4a5bebca2fce00441c50fd54e177c084c4e
          • Instruction Fuzzy Hash: 24216071720226BFDB215F69CC80DBEB7ACEF062B4714C518F92997250EB74EC508BA1
          APIs
          • WaitForSingleObject.KERNEL32(?), ref: 0132D024
          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0132D057
          • CloseHandle.KERNEL32(?), ref: 0132D092
          • CloseHandle.KERNEL32(?), ref: 0132D0AE
            • Part of subcall function 0132D0D0: GetTickCount.KERNEL32 ref: 0132D11C
            • Part of subcall function 0132D0D0: PeekNamedPipe.KERNEL32(?,?,00010000,?,?,?,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D167
            • Part of subcall function 0132D0D0: Sleep.KERNEL32(00000001,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D173
            • Part of subcall function 0132D0D0: SetEvent.KERNEL32(?,?,?,?,01323CEB,00000000,?,?,00010000), ref: 0132D192
            • Part of subcall function 0132D0D0: ReadFile.KERNEL32(?,00010000,00010000,?,00000000,01323CEB,00000000,?,?,00010000), ref: 0132D1DB
            • Part of subcall function 0132D0D0: SetEvent.KERNEL32(?,?,00010000), ref: 0132D1FF
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CloseEventHandleObjectSingleWait$CountFileNamedPeekPipeReadSleepTick
          • String ID:
          • API String ID: 908325608-0
          • Opcode ID: 218b43219776cf80e7dcaefb9c4956581374a8f16a9ac9db3f92062fe43ce1a7
          • Instruction ID: 3fe598879e108916f688e192ea9a528cffc00f8548aadc1d49ffa0416989762f
          • Opcode Fuzzy Hash: 218b43219776cf80e7dcaefb9c4956581374a8f16a9ac9db3f92062fe43ce1a7
          • Instruction Fuzzy Hash: 76210B712007116BE730BBB8CC44F6B77E8AF51798F14850CF669971E1D7B4E84687A1
          APIs
          • GetLastError.KERNEL32(?,?,?,013336F7,01349A28,0000000C), ref: 013359FB
          • _free.LIBCMT ref: 01335A58
          • _free.LIBCMT ref: 01335A8E
          • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,013336F7,01349A28,0000000C), ref: 01335A99
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID:
          • API String ID: 2283115069-0
          • Opcode ID: 7511718bacc9dfd4ae876d48e024805dd6efa933b327f848232c54722ed9ce62
          • Instruction ID: 854be8ef977e022f769334bfc342bb51739783b50cb0aa4fb08e0a47df8ca4a4
          • Opcode Fuzzy Hash: 7511718bacc9dfd4ae876d48e024805dd6efa933b327f848232c54722ed9ce62
          • Instruction Fuzzy Hash: 6011EC7531434BABF622657D6CC4E2B369D9BD167EF240224F320961D4FF60D8026358
          APIs
          • GetLastError.KERNEL32(?,?,?,012294E7,?,00000001,012278F8,?,012299A1,00000001,?,?,?,01227887,?,00000000), ref: 012251E0
          • _free.LIBCMT ref: 0122523D
          • _free.LIBCMT ref: 01225273
          • SetLastError.KERNEL32(00000000,00000005,000000FF,?,012299A1,00000001,?,?,?,01227887,?,00000000,00000000,01232068,0000002C,012278F8), ref: 0122527E
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID:
          • API String ID: 2283115069-0
          • Opcode ID: 93b00154dd29ef3286a04bfb158993943074ebd743ac498b58e6773cf81918c6
          • Instruction ID: 6ed7d4cb6e16707b4b29e019504305c1494137ea8ff748478dad013a42e524fa
          • Opcode Fuzzy Hash: 93b00154dd29ef3286a04bfb158993943074ebd743ac498b58e6773cf81918c6
          • Instruction Fuzzy Hash: 7E11E9333342337BEA2176B86C89EBE7659EBD25747248324FB31831D4EE658D414610
          APIs
          • GetLastError.KERNEL32(?,?,?,01335CC6,01335CFA,?,?,01335318), ref: 01335B52
          • _free.LIBCMT ref: 01335BAF
          • _free.LIBCMT ref: 01335BE5
          • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,01335CC6,01335CFA,?,?,01335318), ref: 01335BF0
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID:
          • API String ID: 2283115069-0
          • Opcode ID: 727e50de1e19432e66de7a353c9c8391ed3d1b073a41acbab83dfff69769e9ca
          • Instruction ID: 1e9c08a26497005ef26af11cddc843d6702c873125f882f896da90692f588849
          • Opcode Fuzzy Hash: 727e50de1e19432e66de7a353c9c8391ed3d1b073a41acbab83dfff69769e9ca
          • Instruction Fuzzy Hash: 49112F75304106AFE729257DAC80E2B355DABD037EF240324F720D61D4FF60D8008758
          APIs
          • GetLastError.KERNEL32(?,?,00000001,0122576C,012257FD,?,?,01224A34), ref: 01225337
          • _free.LIBCMT ref: 01225394
          • _free.LIBCMT ref: 012253CA
          • SetLastError.KERNEL32(00000000,00000005,000000FF,?,00000001,0122576C,012257FD,?,?,01224A34), ref: 012253D5
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ErrorLast_free
          • String ID:
          • API String ID: 2283115069-0
          • Opcode ID: c5b68ebf7c34e62099409075148896fca789dc237f5efb9c22f999f8746c4d9f
          • Instruction ID: 64cc96173639e8ee232808007d6df161efc3b91ca22b38e79e2ff1299e7ea59c
          • Opcode Fuzzy Hash: c5b68ebf7c34e62099409075148896fca789dc237f5efb9c22f999f8746c4d9f
          • Instruction Fuzzy Hash: BF1104333242267BDA2177786C89EBE665AABC0674F249224FB25831D4DFF589018620
          APIs
          • CreateThread.KERNEL32(00000000,?,01333652,00000000,00000004,00000000), ref: 0133387D
          • GetLastError.KERNEL32 ref: 01333889
          • __dosmaperr.LIBCMT ref: 01333890
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CreateErrorLastThread__dosmaperr
          • String ID:
          • API String ID: 2744730728-0
          • Opcode ID: bb848506ca2723a63c24a605b83d7c74cbb0746c2383420fe191ca58359f3ffb
          • Instruction ID: d48937f6f911d48c9af18d64e9f8729873cbcb8e499656b66f2da5586b7ce26a
          • Opcode Fuzzy Hash: bb848506ca2723a63c24a605b83d7c74cbb0746c2383420fe191ca58359f3ffb
          • Instruction Fuzzy Hash: A901F976500204BBDB119BA9DC08B9E7F69FFC077EF208218F5249A1D0DB708505D768
          APIs
          • ___BuildCatchObject.LIBVCRUNTIME ref: 0132F986
            • Part of subcall function 0132F8D3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0132F902
            • Part of subcall function 0132F8D3: ___AdjustPointer.LIBCMT ref: 0132F91D
          • _UnwindNestedFrames.LIBCMT ref: 0132F99B
          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 0132F9AC
          • CallCatchBlock.LIBVCRUNTIME ref: 0132F9D4
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
          • String ID:
          • API String ID: 737400349-0
          • Opcode ID: d1ff13375782963b9c6c1124d02b77f3f50474ec2c23615fea1de197643b66f0
          • Instruction ID: c16d936361c73f1144788638896dd69a5fce59c731fe6094518347ddeb1ce37e
          • Opcode Fuzzy Hash: d1ff13375782963b9c6c1124d02b77f3f50474ec2c23615fea1de197643b66f0
          • Instruction Fuzzy Hash: 83012932100159BBDF126E99CC41EEB7F7EEF99658F044514FE18A6120C732E861DBA1
          APIs
          • GetVersionExA.KERNEL32(00000094), ref: 0041C3CD
          • TlsSetValue.KERNEL32(00000003,?,00000094), ref: 0041C3E7
          • VirtualQuery.KERNEL32(?,?,0000001C,00000003,?,00000094), ref: 0041C3F6
          • TlsSetValue.KERNEL32(00000002,?,?,?,0000001C,00000003,?,00000094), ref: 0041C405
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Value$QueryVersionVirtual
          • String ID:
          • API String ID: 1147312274-0
          • Opcode ID: 05b99272e1f7fa28c4f7c056833ca456ac0a007e085184139376298a1694e65e
          • Instruction ID: f53e77bdb3d30e614163ca60a242a541072e5fffff5c71255776e4b12b71440a
          • Opcode Fuzzy Hash: 05b99272e1f7fa28c4f7c056833ca456ac0a007e085184139376298a1694e65e
          • Instruction Fuzzy Hash: B101A1B2940218AACB14EFA4CCC1DCA77BCAF0C310F50869AF508A7141CA79D984CBA4
          APIs
          • GetVersionExA.KERNEL32(00000094), ref: 0041C3CD
          • TlsSetValue.KERNEL32(00000003,?,00000094), ref: 0041C3E7
          • VirtualQuery.KERNEL32(?,?,0000001C,00000003,?,00000094), ref: 0041C3F6
          • TlsSetValue.KERNEL32(00000002,?,?,?,0000001C,00000003,?,00000094), ref: 0041C405
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Value$QueryVersionVirtual
          • String ID:
          • API String ID: 1147312274-0
          • Opcode ID: 37dc084dc31a775af5f02958d199a4feab22e60c1e1b8fbc08b1da4ba42f0a99
          • Instruction ID: f44fca277b9ab546f8f5088c1b41583c9e82d91f162c3e9efeb8084cd4e279a7
          • Opcode Fuzzy Hash: 37dc084dc31a775af5f02958d199a4feab22e60c1e1b8fbc08b1da4ba42f0a99
          • Instruction Fuzzy Hash: 060184B2940218ABCB54EFA5DCC1DDA73BCAF0C314F50859AF508A7141DA79E984CBA5
          APIs
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,00000000,?,0133D8BC,00000000,00000001,00000000,00000000,?,0133846E,?,00000000,00000000), ref: 0133EF6D
          • GetLastError.KERNEL32(?,0133D8BC,00000000,00000001,00000000,00000000,?,0133846E,?,00000000,00000000,?,00000000,?,013389BA,00000000), ref: 0133EF79
            • Part of subcall function 0133EF3F: CloseHandle.KERNEL32(FFFFFFFE,0133EF89,?,0133D8BC,00000000,00000001,00000000,00000000,?,0133846E,?,00000000,00000000,?,00000000), ref: 0133EF4F
          • ___initconout.LIBCMT ref: 0133EF89
            • Part of subcall function 0133EF01: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0133EF30,0133D8A9,00000000,?,0133846E,?,00000000,00000000,?), ref: 0133EF14
          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,?,0133D8BC,00000000,00000001,00000000,00000000,?,0133846E,?,00000000,00000000,?), ref: 0133EF9E
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
          • String ID:
          • API String ID: 2744216297-0
          • Opcode ID: 55fcd746f7d7170e05ee6a7bfdeca0207eecff826d7fa124f720dcf2ff34019e
          • Instruction ID: 0decef523556855cbeb67271863e20efe6f880d556b03c0941fab24e86a4ce33
          • Opcode Fuzzy Hash: 55fcd746f7d7170e05ee6a7bfdeca0207eecff826d7fa124f720dcf2ff34019e
          • Instruction Fuzzy Hash: CCF01C3A010159BBCF322FA5EC0899A7F6AFF487B1F024020FA1995124CA729820DB94
          APIs
          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,0122A190,?,00000001,?,00000001,?,01229476,?,?,00000001), ref: 0122A74D
          • GetLastError.KERNEL32(?,0122A190,?,00000001,?,00000001,?,01229476,?,?,00000001,?,00000001,?,012299C2,01227887), ref: 0122A759
            • Part of subcall function 0122A71F: CloseHandle.KERNEL32(FFFFFFFE,0122A769,?,0122A190,?,00000001,?,00000001,?,01229476,?,?,00000001,?,00000001), ref: 0122A72F
          • ___initconout.LIBCMT ref: 0122A769
            • Part of subcall function 0122A6E1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0122A710,0122A17D,00000001,?,01229476,?,?,00000001,?), ref: 0122A6F4
          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,0122A190,?,00000001,?,00000001,?,01229476,?,?,00000001,?), ref: 0122A77E
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
          • String ID:
          • API String ID: 2744216297-0
          • Opcode ID: 81167de571e0afefedbd7e13af25da3d9414e74faf57ea1ede39bb8959878d5c
          • Instruction ID: 8152c97cc750c5d807a60738d59abcb7d8514e2e0d0c50d00f9e75ab936e80e9
          • Opcode Fuzzy Hash: 81167de571e0afefedbd7e13af25da3d9414e74faf57ea1ede39bb8959878d5c
          • Instruction Fuzzy Hash: 73F01236510129BBCF322FD5EC0CEAE3F65FB087B0B104010FA1986924C6318920EB94
          APIs
          • _free.LIBCMT ref: 0133545F
            • Part of subcall function 01335CD4: HeapFree.KERNEL32(00000000,00000000,?,01335318), ref: 01335CEA
            • Part of subcall function 01335CD4: GetLastError.KERNEL32(?,?,01335318), ref: 01335CFC
          • _free.LIBCMT ref: 01335472
          • _free.LIBCMT ref: 01335483
          • _free.LIBCMT ref: 01335494
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 9d0b2ad16a8f443079dbac6a5a0671e3d4975246b0600b95ceec22aaa7fd7bbf
          • Instruction ID: 8f94f50012a0caf8c6315dc2268bd4d56a0398c411e82550d090350e707bc814
          • Opcode Fuzzy Hash: 9d0b2ad16a8f443079dbac6a5a0671e3d4975246b0600b95ceec22aaa7fd7bbf
          • Instruction Fuzzy Hash: 89E0867E406161ABEB312F28B8914897E7DF79571CB112106F50047218DF7A28529F94
          APIs
          • _free.LIBCMT ref: 01224B35
            • Part of subcall function 012257D7: HeapFree.KERNEL32(00000000,00000000,?,01224A34), ref: 012257ED
            • Part of subcall function 012257D7: GetLastError.KERNEL32(?,?,01224A34), ref: 012257FF
          • _free.LIBCMT ref: 01224B48
          • _free.LIBCMT ref: 01224B59
          • _free.LIBCMT ref: 01224B6A
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 79c04c67c7e3887176655fd781a79f31311d967b5135d07c3888cae18c217034
          • Instruction ID: 298a6c2a870448bfa63d379d100c2ca06c7c9db401a0806edd4456a41f2ee735
          • Opcode Fuzzy Hash: 79c04c67c7e3887176655fd781a79f31311d967b5135d07c3888cae18c217034
          • Instruction Fuzzy Hash: 8FE0B671862132FAC66A6F15B9685A93B69EB64610B518006F50013A5CDB320752EF91
          APIs
            • Part of subcall function 0040E13D: RaiseException.KERNEL32(0EEDFAE6,00000000,?,?,00000000,?,0040E43F,00000001,0000000B,?,00000000,00000000,?,00000000,?,?), ref: 0040E152
          • RaiseException.KERNEL32(0EEFFACE,00000001,00000003,?), ref: 0040E4D9
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: ExceptionRaise
          • String ID: XX.CPP$cctrAddr
          • API String ID: 3997070919-3056909104
          • Opcode ID: f502531a7f4b68a852c8015dd49ecd5b3480a123fa58a4e8fc4d5afd5a7c92f6
          • Instruction ID: 59198e6ce4ee755e88744a3d3d06fce599bb44c9ede2b901157bac37f3e679a4
          • Opcode Fuzzy Hash: f502531a7f4b68a852c8015dd49ecd5b3480a123fa58a4e8fc4d5afd5a7c92f6
          • Instruction Fuzzy Hash: D3712974A01218EFCB14DF55D981E9EBBB2FF48314F14816AF808AB391D735E891CB94
          APIs
          • SetEvent.KERNEL32(?,7B2C007C), ref: 01325433
          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 013254D0
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Event$Create
          • String ID: CreateEvent Error
          • API String ID: 1287507382-4283065084
          • Opcode ID: fe554454e57894d5ab5878fb91aa1826713971d9299962d689520f15be862a0c
          • Instruction ID: a93ed69e7f0790d9111a0bc44b31acd8fd7527fb2fe437a90242ca6af0e69710
          • Opcode Fuzzy Hash: fe554454e57894d5ab5878fb91aa1826713971d9299962d689520f15be862a0c
          • Instruction Fuzzy Hash: 82517B71601615EFDB10DF58C984BADFBF2FF48325F248619E526AB790E735AA00CB80
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 01322404
            • Part of subcall function 0132ECE2: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0132ECEE
            • Part of subcall function 0132ECE2: __CxxThrowException@8.LIBVCRUNTIME ref: 0132ECFC
          • __CxxThrowException@8.LIBVCRUNTIME ref: 01322415
            • Part of subcall function 0132F437: RaiseException.KERNEL32(?,?,?,0132E463,?,?,?,?,?,?,?,?,0132E463,?,013497BC), ref: 0132F497
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionRaiseXinvalid_argumentstd::_std::invalid_argument::invalid_argument
          • String ID: list<T> too long
          • API String ID: 3797282997-4027344264
          • Opcode ID: b891f914bf5b6091b45759e7be8323b9363d49a5a225def5ec3fa428f759fb45
          • Instruction ID: 92de3169a2c2c9bbcff9fc1aaaf432a4d2ade990887b4ec7a1028a94d6a0a0d3
          • Opcode Fuzzy Hash: b891f914bf5b6091b45759e7be8323b9363d49a5a225def5ec3fa428f759fb45
          • Instruction Fuzzy Hash: CB41AF71A002259FCB14EF5CC880B6EBBF4FF59314F148569EA59AB740D730B9408B90
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 01322297
          • __CxxThrowException@8.LIBVCRUNTIME ref: 013222A8
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: Exception@8ThrowXinvalid_argumentstd::_
          • String ID: list<T> too long
          • API String ID: 3614006799-4027344264
          • Opcode ID: 151031efe3f0986967280054c32762e0a31101119aae8e47519e4598b7f9ec9a
          • Instruction ID: 43013a71a07d7e637559b814cd6572c3e00d6e5cd2eb53b9544db570b2e40d3a
          • Opcode Fuzzy Hash: 151031efe3f0986967280054c32762e0a31101119aae8e47519e4598b7f9ec9a
          • Instruction Fuzzy Hash: A9416975A00229EFCB14EF5CC880B6ABBF4FF59314F20856AE959AB350D731B940CB90
          APIs
          • _free.LIBCMT ref: 0133A36A
          • _free.LIBCMT ref: 0133A398
            • Part of subcall function 013355B1: IsProcessorFeaturePresent.KERNEL32(00000017,01335AB2,?,?,013336F7,01349A28,0000000C), ref: 013355CD
            • Part of subcall function 0133182D: IsProcessorFeaturePresent.KERNEL32(00000017,013317FF,?,?,?,?,?,?,?,0133180C,00000000,00000000,00000000,00000000,00000000,0133B0DB), ref: 0133182F
            • Part of subcall function 0133182D: GetCurrentProcess.KERNEL32(C0000417), ref: 01331852
            • Part of subcall function 0133182D: TerminateProcess.KERNEL32(00000000), ref: 01331859
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: FeaturePresentProcessProcessor_free$CurrentTerminate
          • String ID: H/Q
          • API String ID: 1729132349-2411224165
          • Opcode ID: c32fc29c056ad027d203d05067e27ea2b33b4d2413d52a1891f010999b77ab6e
          • Instruction ID: 4d9cac8963325db6a2cf388ce9d3a31bf18778156d33f18b3b7999f0f1f20eb4
          • Opcode Fuzzy Hash: c32fc29c056ad027d203d05067e27ea2b33b4d2413d52a1891f010999b77ab6e
          • Instruction Fuzzy Hash: 672105766052069BEF259FBCD840B6977A9EFC432CF240129E985CB145EBF2D841C758
          APIs
          • InitializeCriticalSection.KERNEL32(?), ref: 004034DB
          • @EVENTMGRINIT$QUL.BRCC(01000000,?), ref: 004034E5
            • Part of subcall function 00402E89: InitializeCriticalSection.KERNEL32(-00000040), ref: 00402EC8
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CriticalInitializeSection
          • String ID: o1@
          • API String ID: 32694325-206246701
          • Opcode ID: 95c70d083bb7a214ec142bc811512dcef1438259e6f59556f280b6426e62e402
          • Instruction ID: b1543bbf13176710c529c61918718738c2fc3db57c3651038861ef567cd7352e
          • Opcode Fuzzy Hash: 95c70d083bb7a214ec142bc811512dcef1438259e6f59556f280b6426e62e402
          • Instruction Fuzzy Hash: 92311974A00209EBCB04DF94C98599DBBB5FF48345F10816AF9486B3A1DB75DA81CF98
          APIs
          • GetModuleHandleA.KERNEL32(00000000,___CPPdebugHook), ref: 0040DABF
          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040DAC5
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: ___CPPdebugHook
          • API String ID: 1646373207-76456168
          • Opcode ID: 287a6b333046123f1858be82b54ae64867af626ad00b8413832972d0f5747850
          • Instruction ID: cac64b625be94977cf7515171d509fe3c1ea65b8af14518d2d1145854148ca72
          • Opcode Fuzzy Hash: 287a6b333046123f1858be82b54ae64867af626ad00b8413832972d0f5747850
          • Instruction Fuzzy Hash: D321C7349093C08ED713ABA099567953F71BF03718F1A81FBD0846A1F3C67D098ACB6A
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free
          • String ID: @GP
          • API String ID: 269201875-1535696100
          • Opcode ID: 3a911180a06b6d2b36f5abaf44188d48892b60d8158f7ef11c48083f495b44a4
          • Instruction ID: f7635ee93f662285045a7bc1e199e2789a6523dad4341e0d2e17e3c0488a8797
          • Opcode Fuzzy Hash: 3a911180a06b6d2b36f5abaf44188d48892b60d8158f7ef11c48083f495b44a4
          • Instruction Fuzzy Hash: CA11C871A242227BEB349A7DBC49BAD3799B761730F284616F622CB6C4D371C6474B80
          APIs
            • Part of subcall function 0122546E: EnterCriticalSection.KERNEL32(?,?,01224195,?,01231EA8,00000008,0122430C,00000001,?,?), ref: 0122547D
          • DeleteCriticalSection.KERNEL32(01233618,?,?,?,?,01232128,00000010,01227AE9), ref: 01229B49
          • _free.LIBCMT ref: 01229B57
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$DeleteEnter_free
          • String ID: @GP
          • API String ID: 1836352639-1535696100
          • Opcode ID: 75bbebc0874767e50b888b1122cc7347dad92efb13a69c862f93c993c3cc449b
          • Instruction ID: 0b48a6e6fe42946be30934602406513085b5cdd6036ee35ba89a9cdb0acc2aba
          • Opcode Fuzzy Hash: 75bbebc0874767e50b888b1122cc7347dad92efb13a69c862f93c993c3cc449b
          • Instruction Fuzzy Hash: FB11E032620232EFDB20DF99E449BACB7B0FB09724F508106E612DB6D0CB75E542CB04
          APIs
          • GetModuleHandleA.KERNEL32(BRCC32,0041F0EC,00000104), ref: 0040C62D
          • GetModuleFileNameA.KERNEL32(00000000,BRCC32,0041F0EC,00000104), ref: 0040C633
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: Module$FileHandleName
          • String ID: BRCC32
          • API String ID: 4146042529-1983932053
          • Opcode ID: bb2b271d77e38dff5e7b391816342d185b57991bd0eb3710a4d9690fd15eefec
          • Instruction ID: a37f0b661a05946a262a0a393fff8bb036f745d6e25c814e50e47cd4ef111798
          • Opcode Fuzzy Hash: bb2b271d77e38dff5e7b391816342d185b57991bd0eb3710a4d9690fd15eefec
          • Instruction Fuzzy Hash: 86112130640104EFC700DF54DC85FC93BA9AF49709F14C175F9499B2A2C676A9D9CB99
          APIs
          • GetCurrentDirectoryA.KERNEL32(00000104,00000000), ref: 00410EE2
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: CurrentDirectory
          • String ID: A$Z
          • API String ID: 1611563598-4098844585
          • Opcode ID: 634a1577d351043f3a428ca60013a7c1ce4cd3ada01c53e2bbc73d4084fa08ef
          • Instruction ID: 0d841c5518bc233b6d3ef3ce057666f5c9254ccc47b631ce3bedcb6927d85a67
          • Opcode Fuzzy Hash: 634a1577d351043f3a428ca60013a7c1ce4cd3ada01c53e2bbc73d4084fa08ef
          • Instruction Fuzzy Hash: 1AF0E2B27097550AE630217A2CC66CB1A88DF027B9F24066BF651C52C2CBEDCDC2816D
          APIs
            • Part of subcall function 01229AE6: DeleteCriticalSection.KERNEL32(01233618,?,?,?,?,01232128,00000010,01227AE9), ref: 01229B49
            • Part of subcall function 01229AE6: _free.LIBCMT ref: 01229B57
            • Part of subcall function 01229B91: _free.LIBCMT ref: 01229BB5
          • DeleteCriticalSection.KERNEL32(00504720), ref: 01227B05
          • _free.LIBCMT ref: 01227B19
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: _free$CriticalDeleteSection
          • String ID: @GP
          • API String ID: 1906768660-1535696100
          • Opcode ID: c69be17e98e006fc58e361a9ad60b3d48c085a0b1bd5224fd8c0b537c2fae070
          • Instruction ID: 3d82c140177d6890984a552360a2d078231fbfd60ed5754d849bec62a2ba6bfc
          • Opcode Fuzzy Hash: c69be17e98e006fc58e361a9ad60b3d48c085a0b1bd5224fd8c0b537c2fae070
          • Instruction Fuzzy Hash: 8AE0D833824132BBCB31AB9DF808A5E33D9AF19320B15C814E442C3044CB316D458F44
          APIs
          • GetModuleHandleA.KERNEL32(00000000,___CPPdebugHook), ref: 0040DEAF
          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040DEB5
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: ___CPPdebugHook
          • API String ID: 1646373207-76456168
          • Opcode ID: fde9424a57caf3c6f118d46f5f668d899efe892cb6852b9fda161fadb51bae4f
          • Instruction ID: e9fac35ffdc13730c2a5cdd90867b2163e931cc03d56ebb25d2ecdeab5880e1a
          • Opcode Fuzzy Hash: fde9424a57caf3c6f118d46f5f668d899efe892cb6852b9fda161fadb51bae4f
          • Instruction Fuzzy Hash: FBC012B4B40308E9D7107F609CC67403670A304B1EF90017A90519A1E1C7BC11C68A2C
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CommandLine
          • String ID: @3O
          • API String ID: 3253501508-2647879139
          • Opcode ID: 1105f6c10648b5d0b8d7e42b09751a4920973c02526dfc7a1e2523bd555f7852
          • Instruction ID: eedc6af00d592ed812dbfd08b4d7a16420c1b0011ece1a7549f01ae3b23c911a
          • Opcode Fuzzy Hash: 1105f6c10648b5d0b8d7e42b09751a4920973c02526dfc7a1e2523bd555f7852
          • Instruction Fuzzy Hash: 93B092BC802200CFD7208F30F00D005BBB8B688302BC02156EA0AD3308DF342000DF20
          APIs
          Strings
          Memory Dump Source
          • Source File: 0000000E.00000002.3890376341.0000000001221000.00000020.00001000.00020000.00000000.sdmp, Offset: 01220000, based on PE: true
          • Associated: 0000000E.00000002.3890359285.0000000001220000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890414753.000000000122D000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001233000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890436508.0000000001313000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1220000_brcc.jbxd
          Similarity
          • API ID: CommandLine
          • String ID: @3O
          • API String ID: 3253501508-2647879139
          • Opcode ID: 8eb8c162eac9e925f9ef6ee50e5382fbe54ffc0117a0c43bac8baca79e896bf3
          • Instruction ID: 975cc301da7bcde7607b8da555286d4eff423c015dcec35555d4daed4d2a8d75
          • Opcode Fuzzy Hash: 8eb8c162eac9e925f9ef6ee50e5382fbe54ffc0117a0c43bac8baca79e896bf3
          • Instruction Fuzzy Hash: D5B04878804204ABC7358FB0B01C1087AA5F2087423C0A45AD80183218E73A020ACF10
          Memory Dump Source
          • Source File: 0000000E.00000002.3889783164.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 0000000E.00000002.3889763013.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889808265.000000000041D000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889836260.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889856334.000000000042A000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 0000000E.00000002.3889875780.000000000042D000.00000040.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_400000_brcc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f6482671da7de8cfdcedd33a01a2a71081be13d1fa2dcd55206946f7dc224d7a
          • Instruction ID: f8b09694432a2b6b888e91e60ec0dff31b9f07a23385d21866bb79e039dcde5b
          • Opcode Fuzzy Hash: f6482671da7de8cfdcedd33a01a2a71081be13d1fa2dcd55206946f7dc224d7a
          • Instruction Fuzzy Hash: 1C31A230348212ABD7209A698C90BF777A9EB46374F36462AE925C72D0D678E881C759
          APIs
          • EnterCriticalSection.KERNEL32(005197A8,?,?,00000000,7B2C007C,?,00000000), ref: 0132ABA2
          • EnterCriticalSection.KERNEL32(00000000,?,00000000,7B2C007C,?,00000000), ref: 0132AC3C
          • LeaveCriticalSection.KERNEL32(00000000,?,00000000,7B2C007C,?,00000000), ref: 0132AC5D
          • LeaveCriticalSection.KERNEL32(?,?,00000000,7B2C007C,?,00000000), ref: 0132AC91
          Memory Dump Source
          • Source File: 0000000E.00000002.3890557780.0000000001321000.00000020.00001000.00020000.00000000.sdmp, Offset: 01320000, based on PE: true
          • Associated: 0000000E.00000002.3890541212.0000000001320000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890630590.0000000001342000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134B000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 0000000E.00000002.3890667471.000000000134F000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1320000_brcc.jbxd
          Similarity
          • API ID: CriticalSection$EnterLeave
          • String ID:
          • API String ID: 3168844106-0
          • Opcode ID: ca9da39f3eb3596556680b61783b4c5d0d959e4ecfa1afe84e7ba30b51ea154c
          • Instruction ID: 26477bb6c4a2facdd9f21a5284d18012cbda1545e65d9041b3b2ec342045a3b8
          • Opcode Fuzzy Hash: ca9da39f3eb3596556680b61783b4c5d0d959e4ecfa1afe84e7ba30b51ea154c
          • Instruction Fuzzy Hash: D7316E74600622AFDB18EF28D494A65FBE5FF48309F14856EE90ACBA51D731E880CB90