Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
Analysis ID:1379474
MD5:ea3a7609e12fe069ec2968793646876e
SHA1:c727b1456e2c715cc80b992fe6c32ac70afc3402
SHA256:a6c2b68b46b6b478ae984fd861f1681688a64c2f1f3227256e6fd436be1569e0
Infos:

Detection

PoshC2
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected PoshC2
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject threads in other processes
Machine Learning detection for sample
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PoshC2PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.
  • APT33
https://malpedia.caad.fkie.fraunhofer.de/details/win.poshc2
{"C2 url": "https://139.59.72.48:9443"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PoshC2Yara detected PoshC2Joe Security
    00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PoshC2Yara detected PoshC2Joe Security
      00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PoshC2Yara detected PoshC2Joe Security
        Process Memory Space: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe PID: 5892JoeSecurity_PoshC2Yara detected PoshC2Joe Security
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.unpackJoeSecurity_PoshC2Yara detected PoshC2Joe Security
            0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.unpackJoeSecurity_PoshC2Yara detected PoshC2Joe Security
              0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.unpackJoeSecurity_PoshC2Yara detected PoshC2Joe Security
                0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpackJoeSecurity_PoshC2Yara detected PoshC2Joe Security
                  0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpackJoeSecurity_PoshC2Yara detected PoshC2Joe Security
                    Click to see the 4 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeAvira: detected
                    Source: https://139.59.72.48:9443/bh/sync/aol/?cAvira URL Cloud: Label: malware
                    Source: https://139.59.72.48:9443Avira URL Cloud: Label: malware
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpackMalware Configuration Extractor: PoshC2 {"C2 url": "https://139.59.72.48:9443"}
                    Source: https://139.59.72.48:9443/bh/sync/aol/?cVirustotal: Detection: 11%Perma Link
                    Source: https://139.59.72.48:9443Virustotal: Detection: 13%Perma Link
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeReversingLabs: Detection: 85%
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeVirustotal: Detection: 81%Perma Link
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01317E08 FindFirstFileExW,0_2_01317E08
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10007E04 FindFirstFileExW,0_2_10007E04

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: https://139.59.72.48:9443
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.6:49710 -> 139.59.72.48:9443
                    Source: Joe Sandbox ViewIP Address: 139.59.72.48 139.59.72.48
                    Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: unknownTCP traffic detected without corresponding DNS query: 139.59.72.48
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://139.59.72.48:9443
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://139.59.72.48:9443/bh/sync/aol/?c
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://139.59.72.48:9443t-
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_013100310_2_01310031
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_013110B40_2_013110B4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_0131E8D40_2_0131E8D4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_0131DBF50_2_0131DBF5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_100010B00_2_100010B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_1000E8D00_2_1000E8D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_1000DBF10_2_1000DBF1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: String function: 10002D00 appears 34 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: String function: 01312D04 appears 34 times
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedropper_cs.exe$ vs SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamedropper_cs.exe$ vs SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedropper_cs.exe$ vs SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, Program.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, Program.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, Program.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, Program.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/1@0/1
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:992:120:WilError_03
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeReversingLabs: Detection: 85%
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeVirustotal: Detection: 81%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT

                    Data Obfuscation

                    barindex
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, Program.cs.Net Code: ImplantCore System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, Program.cs.Net Code: ImplantCore System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, Program.cs.Net Code: ImplantCore System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpack, Program.cs.Net Code: ImplantCore System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_001114E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_001114E0
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeStatic PE information: section name: .eh_fram
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01312D4A push ecx; ret 0_2_01312D5D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_0131EC10 pushad ; ret 0_2_0131EC11
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10002D46 push ecx; ret 0_2_10002D59
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: GetModuleHandleW,GetModuleFileNameA,StrStrIA,CreateThread,0_2_01311644
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: GetModuleHandleW,GetModuleFileNameA,StrStrIA,CreateThread,0_2_10001640
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599201Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599089Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598548Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598316Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596681Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596557Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595014Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594797Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594578Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594469Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594359Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594250Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594140Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594031Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593922Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593812Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593703Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593594Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593484Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeWindow / User API: threadDelayed 890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeWindow / User API: threadDelayed 1528Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeWindow / User API: threadDelayed 7365Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 988Thread sleep time: -44500000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599201s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -599089s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -598984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -598875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -598548s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -598437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -598316s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596681s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596557s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -596000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -595014s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -594031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -593922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -593812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -593703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -593594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe TID: 7144Thread sleep time: -593484s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01317E08 FindFirstFileExW,0_2_01317E08
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10007E04 FindFirstFileExW,0_2_10007E04
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 50000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599201Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 599089Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598548Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 598316Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596681Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596557Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 595014Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594797Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594578Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594469Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594359Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594250Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594140Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 594031Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593922Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593812Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593703Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593594Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeThread delayed: delay time: 593484Jump to behavior
                    Source: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4529328409.000000000148B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01315D1F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01315D1F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_001114E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_001114E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_0131799B mov eax, dword ptr fs:[00000030h]0_2_0131799B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01310B11 mov eax, dword ptr fs:[00000030h]0_2_01310B11
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_013163A4 mov eax, dword ptr fs:[00000030h]0_2_013163A4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10007997 mov eax, dword ptr fs:[00000030h]0_2_10007997
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_100063A0 mov eax, dword ptr fs:[00000030h]0_2_100063A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01319332 GetProcessHeap,0_2_01319332
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_0011116C Sleep,Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0011116C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_00111160 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_00111160
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_001111A3 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_001111A3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_001113C1 SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,0_2_001113C1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01315D1F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01315D1F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01312BDD IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01312BDD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01312EAD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_01312EAD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10005D1B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_10005D1B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10002EA9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_10002EA9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_10002BD9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_10002BD9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_001116F9 exit,OpenProcess,exit,VirtualAllocEx,VirtualAllocEx,exit,VirtualProtect,VirtualProtect,WriteProcessMemory,WriteProcessMemory,exit,CreateRemoteThread,CreateRemoteThread,CloseHandle,0_2_001116F9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01312A36 cpuid 0_2_01312A36
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeCode function: 0_2_01312D65 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_01312D65
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe PID: 5892, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.1485480.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.147dd88.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.19a0000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe.3b087b0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe PID: 5892, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                    Valid Accounts1
                    Native API
                    Path Interception11
                    Process Injection
                    1
                    Disable or Modify Tools
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
                    Virtualization/Sandbox Evasion
                    LSASS Memory121
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Non-Standard Port
                    SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                    Domain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Process Injection
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Application Layer Protocol
                    Data Encrypted for ImpactDNS ServerEmail Addresses
                    Local AccountsCronLogin HookLogin Hook11
                    Deobfuscate/Decode Files or Information
                    NTDS21
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                    Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                    Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Software Packing
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                    External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe86%ReversingLabsWin32.Trojan.Martey
                    SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe81%VirustotalBrowse
                    SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe100%AviraTR/Hijacker.Gen
                    SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://139.59.72.48:9443t-0%Avira URL Cloudsafe
                    https://139.59.72.48:9443/bh/sync/aol/?c100%Avira URL Cloudmalware
                    https://139.59.72.48:9443100%Avira URL Cloudmalware
                    https://139.59.72.48:9443/bh/sync/aol/?c11%VirustotalBrowse
                    https://139.59.72.48:944313%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    https://139.59.72.48:9443true
                    • 13%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://139.59.72.48:9443t-SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://139.59.72.48:9443/bh/sync/aol/?cSecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, 00000000.00000002.4530469878.0000000003B5B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 11%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      139.59.72.48
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1379474
                      Start date and time:2024-01-23 13:29:16 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 11s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@2/1@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 28
                      • Number of non-executed functions: 62
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      13:30:01API Interceptor9604695x Sleep call for process: SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      139.59.72.48SecuriteInfo.com.Trojan.RunPowerShellNET.8.18821.3341.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Trojan.RunPowerShellNET.8.18821.3341.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Trojan.RunPowerShellNET.8.1922.27994.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Trojan.DownLoaderNET.485.23452.1035.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Trojan.RunPowerShellNET.8.27731.28340.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.RunPowerShellNET.8.7028.30924.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Trojan.DownLoaderNET.485.29542.11675.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Trojan.DownLoaderNET.485.23452.1035.exeGet hashmaliciousUnknownBrowse
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      DIGITALOCEAN-ASNUShttp://104.131.132.54/dota3.tar.gzGet hashmaliciousUnknownBrowse
                                      • 104.131.132.54
                                      Chepstow Hospital 2024.htmlGet hashmaliciousUnknownBrowse
                                      • 178.128.135.204
                                      https://blueinsect-raxilaf176408090.codeanyapp.com/STR/SRT34/Get hashmaliciousUnknownBrowse
                                      • 45.55.112.74
                                      BbTm8TrVqb.exeGet hashmaliciousLummaC, AsyncRAT, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog StealerBrowse
                                      • 162.243.189.2
                                      SecuriteInfo.com.Python.CrealStealer.4.28055.30099.exeGet hashmaliciousCreal StealerBrowse
                                      • 159.89.102.253
                                      ghdfg64.exeGet hashmaliciousCreal StealerBrowse
                                      • 159.89.102.253
                                      java.exeGet hashmaliciousTinbaBrowse
                                      • 178.62.201.34
                                      toolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                      • 134.209.130.144
                                      python.exeGet hashmaliciousCobaltStrikeBrowse
                                      • 159.89.124.188
                                      arm7.elfGet hashmaliciousMiraiBrowse
                                      • 157.245.182.60
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):159
                                      Entropy (8bit):3.8947409169014717
                                      Encrypted:false
                                      SSDEEP:3:TrA7F7HqYLhOw4yHXWcFU7F7HqYLhOw4yHXWcFU7F7HqYLhOw4yHXWy:XAB+YVKy3AB+YVKy3AB+YVKy33
                                      MD5:20AFD3CDD39C3CCA75BC64343D01D1C5
                                      SHA1:97D177F2D90153034DE3BE498E24C69181C1746E
                                      SHA-256:08092ABB159997EDC3B73C4450628DD96326B31DD08407ECE99BBA3782E3BD26
                                      SHA-512:74B6444E6945039EFE80A25CFF677C5AA65B0123A4506991884C97261900DBE90593AE825545D368FAB932A53AFB8453EF3197D27EC1D74992878AFBD12BB804
                                      Malicious:false
                                      Reputation:low
                                      Preview: > Exception Unable to connect to the remote server.. > Exception Unable to connect to the remote server.. > Exception Unable to connect to the remote server..
                                      File type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                      Entropy (8bit):7.413646596673889
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                      File size:140'288 bytes
                                      MD5:ea3a7609e12fe069ec2968793646876e
                                      SHA1:c727b1456e2c715cc80b992fe6c32ac70afc3402
                                      SHA256:a6c2b68b46b6b478ae984fd861f1681688a64c2f1f3227256e6fd436be1569e0
                                      SHA512:44d905a5b449b0cca54bd11bc4e4ef9a11f47e6062ec605540ba7be528b6d39d4ab0fd7870061ec57c1234ecb86899a032711dd447fa2875554936bc03304805
                                      SSDEEP:3072:RrKiddDSt4dtH1G2hfdE8pT+d6s377PhrU:BKiddDIK7GiOLdV7jhrU
                                      TLSH:0BD36E3E35B16807F6ED0A34F4F8FA1642003123BDE65CCE2D14AA2CC7739A7769A654
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g.le...............%..... ...............0....@.......................................@... ............................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x4014b0
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x656CC067 [Sun Dec 3 17:52:39 2023 UTC]
                                      TLS Callbacks:0x401980, 0x401930
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:bb9dc484d891a7cf70c5c51b76b5d7db
                                      Instruction
                                      mov dword ptr [0042406Ch], 00000000h
                                      jmp 00007F4504B000D6h
                                      nop
                                      sub esp, 1Ch
                                      mov eax, dword ptr [esp+20h]
                                      mov dword ptr [esp], eax
                                      call 00007F4504B017EEh
                                      test eax, eax
                                      sete al
                                      add esp, 1Ch
                                      movzx eax, al
                                      neg eax
                                      ret
                                      nop
                                      nop
                                      nop
                                      push ebp
                                      mov ebp, esp
                                      push edi
                                      push esi
                                      push ebx
                                      sub esp, 1Ch
                                      mov dword ptr [esp], 00422000h
                                      call dword ptr [00425114h]
                                      sub esp, 04h
                                      test eax, eax
                                      je 00007F4504B004A5h
                                      mov ebx, eax
                                      mov dword ptr [esp], 00422000h
                                      call dword ptr [00425128h]
                                      mov edi, dword ptr [00425118h]
                                      sub esp, 04h
                                      mov dword ptr [00424028h], eax
                                      mov dword ptr [esp+04h], 00422013h
                                      mov dword ptr [esp], ebx
                                      call edi
                                      sub esp, 08h
                                      mov esi, eax
                                      mov dword ptr [esp+04h], 00422029h
                                      mov dword ptr [esp], ebx
                                      call edi
                                      mov dword ptr [00403004h], eax
                                      sub esp, 08h
                                      test esi, esi
                                      je 00007F4504B00443h
                                      mov dword ptr [esp+04h], 0042402Ch
                                      mov dword ptr [esp], 00423104h
                                      call esi
                                      mov dword ptr [esp], 00401590h
                                      call 00007F4504B00393h
                                      lea esp, dword ptr [ebp-0Ch]
                                      pop ebx
                                      pop esi
                                      pop edi
                                      pop ebp
                                      ret
                                      lea esi, dword ptr [esi+00000000h]
                                      mov dword ptr [00403004h], 00000000h
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x250000x52c.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x280000x254.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x220480x18.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x250f80xbc.idata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x19140x1a00f0e37ec431e64213814ba85f8f3a0583False0.5638521634615384data5.846117818627713IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .data0x30000x1e4600x1e600808561d6c7bee8a881713bceda459c33False0.7740644290123457data7.471441078656051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rdata0x220000x6400x800f184779ef92be879efffb5516c16cde1False0.2509765625data4.429330729079639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .eh_fram0x230000x8080xa00cc3c1d04c3f4f4a0fdc9a45b2ca212f9False0.357421875data4.019719986614664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .bss0x240000xc00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata0x250000x52c0x60005749aedd66fd8bf021e8c62acd1183eFalse0.408203125data4.50073620107875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .CRT0x260000x300x2004598190f1d736200bfeba72241c0036bFalse0.064453125data0.22091378450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .tls0x270000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .reloc0x280000x2540x400d1aa0f9a3beb7a7f867d13fe0058fb9cFalse0.5634765625data4.5116431429364265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      DLLImport
                                      KERNEL32.dllCloseHandle, CreateRemoteThread, DeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcessId, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, OpenProcess, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualAllocEx, VirtualProtect, VirtualQuery, WriteProcessMemory
                                      msvcrt.dll__getmainargs, __initenv, __p__acmdln, __p__commode, __p__fmode, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _initterm, _iob, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, strlen, strncmp, vfprintf
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 23, 2024 13:30:03.052087069 CET497109443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:30:03.387289047 CET944349710139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:30:03.889303923 CET497109443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:30:04.225794077 CET944349710139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:30:04.733181000 CET497109443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:30:05.070205927 CET944349710139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:30:05.577122927 CET497109443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:30:05.914635897 CET944349710139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:30:06.420614004 CET497109443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:30:06.757477999 CET944349710139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:31:06.825917006 CET497189443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:31:07.162338018 CET944349718139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:31:07.670464039 CET497189443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:31:08.006757975 CET944349718139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:31:08.514285088 CET497189443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:31:08.850425005 CET944349718139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:31:09.357989073 CET497189443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:31:09.694246054 CET944349718139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:31:10.201725960 CET497189443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:31:10.537988901 CET944349718139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:33:10.550234079 CET497209443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:33:10.895445108 CET944349720139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:33:11.420295954 CET497209443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:33:11.764422894 CET944349720139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:33:12.420315027 CET497209443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:33:12.764312029 CET944349720139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:33:13.326584101 CET497209443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:33:13.670665979 CET944349720139.59.72.48192.168.2.6
                                      Jan 23, 2024 13:33:14.232789040 CET497209443192.168.2.6139.59.72.48
                                      Jan 23, 2024 13:33:14.576775074 CET944349720139.59.72.48192.168.2.6

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:13:30:01
                                      Start date:23/01/2024
                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                      Imagebase:0x110000
                                      File size:140'288 bytes
                                      MD5 hash:EA3A7609E12FE069EC2968793646876E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_PoshC2, Description: Yara detected PoshC2, Source: 00000000.00000002.4529328409.000000000145A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PoshC2, Description: Yara detected PoshC2, Source: 00000000.00000002.4530257912.00000000019A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PoshC2, Description: Yara detected PoshC2, Source: 00000000.00000002.4530469878.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Target ID:2
                                      Start time:13:30:01
                                      Start date:23/01/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4.9%
                                        Dynamic/Decrypted Code Coverage:88.7%
                                        Signature Coverage:6.2%
                                        Total number of Nodes:923
                                        Total number of Limit Nodes:12
                                        execution_graph 17084 10001080 17089 10001310 17084->17089 17086 1000108f 17102 10002637 17086->17102 17090 10001334 17089->17090 17091 1000144a 17090->17091 17094 10001347 BuildCatchObjectHelperInternal 17090->17094 17095 100013b7 17090->17095 17096 100013da 17090->17096 17120 10001620 17091->17120 17094->17086 17105 100022b9 17095->17105 17098 100022b9 16 API calls 17096->17098 17100 100013c8 17096->17100 17098->17100 17101 1000142c 17100->17101 17115 10005ed7 17100->17115 17101->17086 17371 100025fc 17102->17371 17108 100022be 17105->17108 17107 100022d8 17107->17100 17108->17107 17111 100022da 17108->17111 17123 1000607f 17108->17123 17130 10005ff6 17108->17130 17110 10002a14 17112 10003357 __CxxThrowException@8 RaiseException 17110->17112 17111->17110 17133 10003357 17111->17133 17114 10002a31 17112->17114 17316 10005e63 17115->17316 17117 10005ee6 17324 10005ef4 IsProcessorFeaturePresent 17117->17324 17119 10005ef3 17342 1000226c 17120->17342 17128 10007949 __dosmaperr 17123->17128 17124 10007987 17136 10005fd4 17124->17136 17126 10007972 RtlAllocateHeap 17127 10007985 17126->17127 17126->17128 17127->17108 17128->17124 17128->17126 17129 10005ff6 __dosmaperr 2 API calls 17128->17129 17129->17128 17305 10006023 17130->17305 17134 10003377 RaiseException 17133->17134 17134->17110 17139 100076b4 GetLastError 17136->17139 17138 10005fd9 17138->17127 17140 100076d1 17139->17140 17141 100076cb 17139->17141 17160 100076d7 SetLastError 17140->17160 17167 100091b2 17140->17167 17162 10009173 17141->17162 17148 10007707 17150 100091b2 __dosmaperr 6 API calls 17148->17150 17149 1000771e 17151 100091b2 __dosmaperr 6 API calls 17149->17151 17153 10007715 17150->17153 17152 1000772a 17151->17152 17154 1000772e 17152->17154 17155 1000773f 17152->17155 17179 10007a25 17153->17179 17156 100091b2 __dosmaperr 6 API calls 17154->17156 17185 1000735f 17155->17185 17156->17153 17160->17138 17161 10007a25 _free 12 API calls 17161->17160 17190 10009013 17162->17190 17164 1000918f 17165 10009198 17164->17165 17166 100091aa TlsGetValue 17164->17166 17165->17140 17168 10009013 __dosmaperr 5 API calls 17167->17168 17169 100091ce 17168->17169 17170 100091ec TlsSetValue 17169->17170 17171 100076ef 17169->17171 17171->17160 17172 100079c8 17171->17172 17177 100079d5 __dosmaperr 17172->17177 17173 10007a15 17176 10005fd4 __dosmaperr 13 API calls 17173->17176 17174 10007a00 RtlAllocateHeap 17175 100076ff 17174->17175 17174->17177 17175->17148 17175->17149 17176->17175 17177->17173 17177->17174 17178 10005ff6 __dosmaperr 2 API calls 17177->17178 17178->17177 17180 10007a30 HeapFree 17179->17180 17181 10007a59 __dosmaperr 17179->17181 17180->17181 17182 10007a45 17180->17182 17181->17160 17183 10005fd4 __dosmaperr 12 API calls 17182->17183 17184 10007a4b GetLastError 17183->17184 17184->17181 17203 100071f3 17185->17203 17191 10009041 17190->17191 17195 1000903d __crt_fast_encode_pointer 17190->17195 17191->17195 17196 10008f4c 17191->17196 17194 1000905b GetProcAddress 17194->17195 17195->17164 17197 10008f5d try_get_first_available_module 17196->17197 17198 10008f7b LoadLibraryExW 17197->17198 17200 10008ff1 FreeLibrary 17197->17200 17201 10009008 17197->17201 17202 10008fc9 LoadLibraryExW 17197->17202 17198->17197 17199 10008f96 GetLastError 17198->17199 17199->17197 17200->17197 17201->17194 17201->17195 17202->17197 17204 100071ff CallCatchBlock 17203->17204 17217 100078ea RtlEnterCriticalSection 17204->17217 17206 10007209 17218 10007239 17206->17218 17209 10007305 17210 10007311 CallCatchBlock 17209->17210 17222 100078ea RtlEnterCriticalSection 17210->17222 17212 1000731b 17223 100074e6 17212->17223 17214 10007333 17227 10007353 17214->17227 17217->17206 17221 10007932 RtlLeaveCriticalSection 17218->17221 17220 10007227 17220->17209 17221->17220 17222->17212 17224 1000751c __dosmaperr 17223->17224 17225 100074f5 __dosmaperr 17223->17225 17224->17214 17225->17224 17230 1000a04d 17225->17230 17304 10007932 RtlLeaveCriticalSection 17227->17304 17229 10007341 17229->17161 17232 1000a0cd 17230->17232 17235 1000a063 17230->17235 17233 10007a25 _free 14 API calls 17232->17233 17257 1000a11b 17232->17257 17234 1000a0ef 17233->17234 17238 10007a25 _free 14 API calls 17234->17238 17235->17232 17236 1000a096 17235->17236 17240 10007a25 _free 14 API calls 17235->17240 17237 1000a0b8 17236->17237 17245 10007a25 _free 14 API calls 17236->17245 17239 10007a25 _free 14 API calls 17237->17239 17241 1000a102 17238->17241 17242 1000a0c2 17239->17242 17244 1000a08b 17240->17244 17246 10007a25 _free 14 API calls 17241->17246 17249 10007a25 _free 14 API calls 17242->17249 17243 1000a189 17250 10007a25 _free 14 API calls 17243->17250 17258 1000a36a 17244->17258 17247 1000a0ad 17245->17247 17248 1000a110 17246->17248 17286 1000a468 17247->17286 17253 10007a25 _free 14 API calls 17248->17253 17249->17232 17255 1000a18f 17250->17255 17253->17257 17254 10007a25 14 API calls _free 17256 1000a129 17254->17256 17255->17224 17256->17243 17256->17254 17298 1000a1be 17257->17298 17259 1000a37b 17258->17259 17285 1000a464 17258->17285 17260 1000a38c 17259->17260 17261 10007a25 _free 14 API calls 17259->17261 17262 10007a25 _free 14 API calls 17260->17262 17263 1000a39e 17260->17263 17261->17260 17262->17263 17264 10007a25 _free 14 API calls 17263->17264 17265 1000a3b0 17263->17265 17264->17265 17266 10007a25 _free 14 API calls 17265->17266 17268 1000a3c2 17265->17268 17266->17268 17267 1000a3d4 17270 1000a3e6 17267->17270 17271 10007a25 _free 14 API calls 17267->17271 17268->17267 17269 10007a25 _free 14 API calls 17268->17269 17269->17267 17272 1000a3f8 17270->17272 17274 10007a25 _free 14 API calls 17270->17274 17271->17270 17273 1000a40a 17272->17273 17275 10007a25 _free 14 API calls 17272->17275 17276 1000a41c 17273->17276 17277 10007a25 _free 14 API calls 17273->17277 17274->17272 17275->17273 17278 1000a42e 17276->17278 17279 10007a25 _free 14 API calls 17276->17279 17277->17276 17280 1000a440 17278->17280 17282 10007a25 _free 14 API calls 17278->17282 17279->17278 17281 1000a452 17280->17281 17283 10007a25 _free 14 API calls 17280->17283 17284 10007a25 _free 14 API calls 17281->17284 17281->17285 17282->17280 17283->17281 17284->17285 17285->17236 17287 1000a475 17286->17287 17288 1000a4cd 17286->17288 17289 1000a485 17287->17289 17290 10007a25 _free 14 API calls 17287->17290 17288->17237 17291 1000a497 17289->17291 17292 10007a25 _free 14 API calls 17289->17292 17290->17289 17293 1000a4a9 17291->17293 17295 10007a25 _free 14 API calls 17291->17295 17292->17291 17294 1000a4bb 17293->17294 17296 10007a25 _free 14 API calls 17293->17296 17294->17288 17297 10007a25 _free 14 API calls 17294->17297 17295->17293 17296->17294 17297->17288 17299 1000a1cb 17298->17299 17303 1000a1ea 17298->17303 17300 1000a509 __dosmaperr 14 API calls 17299->17300 17299->17303 17301 1000a1e4 17300->17301 17302 10007a25 _free 14 API calls 17301->17302 17302->17303 17303->17256 17304->17229 17306 1000602f CallCatchBlock 17305->17306 17311 100078ea RtlEnterCriticalSection 17306->17311 17308 1000603a 17312 10006076 17308->17312 17311->17308 17315 10007932 RtlLeaveCriticalSection 17312->17315 17314 10006001 17314->17108 17315->17314 17317 100076b4 __dosmaperr 14 API calls 17316->17317 17318 10005e6e 17317->17318 17319 10005e7c 17318->17319 17320 10005ef4 11 API calls 17318->17320 17319->17117 17321 10005ec6 17320->17321 17322 10005e63 25 API calls 17321->17322 17323 10005ed3 17322->17323 17323->17117 17325 10005f00 17324->17325 17328 10005d1b 17325->17328 17329 10005d37 ___scrt_fastfail 17328->17329 17330 10005d63 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17329->17330 17333 10005e34 ___scrt_fastfail 17330->17333 17332 10005e52 GetCurrentProcess TerminateProcess 17332->17119 17334 10002e98 17333->17334 17335 10002ea1 17334->17335 17336 10002ea3 IsProcessorFeaturePresent 17334->17336 17335->17332 17338 10002ee5 17336->17338 17341 10002ea9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17338->17341 17340 10002fc8 17340->17332 17341->17340 17347 100021ba 17342->17347 17345 10003357 __CxxThrowException@8 RaiseException 17346 1000228b 17345->17346 17350 1000216a 17347->17350 17353 100032d5 17350->17353 17354 10002196 17353->17354 17355 100032e2 17353->17355 17354->17345 17355->17354 17356 1000607f _com_util::ConvertStringToBSTR 15 API calls 17355->17356 17357 100032ff 17356->17357 17358 1000330f 17357->17358 17361 10006f4a 17357->17361 17368 10006f2f 17358->17368 17362 10006f57 17361->17362 17363 10006f65 17361->17363 17362->17363 17366 10006f7c 17362->17366 17364 10005fd4 __dosmaperr 14 API calls 17363->17364 17365 10006f6d 17364->17365 17365->17358 17366->17365 17367 10005fd4 __dosmaperr 14 API calls 17366->17367 17367->17365 17369 10007a25 _free 14 API calls 17368->17369 17370 10006f47 17369->17370 17370->17354 17372 10002620 17371->17372 17373 10002619 17371->17373 17380 10006ce8 17372->17380 17377 10006c7c 17373->17377 17376 10001099 17378 10006ce8 __onexit 17 API calls 17377->17378 17379 10006c8e 17378->17379 17379->17376 17383 100069ff 17380->17383 17384 10006a0b CallCatchBlock 17383->17384 17391 100078ea RtlEnterCriticalSection 17384->17391 17386 10006a19 17392 10006a79 17386->17392 17388 10006a26 17402 10006a4e 17388->17402 17391->17386 17393 10006a95 17392->17393 17395 10006b0c __onexit __crt_fast_encode_pointer 17392->17395 17394 10006aec 17393->17394 17393->17395 17405 10008e91 17393->17405 17394->17395 17397 10008e91 __onexit 17 API calls 17394->17397 17395->17388 17399 10006b02 17397->17399 17398 10006ae2 17400 10007a25 _free 14 API calls 17398->17400 17401 10007a25 _free 14 API calls 17399->17401 17400->17394 17401->17395 17438 10007932 RtlLeaveCriticalSection 17402->17438 17404 10006a37 17404->17376 17406 10008eb9 17405->17406 17407 10008e9e 17405->17407 17409 10008ec8 17406->17409 17414 1000aed6 17406->17414 17407->17406 17408 10008eaa 17407->17408 17410 10005fd4 __dosmaperr 14 API calls 17408->17410 17419 1000af09 17409->17419 17413 10008eaf ___scrt_fastfail 17410->17413 17413->17398 17415 1000aee1 17414->17415 17416 1000aef6 RtlSizeHeap 17414->17416 17417 10005fd4 __dosmaperr 14 API calls 17415->17417 17416->17409 17418 1000aee6 17417->17418 17418->17409 17420 1000af21 17419->17420 17421 1000af16 17419->17421 17423 1000af29 17420->17423 17429 1000af32 __dosmaperr 17420->17429 17431 10007949 17421->17431 17424 10007a25 _free 14 API calls 17423->17424 17427 1000af1e 17424->17427 17425 1000af37 17428 10005fd4 __dosmaperr 14 API calls 17425->17428 17426 1000af5c RtlReAllocateHeap 17426->17427 17426->17429 17427->17413 17428->17427 17429->17425 17429->17426 17430 10005ff6 __dosmaperr 2 API calls 17429->17430 17430->17429 17432 10007987 17431->17432 17437 10007957 __dosmaperr 17431->17437 17433 10005fd4 __dosmaperr 14 API calls 17432->17433 17435 10007985 17433->17435 17434 10007972 RtlAllocateHeap 17434->17435 17434->17437 17435->17427 17436 10005ff6 __dosmaperr 2 API calls 17436->17437 17437->17432 17437->17434 17437->17436 17438->17404 17439 1113c1 17440 1113c8 17439->17440 17441 1113db _amsg_exit 17440->17441 17442 1111da 17440->17442 17445 1113f5 _initterm 17441->17445 17449 1111ff 17441->17449 17443 111460 _initterm 17442->17443 17444 1111e7 17442->17444 17446 111483 exit 17443->17446 17444->17445 17444->17449 17445->17449 17465 111c80 17449->17465 17450 111231 SetUnhandledExceptionFilter 17451 111252 17450->17451 17452 111257 __p__acmdln 17451->17452 17456 11126e malloc 17452->17456 17454 111301 17455 111310 strlen malloc memcpy 17454->17455 17455->17455 17457 111346 17455->17457 17456->17446 17456->17454 17482 111900 17457->17482 17459 11135f 17487 111617 17459->17487 17474 111ca0 17465->17474 17481 111c93 17465->17481 17466 111eb8 17467 111eb2 17466->17467 17466->17481 17467->17466 17472 111ef9 17467->17472 17520 111b20 17467->17520 17468 111f57 17470 111ac0 11 API calls 17468->17470 17471 111f67 17470->17471 17471->17450 17476 111e33 17472->17476 17473 111e90 17478 111ac0 11 API calls 17473->17478 17474->17466 17474->17468 17474->17473 17475 111d40 17474->17475 17474->17476 17474->17481 17475->17473 17475->17474 17475->17476 17479 111b20 11 API calls 17475->17479 17492 111ac0 17475->17492 17477 111f2a VirtualProtect 17476->17477 17476->17481 17477->17476 17478->17467 17479->17475 17481->17450 17483 111909 17482->17483 17484 1118a0 17482->17484 17483->17459 17546 1114c0 _onexit 17484->17546 17486 1118d0 17486->17459 17488 111900 _onexit 17487->17488 17489 111631 17488->17489 17547 1116f9 17489->17547 17491 1116e6 Sleep 17491->17491 17544 112830 17492->17544 17494 111ad4 fwrite 17545 112830 17494->17545 17496 111b00 vfprintf abort 17502 111b20 17496->17502 17497 111bd0 17497->17475 17498 111c67 17499 111ac0 4 API calls 17498->17499 17515 111c77 17499->17515 17500 111b8b VirtualQuery 17501 111c47 17500->17501 17500->17502 17503 111ac0 4 API calls 17501->17503 17502->17497 17502->17498 17502->17500 17504 111be0 VirtualProtect 17502->17504 17503->17498 17504->17497 17505 111c20 GetLastError 17504->17505 17506 111ac0 4 API calls 17505->17506 17506->17502 17507 111eb2 17509 111b20 4 API calls 17507->17509 17512 111e33 17507->17512 17519 111c93 17507->17519 17508 111f57 17510 111ac0 4 API calls 17508->17510 17509->17507 17511 111f67 17510->17511 17511->17475 17516 111f2a VirtualProtect 17512->17516 17512->17519 17513 111e90 17517 111ac0 4 API calls 17513->17517 17514 111b20 VirtualQuery VirtualProtect GetLastError VirtualProtect 17514->17515 17515->17507 17515->17508 17515->17512 17515->17513 17515->17514 17518 111ac0 4 API calls 17515->17518 17515->17519 17516->17512 17517->17507 17518->17515 17519->17475 17526 111b36 17520->17526 17521 111bd0 17521->17467 17522 111c67 17523 111ac0 7 API calls 17522->17523 17538 111c77 17523->17538 17524 111b8b VirtualQuery 17525 111c47 17524->17525 17524->17526 17527 111ac0 7 API calls 17525->17527 17526->17521 17526->17522 17526->17524 17528 111be0 VirtualProtect 17526->17528 17527->17522 17528->17521 17529 111c20 GetLastError 17528->17529 17530 111ac0 7 API calls 17529->17530 17530->17526 17531 111eb2 17533 111b20 7 API calls 17531->17533 17536 111e33 17531->17536 17543 111c93 17531->17543 17532 111f57 17534 111ac0 7 API calls 17532->17534 17533->17531 17535 111f67 17534->17535 17535->17467 17539 111f2a VirtualProtect 17536->17539 17536->17543 17537 111e90 17540 111ac0 7 API calls 17537->17540 17538->17531 17538->17532 17538->17536 17538->17537 17541 111b20 7 API calls 17538->17541 17542 111ac0 7 API calls 17538->17542 17538->17543 17539->17536 17540->17531 17541->17538 17542->17538 17543->17467 17544->17494 17545->17496 17546->17486 17548 111718 17547->17548 17549 11170c exit 17547->17549 17550 111741 exit 17548->17550 17551 11174d VirtualAllocEx 17548->17551 17549->17548 17550->17551 17552 111792 VirtualProtect 17551->17552 17553 111786 exit 17551->17553 17554 111851 17552->17554 17555 1117c6 WriteProcessMemory 17552->17555 17553->17552 17554->17491 17556 111805 CreateRemoteThread 17555->17556 17557 1117f9 exit 17555->17557 17556->17554 17557->17556 17558 1310000 17560 1310005 17558->17560 17563 1310031 17560->17563 17573 1310b11 GetPEB 17563->17573 17566 1310b11 GetPEB 17567 13102a6 17566->17567 17568 131049a GetNativeSystemInfo 17567->17568 17571 131002c 17567->17571 17569 13104c7 VirtualAlloc 17568->17569 17568->17571 17570 13104e0 17569->17570 17575 100029a2 17570->17575 17574 131029a 17573->17574 17574->17566 17576 100029b0 dllmain_dispatch 17575->17576 17577 100029ab 17575->17577 17576->17571 17579 10002dae 17577->17579 17580 10002dc4 17579->17580 17582 10002dcd 17580->17582 17583 10002d61 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17580->17583 17582->17576 17583->17582 17584 10002871 17587 1000287d CallCatchBlock 17584->17587 17585 1000288c 17586 100028a6 dllmain_raw 17586->17585 17589 100028c0 dllmain_crt_dispatch 17586->17589 17587->17585 17587->17586 17588 100028a1 17587->17588 17597 10001640 17588->17597 17589->17585 17589->17588 17591 1000290d 17591->17585 17593 10002916 dllmain_crt_dispatch 17591->17593 17593->17585 17595 10002929 dllmain_raw 17593->17595 17594 10001640 72 API calls 17596 100028f9 dllmain_crt_dispatch dllmain_raw 17594->17596 17595->17585 17596->17591 17598 100016ac 17597->17598 17599 1000164f GetModuleHandleW 17597->17599 17598->17591 17598->17594 17603 100035d0 17599->17603 17602 1000169a CreateThread 17602->17598 17605 10001930 17602->17605 17604 1000166d GetModuleFileNameA StrStrIA 17603->17604 17604->17598 17604->17602 17606 100022b9 16 API calls 17605->17606 17632 1000195a _com_issue_error 17606->17632 17608 100022b9 16 API calls 17608->17632 17609 10002ff0 _com_util::ConvertStringToBSTR 25 API calls 17610 100019c3 LoadLibraryW GetProcAddress 17609->17610 17610->17632 17611 10005ed7 25 API calls 17611->17632 17612 10001ac7 GetTickCount 17673 10005f49 17612->17673 17614 10001d50 17615 10001f81 17614->17615 17616 10001f74 SysFreeString 17614->17616 17618 10001fc5 SysFreeString 17615->17618 17619 10001fd2 17615->17619 17616->17615 17618->17619 17620 10002050 16 API calls 17620->17632 17622 10001bb9 LoadLibraryW 17623 10001bd8 GetProcAddress 17622->17623 17622->17632 17624 10001bea VirtualProtect 17623->17624 17623->17632 17626 10001bfa VirtualProtect 17624->17626 17624->17632 17625 10001c26 LoadLibraryA 17627 10001c3d GetProcAddress 17625->17627 17625->17632 17626->17632 17629 10001c4f VirtualProtect 17627->17629 17627->17632 17631 10001c5f VirtualProtect 17629->17631 17629->17632 17631->17632 17632->17605 17632->17608 17632->17609 17632->17611 17632->17612 17632->17614 17632->17620 17632->17622 17632->17625 17633 10001cba SafeArrayUnlock 17632->17633 17634 10001dae SysAllocString 17632->17634 17635 10001e23 SafeArrayCreateVector SafeArrayPutElement 17632->17635 17636 10001e7b SafeArrayDestroy 17632->17636 17637 10001eb5 SysFreeString 17632->17637 17638 10002ff0 17632->17638 17658 100016c0 6 API calls 17632->17658 17666 100010b0 17632->17666 17676 10005f28 17632->17676 17633->17632 17634->17632 17635->17632 17636->17632 17637->17632 17639 1000302d 17638->17639 17640 10003034 17638->17640 17641 10002e98 CatchGuardHandler 5 API calls 17639->17641 17657 10003171 _com_issue_error 17639->17657 17640->17640 17642 1000312a _com_issue_error 17640->17642 17643 1000305a MultiByteToWideChar 17640->17643 17644 10003124 17641->17644 17645 10003134 GetLastError 17642->17645 17643->17645 17646 10003077 17643->17646 17644->17632 17649 1000313e _com_issue_error 17645->17649 17647 1000607f _com_util::ConvertStringToBSTR 15 API calls 17646->17647 17648 10003089 _com_util::ConvertStringToBSTR 17646->17648 17647->17648 17648->17649 17650 100030d5 MultiByteToWideChar 17648->17650 17652 10003167 GetLastError 17649->17652 17654 10006f2f ___std_type_info_destroy_list 14 API calls 17649->17654 17650->17649 17651 100030e9 SysAllocString 17650->17651 17651->17639 17653 100030fa 17651->17653 17652->17657 17655 10006f2f ___std_type_info_destroy_list 14 API calls 17653->17655 17656 10003164 17654->17656 17655->17639 17656->17652 17657->17632 17665 100017d2 ___scrt_fastfail 17658->17665 17659 100018bd FindCloseChangeNotification 17660 100018cd FreeLibrary 17659->17660 17660->17632 17661 10001825 VirtualProtect 17663 10001887 VirtualProtect 17661->17663 17661->17665 17663->17665 17664 10005fd4 __dosmaperr 14 API calls 17664->17665 17665->17659 17665->17661 17665->17663 17665->17664 17667 10001306 SafeArrayCreate SafeArrayLock 17666->17667 17671 100010d4 17666->17671 17667->17632 17669 1000122b 17669->17667 17670 10001490 27 API calls 17669->17670 17670->17669 17671->17669 17679 10005c90 17671->17679 17688 10001490 17671->17688 17674 1000755d FindHandler 16 API calls 17673->17674 17675 10005f53 17674->17675 17675->17632 17677 1000755d FindHandler 16 API calls 17676->17677 17678 10005f2d 17677->17678 17678->17632 17680 10005cc3 17679->17680 17685 10005ca7 17679->17685 17700 1000755d GetLastError 17680->17700 17682 10005cc8 17724 100077af 17682->17724 17685->17671 17689 10001605 17688->17689 17690 100014cd 17688->17690 17805 10001610 17689->17805 17692 10001501 17690->17692 17693 10001528 17690->17693 17696 100022b9 16 API calls 17692->17696 17697 100022b9 16 API calls 17693->17697 17698 10001512 BuildCatchObjectHelperInternal 17693->17698 17694 10005ed7 25 API calls 17695 1000160f 17694->17695 17696->17698 17697->17698 17698->17694 17699 100015bf 17698->17699 17699->17671 17701 1000757a 17700->17701 17702 10007574 17700->17702 17703 100091b2 __dosmaperr 6 API calls 17701->17703 17722 10007580 SetLastError 17701->17722 17704 10009173 __dosmaperr 6 API calls 17702->17704 17705 10007598 17703->17705 17704->17701 17706 100079c8 __dosmaperr 14 API calls 17705->17706 17705->17722 17708 100075a8 17706->17708 17709 100075b0 17708->17709 17710 100075c7 17708->17710 17713 100091b2 __dosmaperr 6 API calls 17709->17713 17712 100091b2 __dosmaperr 6 API calls 17710->17712 17711 1000760e 17711->17682 17714 100075d3 17712->17714 17715 100075be 17713->17715 17716 100075d7 17714->17716 17717 100075e8 17714->17717 17720 10007a25 _free 14 API calls 17715->17720 17718 100091b2 __dosmaperr 6 API calls 17716->17718 17719 1000735f __dosmaperr 14 API calls 17717->17719 17718->17715 17721 100075f3 17719->17721 17720->17722 17723 10007a25 _free 14 API calls 17721->17723 17722->17711 17723->17722 17725 100077c2 17724->17725 17726 10005cd8 17724->17726 17725->17726 17735 1000a299 17725->17735 17726->17685 17728 10007128 17726->17728 17754 1000702d 17728->17754 17732 10002e98 CatchGuardHandler 5 API calls 17734 10005d0a 17732->17734 17733 10007155 17733->17732 17734->17671 17736 1000a2a5 CallCatchBlock 17735->17736 17737 1000755d FindHandler 16 API calls 17736->17737 17738 1000a2ae 17737->17738 17744 1000a2f0 17738->17744 17745 100078ea RtlEnterCriticalSection 17738->17745 17740 1000a2cc 17746 1000a31a 17740->17746 17744->17726 17745->17740 17747 1000a328 __dosmaperr 17746->17747 17749 1000a2dd 17746->17749 17748 1000a04d __dosmaperr 14 API calls 17747->17748 17747->17749 17748->17749 17750 1000a2f9 17749->17750 17753 10007932 RtlLeaveCriticalSection 17750->17753 17752 1000a300 17752->17744 17753->17752 17755 1000704d 17754->17755 17761 10007044 17754->17761 17756 1000755d FindHandler 16 API calls 17755->17756 17755->17761 17757 1000706d 17756->17757 17758 100077af __fassign 16 API calls 17757->17758 17759 10007083 17758->17759 17777 100077dc 17759->17777 17761->17733 17762 10009ead 17761->17762 17763 1000702d __fassign 16 API calls 17762->17763 17764 10009ecd 17763->17764 17798 10008ca3 17764->17798 17766 10009f8b 17767 10002e98 CatchGuardHandler 5 API calls 17766->17767 17770 10009fae 17767->17770 17768 10009efa 17768->17766 17769 10007949 __onexit 15 API calls 17768->17769 17773 10009f20 _com_util::ConvertStringToBSTR ___scrt_fastfail 17768->17773 17769->17773 17770->17733 17771 10009f85 17801 10009fb0 17771->17801 17773->17771 17774 10008ca3 __fassign MultiByteToWideChar 17773->17774 17775 10009f6e 17774->17775 17775->17771 17776 10009f75 GetStringTypeW 17775->17776 17776->17771 17778 10007804 17777->17778 17779 100077ef 17777->17779 17778->17761 17779->17778 17781 10008994 17779->17781 17782 1000755d FindHandler 16 API calls 17781->17782 17783 1000899e 17782->17783 17786 100088ac 17783->17786 17785 100089a4 17785->17778 17787 100088b8 CallCatchBlock 17786->17787 17790 100088d2 17787->17790 17794 100078ea RtlEnterCriticalSection 17787->17794 17789 1000890e 17795 1000892b 17789->17795 17790->17785 17792 100088e2 17792->17789 17793 10007a25 _free 14 API calls 17792->17793 17793->17789 17794->17792 17796 10007932 __onexit RtlLeaveCriticalSection 17795->17796 17797 10008932 17796->17797 17797->17790 17799 10008cb4 MultiByteToWideChar 17798->17799 17799->17768 17802 10009fbc 17801->17802 17803 10009fcd 17801->17803 17802->17803 17804 10007a25 _free 14 API calls 17802->17804 17803->17766 17804->17803 17806 1000226c std::_Xinvalid_argument 16 API calls 17805->17806 17807 1000161a 17806->17807 17808 10002682 17809 100026c0 dllmain_crt_process_detach 17808->17809 17810 1000268d 17808->17810 17817 1000269c 17809->17817 17811 100026b2 dllmain_crt_process_attach 17810->17811 17812 10002692 17810->17812 17811->17817 17813 10002697 17812->17813 17814 100026a8 17812->17814 17813->17817 17818 100023d4 17813->17818 17823 100023b5 17814->17823 17831 10006e36 17818->17831 17938 100033ed 17823->17938 17826 100023be 17826->17817 17829 100023d1 17829->17817 17830 100033f8 21 API calls 17830->17826 17837 10007531 17831->17837 17834 100033f8 17903 10003b50 17834->17903 17838 1000753b 17837->17838 17841 100023d9 17837->17841 17839 10009173 __dosmaperr 6 API calls 17838->17839 17840 10007542 17839->17840 17840->17841 17842 100091b2 __dosmaperr 6 API calls 17840->17842 17841->17834 17843 10007555 17842->17843 17845 100073f8 17843->17845 17846 10007403 17845->17846 17847 10007413 17845->17847 17851 10007419 17846->17851 17847->17841 17850 10007a25 _free 14 API calls 17850->17847 17852 10007434 17851->17852 17853 1000742e 17851->17853 17855 10007a25 _free 14 API calls 17852->17855 17854 10007a25 _free 14 API calls 17853->17854 17854->17852 17856 10007440 17855->17856 17857 10007a25 _free 14 API calls 17856->17857 17858 1000744b 17857->17858 17859 10007a25 _free 14 API calls 17858->17859 17860 10007456 17859->17860 17861 10007a25 _free 14 API calls 17860->17861 17862 10007461 17861->17862 17863 10007a25 _free 14 API calls 17862->17863 17864 1000746c 17863->17864 17865 10007a25 _free 14 API calls 17864->17865 17866 10007477 17865->17866 17867 10007a25 _free 14 API calls 17866->17867 17868 10007482 17867->17868 17869 10007a25 _free 14 API calls 17868->17869 17870 1000748d 17869->17870 17871 10007a25 _free 14 API calls 17870->17871 17872 1000749b 17871->17872 17877 10007245 17872->17877 17878 10007251 CallCatchBlock 17877->17878 17893 100078ea RtlEnterCriticalSection 17878->17893 17880 10007285 17894 100072a4 17880->17894 17882 1000725b 17882->17880 17884 10007a25 _free 14 API calls 17882->17884 17884->17880 17885 100072b0 17886 100072bc CallCatchBlock 17885->17886 17898 100078ea RtlEnterCriticalSection 17886->17898 17888 100072c6 17889 100074e6 __dosmaperr 14 API calls 17888->17889 17890 100072d9 17889->17890 17899 100072f9 17890->17899 17893->17882 17897 10007932 RtlLeaveCriticalSection 17894->17897 17896 10007292 17896->17885 17897->17896 17898->17888 17902 10007932 RtlLeaveCriticalSection 17899->17902 17901 100072e7 17901->17850 17902->17901 17904 10003b5d 17903->17904 17910 100023de 17903->17910 17908 10003b6b 17904->17908 17911 10003e88 17904->17911 17916 10003ec3 17908->17916 17910->17817 17925 10003da3 17911->17925 17913 10003ea2 17914 10003eba TlsGetValue 17913->17914 17915 10003eae 17913->17915 17914->17915 17915->17908 17917 10003da3 try_get_function 5 API calls 17916->17917 17918 10003edd 17917->17918 17919 10003ef8 TlsSetValue 17918->17919 17920 10003b7b 17918->17920 17919->17920 17921 10003b34 17920->17921 17922 10003b3e 17921->17922 17924 10003b4b 17921->17924 17923 10006f2f ___std_type_info_destroy_list 14 API calls 17922->17923 17922->17924 17923->17924 17924->17910 17926 10003dcb 17925->17926 17930 10003dc7 __crt_fast_encode_pointer 17925->17930 17926->17930 17931 10003cdf 17926->17931 17929 10003de5 GetProcAddress 17929->17930 17930->17913 17932 10003cee try_get_first_available_module 17931->17932 17933 10003d0b LoadLibraryExW 17932->17933 17935 10003d81 FreeLibrary 17932->17935 17936 10003d98 17932->17936 17937 10003d59 LoadLibraryExW 17932->17937 17933->17932 17934 10003d26 GetLastError 17933->17934 17934->17932 17935->17932 17936->17929 17936->17930 17937->17932 17944 10003b94 17938->17944 17940 100023ba 17940->17826 17941 10006e2b 17940->17941 17942 100076b4 __dosmaperr 14 API calls 17941->17942 17943 100023c6 17942->17943 17943->17829 17943->17830 17945 10003ba0 GetLastError 17944->17945 17946 10003b9d 17944->17946 17947 10003e88 ___vcrt_FlsGetValue 6 API calls 17945->17947 17946->17940 17948 10003bb5 17947->17948 17949 10003c1a SetLastError 17948->17949 17950 10003ec3 ___vcrt_FlsSetValue 6 API calls 17948->17950 17957 10003bd4 17948->17957 17949->17940 17951 10003bce 17950->17951 17952 10003bf6 17951->17952 17953 10003ec3 ___vcrt_FlsSetValue 6 API calls 17951->17953 17951->17957 17954 10003ec3 ___vcrt_FlsSetValue 6 API calls 17952->17954 17955 10003c0a 17952->17955 17953->17952 17954->17955 17956 10006f2f ___std_type_info_destroy_list 14 API calls 17955->17956 17956->17957 17957->17949 17958 19b0518 17959 19b0535 17958->17959 17960 19b0646 GetConsoleWindow 17959->17960 17964 19b053f 17959->17964 17963 19b06cb 17960->17963 17965 19b05c5 17964->17965 17967 19b00ec 17964->17967 17966 19b05d3 17968 19b0660 GetConsoleWindow 17967->17968 17970 19b06cb 17968->17970 17970->17966 17971 100026d5 17972 100026e1 CallCatchBlock 17971->17972 17985 10002445 17972->17985 17974 100026e8 17975 10002712 17974->17975 17976 100027d7 17974->17976 17982 100026ed ___scrt_is_nonwritable_in_current_image 17974->17982 17996 100023a7 17975->17996 18004 10002bd9 IsProcessorFeaturePresent 17976->18004 17979 100027de 17980 10002721 __RTC_Initialize 17980->17982 17999 10002df9 RtlInitializeSListHead 17980->17999 17983 1000272f ___scrt_initialize_default_local_stdio_options 17983->17982 18000 1000237c 17983->18000 17986 1000244e 17985->17986 18008 10002a32 IsProcessorFeaturePresent 17986->18008 17990 1000245f 17995 10002463 17990->17995 18019 10006e19 17990->18019 17993 1000247a 17993->17974 17995->17974 18080 1000247e 17996->18080 17998 100023ae 17998->17980 17999->17983 18001 10002381 ___scrt_release_startup_lock 18000->18001 18002 10002a32 ___isa_available_init IsProcessorFeaturePresent 18001->18002 18003 1000238a 18001->18003 18002->18003 18003->17982 18005 10002bee ___scrt_fastfail 18004->18005 18006 10002c99 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18005->18006 18007 10002ce4 ___scrt_fastfail 18006->18007 18007->17979 18009 1000245a 18008->18009 18010 100033c4 18009->18010 18011 100033c9 ___vcrt_initialize_winapi_thunks 18010->18011 18030 10003c74 18011->18030 18015 100033df 18016 100033ea 18015->18016 18044 10003cb0 18015->18044 18016->17990 18018 100033d7 18018->17990 18067 1000953f 18019->18067 18022 10003403 18023 1000340c 18022->18023 18024 1000341d 18022->18024 18025 10003c59 ___vcrt_uninitialize_ptd 6 API calls 18023->18025 18024->17995 18026 10003411 18025->18026 18027 10003cb0 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 18026->18027 18028 10003416 18027->18028 18076 10003f71 18028->18076 18031 10003c7d 18030->18031 18033 10003ca6 18031->18033 18034 100033d3 18031->18034 18048 10003f01 18031->18048 18035 10003cb0 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 18033->18035 18034->18018 18036 10003c26 18034->18036 18035->18034 18053 10003e12 18036->18053 18039 10003ec3 ___vcrt_FlsSetValue 6 API calls 18041 10003c49 18039->18041 18040 10003c56 18040->18015 18041->18040 18058 10003c59 18041->18058 18043 10003c3b 18043->18015 18045 10003cda 18044->18045 18046 10003cbb 18044->18046 18045->18018 18047 10003cc5 RtlDeleteCriticalSection 18046->18047 18047->18045 18047->18047 18049 10003da3 try_get_function 5 API calls 18048->18049 18050 10003f1b 18049->18050 18051 10003f39 InitializeCriticalSectionAndSpinCount 18050->18051 18052 10003f24 18050->18052 18051->18052 18052->18031 18054 10003da3 try_get_function 5 API calls 18053->18054 18055 10003e2c 18054->18055 18056 10003e45 TlsAlloc 18055->18056 18057 10003c30 18055->18057 18057->18039 18057->18043 18059 10003c69 18058->18059 18060 10003c63 18058->18060 18059->18043 18062 10003e4d 18060->18062 18063 10003da3 try_get_function 5 API calls 18062->18063 18064 10003e67 18063->18064 18065 10003e7f TlsFree 18064->18065 18066 10003e73 18064->18066 18065->18066 18066->18059 18068 1000954f 18067->18068 18069 1000246c 18067->18069 18068->18069 18071 100093ff 18068->18071 18069->17993 18069->18022 18072 10009406 18071->18072 18073 10009449 GetStdHandle 18072->18073 18074 100094af 18072->18074 18075 1000945c GetFileType 18072->18075 18073->18072 18074->18068 18075->18072 18077 10003fa0 18076->18077 18078 10003f7a 18076->18078 18077->18024 18078->18077 18079 10003f8a FreeLibrary 18078->18079 18079->18078 18081 10002491 18080->18081 18082 1000248d 18080->18082 18083 10002bd9 ___scrt_fastfail 4 API calls 18081->18083 18085 1000249e ___scrt_release_startup_lock 18081->18085 18082->17998 18084 10002522 18083->18084 18085->17998 18086 100067b8 18097 1000894c 18086->18097 18090 100067d5 18093 10007a25 _free 14 API calls 18090->18093 18095 10006804 18093->18095 18096 10007a25 _free 14 API calls 18096->18090 18098 100067ca 18097->18098 18099 10008955 18097->18099 18103 10008e0d GetEnvironmentStringsW 18098->18103 18132 1000761a 18099->18132 18101 10008978 18154 10008798 18101->18154 18104 10008e24 18103->18104 18114 10008e7a 18103->18114 18208 10008d1f 18104->18208 18105 10008e83 FreeEnvironmentStringsW 18106 100067cf 18105->18106 18106->18090 18115 1000680a 18106->18115 18108 10008e3d 18109 10007949 __onexit 15 API calls 18108->18109 18108->18114 18110 10008e4d 18109->18110 18111 10008e65 18110->18111 18112 10008d1f ___scrt_uninitialize_crt WideCharToMultiByte 18110->18112 18113 10007a25 _free 14 API calls 18111->18113 18112->18111 18113->18114 18114->18105 18114->18106 18116 1000681f 18115->18116 18117 100079c8 __dosmaperr 14 API calls 18116->18117 18118 10006846 18117->18118 18120 100068ab 18118->18120 18122 100079c8 __dosmaperr 14 API calls 18118->18122 18123 100068ad 18118->18123 18125 10006f4a std::exception::exception 14 API calls 18118->18125 18128 100068cd 18118->18128 18130 10007a25 _free 14 API calls 18118->18130 18119 10007a25 _free 14 API calls 18121 100067e0 18119->18121 18120->18119 18121->18096 18122->18118 18211 100068da 18123->18211 18125->18118 18127 10007a25 _free 14 API calls 18127->18120 18129 10005ef4 11 API calls 18128->18129 18131 100068d9 18129->18131 18130->18118 18133 10007625 18132->18133 18134 1000762b 18132->18134 18136 10009173 __dosmaperr 6 API calls 18133->18136 18135 100091b2 __dosmaperr 6 API calls 18134->18135 18138 10007631 18134->18138 18137 10007645 18135->18137 18136->18134 18137->18138 18139 100079c8 __dosmaperr 14 API calls 18137->18139 18138->18101 18140 10007655 18139->18140 18141 10007672 18140->18141 18142 1000765d 18140->18142 18144 100091b2 __dosmaperr 6 API calls 18141->18144 18143 100091b2 __dosmaperr 6 API calls 18142->18143 18146 10007669 18143->18146 18145 1000767e 18144->18145 18147 10007691 18145->18147 18148 10007682 18145->18148 18151 10007a25 _free 14 API calls 18146->18151 18150 1000735f __dosmaperr 14 API calls 18147->18150 18149 100091b2 __dosmaperr 6 API calls 18148->18149 18149->18146 18152 1000769c 18150->18152 18151->18138 18153 10007a25 _free 14 API calls 18152->18153 18153->18138 18155 100088ac __fassign 14 API calls 18154->18155 18156 100087ab 18155->18156 18171 10008542 18156->18171 18159 100087c4 18159->18098 18160 10007949 __onexit 15 API calls 18161 100087d5 18160->18161 18163 10008802 18161->18163 18166 1000881d 18161->18166 18170 10008807 18161->18170 18162 10007a25 _free 14 API calls 18164 10008815 18162->18164 18165 10005fd4 __dosmaperr 14 API calls 18163->18165 18164->18098 18165->18170 18167 10008849 18166->18167 18168 10007a25 _free 14 API calls 18166->18168 18167->18170 18178 10008434 18167->18178 18168->18167 18170->18162 18172 1000702d __fassign 16 API calls 18171->18172 18173 10008554 18172->18173 18174 10008563 GetOEMCP 18173->18174 18175 10008575 18173->18175 18176 1000858c 18174->18176 18175->18176 18177 1000857a GetACP 18175->18177 18176->18159 18176->18160 18177->18176 18179 10008440 CallCatchBlock 18178->18179 18186 100078ea RtlEnterCriticalSection 18179->18186 18181 1000844a 18187 10008481 18181->18187 18186->18181 18197 10008b9a 18187->18197 18189 100084a3 18190 10008b9a 14 API calls 18189->18190 18191 100084c2 18190->18191 18192 10008457 18191->18192 18193 10007a25 _free 14 API calls 18191->18193 18194 10008475 18192->18194 18193->18192 18207 10007932 RtlLeaveCriticalSection 18194->18207 18196 10008463 18196->18170 18198 10008bab 18197->18198 18206 10008ba7 18197->18206 18199 10008bb2 18198->18199 18201 10008bc5 ___scrt_fastfail 18198->18201 18200 10005fd4 __dosmaperr 14 API calls 18199->18200 18200->18206 18202 10008bf3 18201->18202 18203 10008bfc 18201->18203 18201->18206 18204 10005fd4 __dosmaperr 14 API calls 18202->18204 18205 10005fd4 __dosmaperr 14 API calls 18203->18205 18203->18206 18204->18206 18205->18206 18206->18189 18207->18196 18210 10008d36 WideCharToMultiByte 18208->18210 18210->18108 18212 100068e7 18211->18212 18216 100068b3 18211->18216 18213 100068fe 18212->18213 18215 10007a25 _free 14 API calls 18212->18215 18214 10007a25 _free 14 API calls 18213->18214 18214->18216 18215->18212 18216->18127 18217 10009bca 18218 10009bd7 18217->18218 18219 100079c8 __dosmaperr 14 API calls 18218->18219 18220 10009bf1 18219->18220 18221 10007a25 _free 14 API calls 18220->18221 18222 10009bfd 18221->18222 18223 100079c8 __dosmaperr 14 API calls 18222->18223 18227 10009c23 18222->18227 18224 10009c17 18223->18224 18226 10007a25 _free 14 API calls 18224->18226 18226->18227 18228 10009c2f 18227->18228 18229 10009c8d 18227->18229 18230 100091f4 18227->18230 18231 10009013 __dosmaperr 5 API calls 18230->18231 18232 10009210 18231->18232 18233 1000922e InitializeCriticalSectionAndSpinCount 18232->18233 18234 10009219 18232->18234 18233->18234 18234->18227
                                        APIs
                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 013104A2
                                        • VirtualAlloc.KERNELBASE(?,?,00003000,00000004), ref: 013104D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AllocInfoNativeSystemVirtual
                                        • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                        • API String ID: 2032221330-2899676511
                                        • Opcode ID: 15b3c3a1d8b5dafea4a93bb4805a509b4eeb6b1eaca912e0ae13e9403863b76d
                                        • Instruction ID: 7b2379cb4cfe77b658b811011f3d6e46badaa25a8608b124416185de4145425d
                                        • Opcode Fuzzy Hash: 15b3c3a1d8b5dafea4a93bb4805a509b4eeb6b1eaca912e0ae13e9403863b76d
                                        • Instruction Fuzzy Hash: CA628D715083858FE729CF28C850BABBBE5BF84308F04492DF9C98B256E770D985CB56
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 357 11116c-11118a 358 111430-11143c GetStartupInfoA 357->358 359 111190-1111a1 357->359 360 1111bc-1111c8 359->360 361 1111a8-1111aa 360->361 362 1111ca-1111d4 360->362 365 1111b0-1111b9 Sleep 361->365 366 1113c8-1113d5 361->366 363 1113db-1113ef _amsg_exit 362->363 364 1111da-1111e1 362->364 369 1113f5-111415 _initterm 363->369 370 1111ff-111201 363->370 367 111460-111479 _initterm 364->367 368 1111e7-1111f9 364->368 365->360 366->363 366->364 373 111483 367->373 368->369 368->370 371 111207-11120e 369->371 372 11141b-111421 369->372 370->371 370->372 374 111210-111229 371->374 375 11122c-11126c call 111c80 SetUnhandledExceptionFilter call 112820 call 111ab0 __p__acmdln 371->375 372->371 377 11148b-1114a0 exit 373->377 374->375 384 111281-111287 375->384 385 11126e 375->385 386 111270-111272 384->386 387 111289-111294 384->387 388 1112bd-1112c5 385->388 391 111274-111277 386->391 392 1112b8 386->392 393 11127e 387->393 389 1112c7-1112d0 388->389 390 1112db-1112fb malloc 388->390 394 1112d6 389->394 395 1113b8-1113bc 389->395 390->373 396 111301-11130d 390->396 397 1112a0-1112a2 391->397 398 111279 391->398 392->388 393->384 394->390 395->394 399 111310-111344 strlen malloc memcpy 396->399 397->392 400 1112a4 397->400 398->393 399->399 401 111346-111393 call 111900 call 111617 399->401 402 1112a8-1112b1 400->402 401->377 408 111399-1113a1 401->408 402->392 404 1112b3-1112b6 402->404 404->392 404->402 409 1113a7-1113b2 408->409 410 111448-11145d _cexit 408->410
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
                                        • String ID:
                                        • API String ID: 1672962128-0
                                        • Opcode ID: 3241b6134ad71b06cddabb64e1f1b6d2517041563cdc483ba2e0f3dc5adf18b3
                                        • Instruction ID: 3e13e5c2c39c6c8a6ce7285121d1fa8cc886c211d9371be2d4db3ae2ff7aa083
                                        • Opcode Fuzzy Hash: 3241b6134ad71b06cddabb64e1f1b6d2517041563cdc483ba2e0f3dc5adf18b3
                                        • Instruction Fuzzy Hash: 66817A71A08205AFDB1CDFA4E9853E9BBE1FB45300F214438EB8597711D779A8C9CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 439 1116f9-11170a 440 111718-11173f 439->440 441 11170c-111713 exit 439->441 443 111741-111748 exit 440->443 444 11174d-111784 VirtualAllocEx 440->444 441->440 443->444 445 111792-1117c0 VirtualProtect 444->445 446 111786-11178d exit 444->446 447 111854-111856 445->447 448 1117c6-1117f7 WriteProcessMemory 445->448 446->445 449 111805-11184a CreateRemoteThread 448->449 450 1117f9-111800 exit 448->450 451 111851 449->451 450->449 451->447
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: exit$Virtual$AllocCreateMemoryProcessProtectRemoteThreadWrite
                                        • String ID: @$@R$v
                                        • API String ID: 1541745093-913945927
                                        • Opcode ID: 239a91e40ceef394262e35a446f5b17ce7c1f329f896618502eba7a505617911
                                        • Instruction ID: a807750d7cfd637a3d5a0865b63070330ed1e61093569238d6fe43c7719e0d9b
                                        • Opcode Fuzzy Hash: 239a91e40ceef394262e35a446f5b17ce7c1f329f896618502eba7a505617911
                                        • Instruction Fuzzy Hash: EC4162B0908305DFDB00EF68C54979EBBF0BF44304F41882CE5989B290D7B99988CF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 452 1113c1-1113d5 454 1113db-1113ef _amsg_exit 452->454 455 1111da-1111e1 452->455 458 1113f5-111415 _initterm 454->458 459 1111ff-111201 454->459 456 111460-111479 _initterm 455->456 457 1111e7-1111f9 455->457 462 111483 456->462 457->458 457->459 460 111207-11120e 458->460 461 11141b-111421 458->461 459->460 459->461 463 111210-111229 460->463 464 11122c-11126c call 111c80 SetUnhandledExceptionFilter call 112820 call 111ab0 __p__acmdln 460->464 461->460 466 11148b-1114a0 exit 462->466 463->464 473 111281-111287 464->473 474 11126e 464->474 475 111270-111272 473->475 476 111289-111294 473->476 477 1112bd-1112c5 474->477 480 111274-111277 475->480 481 1112b8 475->481 482 11127e 476->482 478 1112c7-1112d0 477->478 479 1112db-1112fb malloc 477->479 483 1112d6 478->483 484 1113b8-1113bc 478->484 479->462 485 111301-11130d 479->485 486 1112a0-1112a2 480->486 487 111279 480->487 481->477 482->473 483->479 484->483 488 111310-111344 strlen malloc memcpy 485->488 486->481 489 1112a4 486->489 487->482 488->488 490 111346-111381 call 111900 call 111617 488->490 491 1112a8-1112b1 489->491 496 111386-111393 490->496 491->481 493 1112b3-1112b6 491->493 493->481 493->491 496->466 497 111399-1113a1 496->497 498 1113a7-1113b2 497->498 499 111448-11145d _cexit 497->499
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$ExceptionFilterUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
                                        • String ID:
                                        • API String ID: 2053141405-0
                                        • Opcode ID: a84490f7c8a172a9160b05ccbefae450e594c924262c94d33fa2c80debaae5ca
                                        • Instruction ID: 08176d44e39a40acc58d2747296506c306dc25bbe47fed9c93a9cc2e15d6c140
                                        • Opcode Fuzzy Hash: a84490f7c8a172a9160b05ccbefae450e594c924262c94d33fa2c80debaae5ca
                                        • Instruction Fuzzy Hash: 3541F5B4A083019FDB18EFA4E9853D9BBE0BB58340F11843DEA8497711D774A8D5CF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 500 1111a3-1111a7 501 1111a8-1111aa 500->501 502 1111b0-1111c8 Sleep 501->502 503 1113c8-1113d5 501->503 502->501 511 1111ca-1111d4 502->511 505 1113db-1113ef _amsg_exit 503->505 506 1111da-1111e1 503->506 509 1113f5-111415 _initterm 505->509 510 1111ff-111201 505->510 507 111460-111479 _initterm 506->507 508 1111e7-1111f9 506->508 514 111483 507->514 508->509 508->510 512 111207-11120e 509->512 513 11141b-111421 509->513 510->512 510->513 511->505 511->506 515 111210-111229 512->515 516 11122c-11126c call 111c80 SetUnhandledExceptionFilter call 112820 call 111ab0 __p__acmdln 512->516 513->512 518 11148b-1114a0 exit 514->518 515->516 525 111281-111287 516->525 526 11126e 516->526 527 111270-111272 525->527 528 111289-111294 525->528 529 1112bd-1112c5 526->529 532 111274-111277 527->532 533 1112b8 527->533 534 11127e 528->534 530 1112c7-1112d0 529->530 531 1112db-1112fb malloc 529->531 535 1112d6 530->535 536 1113b8-1113bc 530->536 531->514 537 111301-11130d 531->537 538 1112a0-1112a2 532->538 539 111279 532->539 533->529 534->525 535->531 536->535 540 111310-111344 strlen malloc memcpy 537->540 538->533 541 1112a4 538->541 539->534 540->540 542 111346-111393 call 111900 call 111617 540->542 543 1112a8-1112b1 541->543 542->518 549 111399-1113a1 542->549 543->533 545 1112b3-1112b6 543->545 545->533 545->543 550 1113a7-1113b2 549->550 551 111448-11145d _cexit 549->551
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
                                        • String ID:
                                        • API String ID: 2230096795-0
                                        • Opcode ID: fd1e80fb912b508cb19d90fcc9c3f658a164941284d9efb4ebc095a0ac377f19
                                        • Instruction ID: 5709db2a58d5860180ae120d9d11d7f959b989cbdeae7f0793121cd94e5292f8
                                        • Opcode Fuzzy Hash: fd1e80fb912b508cb19d90fcc9c3f658a164941284d9efb4ebc095a0ac377f19
                                        • Instruction Fuzzy Hash: 704104B0A043019FDB18EFA9E98479DBBF0BB48344F11453DEA8497B51E774A8C5CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 552 111160-11118a 554 111430-11143c GetStartupInfoA 552->554 555 111190-1111a1 552->555 556 1111bc-1111c8 555->556 557 1111a8-1111aa 556->557 558 1111ca-1111d4 556->558 561 1111b0-1111b9 Sleep 557->561 562 1113c8-1113d5 557->562 559 1113db-1113ef _amsg_exit 558->559 560 1111da-1111e1 558->560 565 1113f5-111415 _initterm 559->565 566 1111ff-111201 559->566 563 111460-111479 _initterm 560->563 564 1111e7-1111f9 560->564 561->556 562->559 562->560 569 111483 563->569 564->565 564->566 567 111207-11120e 565->567 568 11141b-111421 565->568 566->567 566->568 570 111210-111229 567->570 571 11122c-11126c call 111c80 SetUnhandledExceptionFilter call 112820 call 111ab0 __p__acmdln 567->571 568->567 573 11148b-1114a0 exit 569->573 570->571 580 111281-111287 571->580 581 11126e 571->581 582 111270-111272 580->582 583 111289-111294 580->583 584 1112bd-1112c5 581->584 587 111274-111277 582->587 588 1112b8 582->588 589 11127e 583->589 585 1112c7-1112d0 584->585 586 1112db-1112fb malloc 584->586 590 1112d6 585->590 591 1113b8-1113bc 585->591 586->569 592 111301-11130d 586->592 593 1112a0-1112a2 587->593 594 111279 587->594 588->584 589->580 590->586 591->590 595 111310-111344 strlen malloc memcpy 592->595 593->588 596 1112a4 593->596 594->589 595->595 597 111346-111393 call 111900 call 111617 595->597 598 1112a8-1112b1 596->598 597->573 604 111399-1113a1 597->604 598->588 600 1112b3-1112b6 598->600 600->588 600->598 605 1113a7-1113b2 604->605 606 111448-11145d _cexit 604->606
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
                                        • String ID:
                                        • API String ID: 1672962128-0
                                        • Opcode ID: 9efc9fe1a2925956a7ea26fdc0e7879958266a462a8e57e976efcb6b64679b65
                                        • Instruction ID: c926760750d4b16cfe8953800f1ee7e9a56d415cb3d38b67e0f9aadf20a245cc
                                        • Opcode Fuzzy Hash: 9efc9fe1a2925956a7ea26fdc0e7879958266a462a8e57e976efcb6b64679b65
                                        • Instruction Fuzzy Hash: 67514771A042019FDB18DFA9E9807DABBF0FB48740F11453CEA449B761E774A8C5CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 10001652
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1000167D
                                        • StrStrIA.KERNELBASE(?,1001B09C), ref: 1000168F
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00000930,?,00000000,00000000), ref: 100016A6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Module$CreateFileHandleNameThread
                                        • String ID:
                                        • API String ID: 345888460-0
                                        • Opcode ID: bc22102a787501f48ea84cdce432fbd2a449c4f78da8322cd65b092844ce9337
                                        • Instruction ID: 853a8ebf1c83869fb68250765f5e448e0e35acde037a291c0c52291fdf588ec9
                                        • Opcode Fuzzy Hash: bc22102a787501f48ea84cdce432fbd2a449c4f78da8322cd65b092844ce9337
                                        • Instruction Fuzzy Hash: 39F030FA900228BBF710DBA0DD89FEB3BACDB14391F044055FF44D6085E6B59A848BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c8ba889e22dbf6d6dfe55392cd371212ae3a88e797661168e23d219cf0826e1
                                        • Instruction ID: 11154f04ebcacc2f8ba1ecc64ccd9bd9657e77d706722054fa73749317b682a1
                                        • Opcode Fuzzy Hash: 5c8ba889e22dbf6d6dfe55392cd371212ae3a88e797661168e23d219cf0826e1
                                        • Instruction Fuzzy Hash: 00712370A042868FFB05CB69D8D06EEBBF6EB5A380F5581BCD45597253C631DA4AC710
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _com_util::ConvertStringToBSTR.COMSUPP ref: 10001984
                                        • _com_util::ConvertStringToBSTR.COMSUPP ref: 100019BE
                                        • LoadLibraryW.KERNELBASE ref: 100019D2
                                        • GetProcAddress.KERNEL32(00000000,1001B0E0), ref: 100019F2
                                        • GetTickCount.KERNEL32 ref: 10001AC7
                                        • LoadLibraryW.KERNELBASE ref: 10001BCE
                                        • GetProcAddress.KERNEL32(00000000,1001B100), ref: 10001BDE
                                        • VirtualProtect.KERNELBASE(00000000,00000008,00000040,?), ref: 10001BF4
                                        • VirtualProtect.KERNELBASE(00000000,00000008,?,?), ref: 10001C13
                                        • LoadLibraryA.KERNEL32 ref: 10001C33
                                        • GetProcAddress.KERNEL32(00000000,1001B118), ref: 10001C43
                                        • VirtualProtect.KERNELBASE(00000000,00000004,00000040,?), ref: 10001C59
                                        • VirtualProtect.KERNELBASE(00000000,00000004,?,?), ref: 10001C71
                                        • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 10001C9B
                                        • SafeArrayLock.OLEAUT32(00000000), ref: 10001CA6
                                        • SafeArrayUnlock.OLEAUT32(?), ref: 10001CBE
                                        • SysAllocString.OLEAUT32(1001B164), ref: 10001DC7
                                        • SafeArrayCreateVector.OLEAUT32 ref: 10001E31
                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 10001E44
                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 10001E7C
                                        • SysFreeString.OLEAUT32(-00000001), ref: 10001EB6
                                        • SysFreeString.OLEAUT32(-00000001), ref: 10001F75
                                        • SysFreeString.OLEAUT32(-00000001), ref: 10001FC6
                                        • _com_issue_error.COMSUPP ref: 1000201B
                                        • _com_issue_error.COMSUPP ref: 10002025
                                        • _com_issue_error.COMSUPP ref: 10002034
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ArraySafeString$ProtectVirtual$AddressFreeLibraryLoadProc_com_issue_error$ConvertCreate_com_util::$AllocCountDestroyElementLockTickUnlockVector
                                        • String ID: AMS=1$ETW=1$NTD=1
                                        • API String ID: 3002600872-336627247
                                        • Opcode ID: 796f0c940004429549ae6eb8774842e5ee17541114cfd9917d7b9634fe2cf08c
                                        • Instruction ID: a88584ebe180a9ddfa3272c619c8da86773b389a682b864c7f3e6777108a4b31
                                        • Opcode Fuzzy Hash: 796f0c940004429549ae6eb8774842e5ee17541114cfd9917d7b9634fe2cf08c
                                        • Instruction Fuzzy Hash: 59226770604302AFE740DF64C848BABB7E8EF85794F01492CF985DB299DB71E945CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?), ref: 100016F7
                                        • GetModuleHandleA.KERNEL32(1001B0AC), ref: 10001715
                                        • K32GetModuleInformation.KERNEL32(00000000,00000000,?,0000000C), ref: 10001734
                                        • CreateFileA.KERNELBASE(1001B0B8,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10001762
                                        • CreateFileMappingW.KERNELBASE(00000000,00000000,01000002,00000000,00000000,00000000), ref: 10001787
                                        • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000), ref: 100017A7
                                        • VirtualProtect.KERNELBASE(?,00000001,00000040,00000000), ref: 1000183D
                                        • VirtualProtect.KERNELBASE(?,00000001,00000000,00000000), ref: 10001897
                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 100018C6
                                        • FreeLibrary.KERNEL32(?), ref: 100018D5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File$CreateModuleProtectVirtual$ChangeCloseCurrentFindFreeHandleInformationLibraryMappingNotificationProcessView
                                        • String ID: .text
                                        • API String ID: 4217089541-2719751843
                                        • Opcode ID: 42bf4af3205321ef4fb61f54ca1fbf8812ee01829e6fef69a317e5cde49720a9
                                        • Instruction ID: 8e62270a08096e1423786b4b358ede1b0600daedc61b6570581ace5ccf4b68c9
                                        • Opcode Fuzzy Hash: 42bf4af3205321ef4fb61f54ca1fbf8812ee01829e6fef69a317e5cde49720a9
                                        • Instruction Fuzzy Hash: 9F519CB1D01259EBEB20CFA8CD45BEEBBB5EF05760F208259E920B72D0C7716A05DB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 613 111296-1112a2 615 1112a4 613->615 616 1112b8-1112c5 613->616 617 1112a8-1112b1 615->617 619 1112c7-1112d0 616->619 620 1112db-1112fb malloc 616->620 617->616 621 1112b3-1112b6 617->621 622 1112d6 619->622 623 1113b8-1113bc 619->623 624 111301-11130d 620->624 625 111483 620->625 621->616 621->617 622->620 623->622 626 111310-111344 strlen malloc memcpy 624->626 628 11148b-1114a0 exit 625->628 626->626 627 111346-111393 call 111900 call 111617 626->627 627->628 633 111399-1113a1 627->633 634 1113a7-1113b2 633->634 635 111448-11145d _cexit 633->635
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$memcpystrlen
                                        • String ID:
                                        • API String ID: 3553820921-0
                                        • Opcode ID: 975b66eac4cee8f2ecd7a7a1cbb1c06b761dce2c101cf0fdbc2d70f654957b19
                                        • Instruction ID: d3c23630670be1a7e0b46be245b690cafad206c113d7baf98b7e82f162c974eb
                                        • Opcode Fuzzy Hash: 975b66eac4cee8f2ecd7a7a1cbb1c06b761dce2c101cf0fdbc2d70f654957b19
                                        • Instruction Fuzzy Hash: D33123B5A047058FCB18DFA8E9807D9BBF1FB48300F148929EA8897711E735A985CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 636 1113b3-1113bc malloc 640 111301-11130d 636->640 641 111483 636->641 642 111310-111344 strlen malloc memcpy 640->642 644 11148b-1114a0 exit 641->644 642->642 643 111346-111393 call 111900 call 111617 642->643 643->644 649 111399-1113a1 643->649 650 1113a7-1113b2 649->650 651 111448-11145d _cexit 649->651
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: malloc$memcpystrlen
                                        • String ID:
                                        • API String ID: 3553820921-0
                                        • Opcode ID: b68e6561ee54b2dce608f785c255de36e88b039e9113446ac1a8d05fd9b5e075
                                        • Instruction ID: 0c4913e44fd868faa2d4fc5b0fdca6d9698188c0542aba65efe88167acabc795
                                        • Opcode Fuzzy Hash: b68e6561ee54b2dce608f785c255de36e88b039e9113446ac1a8d05fd9b5e075
                                        • Instruction Fuzzy Hash: D621F3B5E04705CFCB18DF69E9806DDBBF1FB48300B158929EA4897711E734A995CF41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 652 1000680a-1000681d 653 10006837-10006839 652->653 654 1000683b-10006841 call 100079c8 653->654 655 1000681f-10006821 653->655 660 10006846-1000684c 654->660 656 10006823 655->656 657 10006824-10006826 655->657 656->657 659 10006829-1000682e 657->659 659->659 663 10006830-10006835 659->663 661 100068bc 660->661 662 1000684e-10006851 660->662 665 100068be-100068cc call 10007a25 661->665 664 100068a5-100068a9 662->664 663->653 667 10006853-10006855 664->667 668 100068ab 664->668 669 10006858-1000685d 667->669 668->665 669->669 671 1000685f-1000686a 669->671 672 100068a3 671->672 673 1000686c-1000687a call 100079c8 671->673 672->664 676 1000687c-1000688b call 10006f4a 673->676 677 100068ad-100068bb call 100068da call 10007a25 673->677 683 100068cd-100068d9 call 10005ef4 676->683 684 1000688d-100068a2 call 10007a25 676->684 677->661 684->672
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free
                                        • String ID:
                                        • API String ID: 269201875-0
                                        • Opcode ID: ec447606e695ca8d96ccb00ee95fe3c6875b47692bb4ece1ee0a099ee9ca4aae
                                        • Instruction ID: 86aff7daed6e6ca4daf406932b390ddcfa11c581d2506e93413d5501b65b1ad9
                                        • Opcode Fuzzy Hash: ec447606e695ca8d96ccb00ee95fe3c6875b47692bb4ece1ee0a099ee9ca4aae
                                        • Instruction Fuzzy Hash: 87217D7AA081515BFF04CE789C51BED3BE7DF8A2D0F3482ADE9849B24ADD225D078350
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 690 111617-1116e1 call 111900 call 1115c0 call 1116f9 697 1116e6-1116f7 Sleep 690->697 697->697
                                        APIs
                                          • Part of subcall function 001116F9: exit.MSVCRT ref: 00111713
                                          • Part of subcall function 001116F9: exit.MSVCRT ref: 00111748
                                          • Part of subcall function 001116F9: VirtualAllocEx.KERNELBASE ref: 00111778
                                          • Part of subcall function 001116F9: exit.MSVCRT ref: 0011178D
                                          • Part of subcall function 001116F9: VirtualProtect.KERNELBASE ref: 001117B4
                                          • Part of subcall function 001116F9: WriteProcessMemory.KERNELBASE ref: 001117F0
                                          • Part of subcall function 001116F9: exit.MSVCRT ref: 00111800
                                          • Part of subcall function 001116F9: CreateRemoteThread.KERNELBASE ref: 0011183F
                                        • Sleep.KERNELBASE ref: 001116F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: exit$Virtual$AllocCreateMemoryProcessProtectRemoteSleepThreadWrite
                                        • String ID: D$random_alphanum_key_goes_here
                                        • API String ID: 1304627603-2824002523
                                        • Opcode ID: 7669200c34e53b750834db85ec7a4b58797ec4d127b36fdf452e02e93a529f8d
                                        • Instruction ID: c0608ebfaa5494837f18a2e6f72cf59bf7a5184d176621b602919cbe6e36739f
                                        • Opcode Fuzzy Hash: 7669200c34e53b750834db85ec7a4b58797ec4d127b36fdf452e02e93a529f8d
                                        • Instruction Fuzzy Hash: 072103B08047489BDB14DFA8C9157CEFBF2AF40704F10852CE5586B385D7BA5548CF96
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 698 19b0518-19b0533 699 19b0541-19b0545 698->699 700 19b0535-19b0539 698->700 701 19b054b-19b0558 699->701 702 19b0646-19b06c9 GetConsoleWindow 699->702 700->702 703 19b053f 700->703 704 19b055a-19b0564 701->704 705 19b0566 701->705 712 19b06cb-19b06d1 702->712 713 19b06d2-19b06e6 702->713 703->701 706 19b056b-19b056d 704->706 705->706 708 19b056f-19b05c3 706->708 709 19b05ce-19b0608 call 19b00ec call 19b00f8 call 19b0798 706->709 708->709 734 19b05c5-19b05cb 708->734 737 19b0608 call 19b0a39 709->737 738 19b0608 call 19b0812 709->738 739 19b0608 call 19b08b5 709->739 712->713 728 19b060e-19b0643 call 19b0104 call 19b0110 737->728 738->728 739->728
                                        APIs
                                        • GetConsoleWindow.KERNELBASE ref: 019B06BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4530281687.00000000019B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_19b0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ConsoleWindow
                                        • String ID: `
                                        • API String ID: 2863861424-1850852036
                                        • Opcode ID: 11ffd541cf12d9634cc3ea37d547b3d6402bc8d42561b3df42634b6626beef96
                                        • Instruction ID: 8b842c520f3e435dd0196d40d4bd623efa086123b3cdb4dff1adc192a4e6779c
                                        • Opcode Fuzzy Hash: 11ffd541cf12d9634cc3ea37d547b3d6402bc8d42561b3df42634b6626beef96
                                        • Instruction Fuzzy Hash: 20419B71A00349CFDB24EFB9C5847EFBBF5AF88320F14842AE559A7240DB749985CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 741 100093ff-10009404 742 10009406-1000941e 741->742 743 10009420-10009424 742->743 744 1000942c-10009435 742->744 743->744 745 10009426-1000942a 743->745 746 10009447 744->746 747 10009437-1000943a 744->747 748 100094a5-100094a9 745->748 751 10009449-10009456 GetStdHandle 746->751 749 10009443-10009445 747->749 750 1000943c-10009441 747->750 748->742 754 100094af-100094b2 748->754 749->751 750->751 752 10009465 751->752 753 10009458-1000945a 751->753 756 10009467-10009469 752->756 753->752 755 1000945c-10009463 GetFileType 753->755 755->756 757 10009487-10009499 756->757 758 1000946b-10009474 756->758 757->748 761 1000949b-1000949e 757->761 759 10009476-1000947a 758->759 760 1000947c-1000947f 758->760 759->748 760->748 762 10009481-10009485 760->762 761->748 762->748
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 1000944B
                                        • GetFileType.KERNELBASE(00000000), ref: 1000945D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileHandleType
                                        • String ID:
                                        • API String ID: 3000768030-0
                                        • Opcode ID: fe743e4cd4d0bfc2eab60b12901d57e57474cc234274226526fb3892d2712727
                                        • Instruction ID: 599f08d5d62ceb4f41e51a86a7d9fdfc7cf1020932d14e2e860ee6c368c4bdcb
                                        • Opcode Fuzzy Hash: fe743e4cd4d0bfc2eab60b12901d57e57474cc234274226526fb3892d2712727
                                        • Instruction Fuzzy Hash: 5D11847150475146F770CE3E8D88E1ABAD4EB862F0B350719E4BA865F9C730D987D642
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 763 10009bca-10009bd5 764 10009bd7-10009bdc 763->764 765 10009bde-10009be0 763->765 766 10009be4 764->766 767 10009be2 765->767 768 10009be9-10009bec call 100079c8 765->768 766->768 767->766 770 10009bf1-10009c07 call 10007a25 768->770 773 10009c34-10009c37 770->773 774 10009c09-10009c2d call 100079c8 call 10007a25 770->774 776 10009c3c-10009c6f call 100091f4 773->776 774->773 786 10009c2f-10009c33 774->786 781 10009c71-10009c74 776->781 782 10009c7a 776->782 781->782 784 10009c76-10009c78 781->784 785 10009c81-10009c8b 782->785 784->782 784->785 785->776 787 10009c8d-10009c91 785->787
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free
                                        • String ID:
                                        • API String ID: 269201875-0
                                        • Opcode ID: cfb8fedcac5938e8f4ff3ef7597f04156b739f37f1d23cb70cec12d20cd620f4
                                        • Instruction ID: 9c7e522ad82f1947b556e6bfb0f7e1dafed128a7bbca0a0392cbc25c6116c220
                                        • Opcode Fuzzy Hash: cfb8fedcac5938e8f4ff3ef7597f04156b739f37f1d23cb70cec12d20cd620f4
                                        • Instruction Fuzzy Hash: 2211D0B1E012A15AF710DB38AC49B4A32D4F7417B0F04462AF924CB2E8D778EE428681
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,10001989,?,00000000,00000000,?,10003470,1001BC30,000000FE,?,10001989), ref: 100030DF
                                        • SysAllocString.OLEAUT32(00000000), ref: 100030EA
                                          • Part of subcall function 10006F2F: _free.LIBCMT ref: 10006F42
                                        • _com_issue_error.COMSUPP ref: 10003151
                                        • GetLastError.KERNEL32(8007000E,00000000,?,00000000,?,10003470,1001BC30,000000FE,?,10001989,1001B128,00000000), ref: 10003167
                                        • _com_issue_error.COMSUPP ref: 1000317A
                                        • _com_issue_error.COMSUPP ref: 10003184
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _com_issue_error$AllocByteCharErrorLastMultiStringWide_free
                                        • String ID:
                                        • API String ID: 182792476-0
                                        • Opcode ID: 706c3d890bde40cba28a937b679b14c5cd5aeb1eacbf683a0ec964cfe89feaa0
                                        • Instruction ID: 5b5ead60a7a82bb866404b811c20f2e458fdc686d5468b7aca27ff9607166220
                                        • Opcode Fuzzy Hash: 706c3d890bde40cba28a937b679b14c5cd5aeb1eacbf683a0ec964cfe89feaa0
                                        • Instruction Fuzzy Hash: F3018172F052289BEB11CF94DC81BEFBBB8EF4D7A0F004129ED0667295D770695086A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002A0F
                                          • Part of subcall function 10003357: RaiseException.KERNEL32(?,?,?,10002A31,?,?,?,?,?,?,?,?,10002A31,0000000C,1001BBF4,0000000C), ref: 100033B7
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002A2C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Exception@8Throw$ExceptionRaise
                                        • String ID:
                                        • API String ID: 3476068407-0
                                        • Opcode ID: 313425be139a5b0a71f0e29b9f9b5fc8c3fb65275ad68924b044c5295fb65c5d
                                        • Instruction ID: e8b066543e31c011d0eb4079a1d9dae6daeeaedf8c7b9d5cb8c0ddbcd33891b2
                                        • Opcode Fuzzy Hash: 313425be139a5b0a71f0e29b9f9b5fc8c3fb65275ad68924b044c5295fb65c5d
                                        • Instruction Fuzzy Hash: D2F0B43880460E76EB10E6A4EC46D9E336CDF001D0F608130BE24A549AEF70F6598591
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 10008E0D: GetEnvironmentStringsW.KERNEL32 ref: 10008E16
                                          • Part of subcall function 10008E0D: _free.LIBCMT ref: 10008E75
                                          • Part of subcall function 10008E0D: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 10008E84
                                        • _free.LIBCMT ref: 100067F8
                                        • _free.LIBCMT ref: 100067FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$EnvironmentStrings$Free
                                        • String ID:
                                        • API String ID: 2490078468-0
                                        • Opcode ID: 27e7eb453691b214d2c45e92c14406a9259c1be68b0e89b864539f49905c338c
                                        • Instruction ID: 1b9df0ae2e8b24c1afa660b60c04bfb52ef19de7b96dc652cb42042ec6c5e8b8
                                        • Opcode Fuzzy Hash: 27e7eb453691b214d2c45e92c14406a9259c1be68b0e89b864539f49905c338c
                                        • Instruction Fuzzy Hash: A4E0E527A0955205F361F73D5D8165D1292EBC52F9B35036BE8288A0CBDEB888430252
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 100018C6
                                        • FreeLibrary.KERNEL32(?), ref: 100018D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ChangeCloseFindFreeLibraryNotification
                                        • String ID:
                                        • API String ID: 1131986616-0
                                        • Opcode ID: 16f8e41eb7a6581f6bf482029c550dc52cfba40eb3e37f85145dee9d4e48e252
                                        • Instruction ID: 81794de365c880ce6e281f49ed0d5a1814d96401d2491949040feac5c492e9f7
                                        • Opcode Fuzzy Hash: 16f8e41eb7a6581f6bf482029c550dc52cfba40eb3e37f85145dee9d4e48e252
                                        • Instruction Fuzzy Hash: 9AE0B636D05128ABCF219F95EC4459CBF71FF442B1F10426AE818626A0CB321911EE80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetConsoleWindow.KERNELBASE ref: 019B06BC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4530281687.00000000019B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_19b0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ConsoleWindow
                                        • String ID:
                                        • API String ID: 2863861424-0
                                        • Opcode ID: 327da096ea73ca320297a0a107fb5585ac11044164c1f3375c415ada69cabe23
                                        • Instruction ID: d21ac567d113ee98c90796bdcc084094e79c045a8f40a13769fb4659749557a1
                                        • Opcode Fuzzy Hash: 327da096ea73ca320297a0a107fb5585ac11044164c1f3375c415ada69cabe23
                                        • Instruction Fuzzy Hash: 6B11FEB4800749CFDB20DF9AD585BDFBBF4EB48314F208459E519A7250C374A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,0000000C,00000000), ref: 10007A09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: bc1d1882f14aebed3f32e3673b590dbead7f911c5d3af9cb7dc9f39c0c15561b
                                        • Instruction ID: b45e33db619aa289bf55cbc080619a37e35f9bb6da0b9b0b382c7deb5700d25c
                                        • Opcode Fuzzy Hash: bc1d1882f14aebed3f32e3673b590dbead7f911c5d3af9cb7dc9f39c0c15561b
                                        • Instruction Fuzzy Hash: 6BF0B431F0412566FB51CA258C09B5F3798FFC37E0B118421EC0DA6199DA38EE1082E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,?), ref: 1000797B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 31d65b063271c2cc98795dfbe44263e87d1d95b4a8e39afae6e89f402eec65db
                                        • Instruction ID: 35a64d0d1ad1f75ade16a5bf0291917dc1a3227cb118155a425d993cb714a548
                                        • Opcode Fuzzy Hash: 31d65b063271c2cc98795dfbe44263e87d1d95b4a8e39afae6e89f402eec65db
                                        • Instruction Fuzzy Hash: 68E06D35A2466266FA62D7A58C04B6B7698FF422F1F224220ED4D96598CF69DC0082A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4529098781.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_138d000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a22db52e6cad8702627119dc6356afef606b3bec8c49798b4045c016a062f71c
                                        • Instruction ID: e325f60c8761382b1b9246d8818a123ebf4da7c67cb04d9befbf83c59e31bcbc
                                        • Opcode Fuzzy Hash: a22db52e6cad8702627119dc6356afef606b3bec8c49798b4045c016a062f71c
                                        • Instruction Fuzzy Hash: B8212572500308EFDB05EF54D9C0B26BF65FB8832CF64856DE90D0B296C336D456CAA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4529098781.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_138d000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                        • Instruction ID: 61cf3f757c38fe476d48be7951fa9647adc434efac35016c09af2df0941c556e
                                        • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                        • Instruction Fuzzy Hash: 2311B176504344DFCB16DF54D9C4B16BF71FB84328F2485A9D8090B257C33AD45ACBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4529098781.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_138d000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 629816ac3e6e6520b30b273ad2264d99fd0437c7c0e076cffbfeb41c535cf9dd
                                        • Instruction ID: 449db23f10ba7616ec35c5b09b693d8280c36dc883775e530ae78c24b693e2c3
                                        • Opcode Fuzzy Hash: 629816ac3e6e6520b30b273ad2264d99fd0437c7c0e076cffbfeb41c535cf9dd
                                        • Instruction Fuzzy Hash: 09012BB1004348EAE7106F69DC80B67FF9CEF417A8F08C419ED090F6C6C2799846C6B2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4529098781.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_138d000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 614f779f7cb202a6ad6f41c0ccf2757d8ed4a1237730f95e79c6939b789d4e37
                                        • Instruction ID: 3c57a66091ddde0fad4d07e6355a885ea5b18ea4301f8bc29165131944378693
                                        • Opcode Fuzzy Hash: 614f779f7cb202a6ad6f41c0ccf2757d8ed4a1237730f95e79c6939b789d4e37
                                        • Instruction Fuzzy Hash: E4F0C2B1004344AEEB109F19CC84B63FF98EF41768F18C45AED484E286C2799845CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleLibraryLoadModule
                                        • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                                        • API String ID: 384173800-1835852900
                                        • Opcode ID: a9eea7043b3b4a1ae17a9f98d0d31ad3321e1c3d9e295eea419f592c362fdf00
                                        • Instruction ID: 84121d999e4205ff8af33e7ee6e82aedb56df250b3377bf7536d827feed46706
                                        • Opcode Fuzzy Hash: a9eea7043b3b4a1ae17a9f98d0d31ad3321e1c3d9e295eea419f592c362fdf00
                                        • Instruction Fuzzy Hash: 600171B19083049BC3447F78AB4935DFFF5AB45751F02443DE689A7600E7B45488CBA3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 01311656
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 01311681
                                        • StrStrIA.SHLWAPI(?,1001B09C), ref: 01311693
                                        • CreateThread.KERNEL32(00000000,00000000,10001930,?,00000000,00000000), ref: 013116AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Module$CreateFileHandleNameThread
                                        • String ID:
                                        • API String ID: 345888460-0
                                        • Opcode ID: bc22102a787501f48ea84cdce432fbd2a449c4f78da8322cd65b092844ce9337
                                        • Instruction ID: d474c75162cf6c955b5cffbcabdc44368e59c60d246ca7ef3e21c48ffcfe4a41
                                        • Opcode Fuzzy Hash: bc22102a787501f48ea84cdce432fbd2a449c4f78da8322cd65b092844ce9337
                                        • Instruction Fuzzy Hash: 6FF090F6900228BBFB109BB08D89FFB3B6CDB143A4F000054FF04D6085DAB59A808BA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,01312281), ref: 01315E17
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,01312281), ref: 01315E21
                                        • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,01312281), ref: 01315E2E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 1a684d01aa3d340310010d7e553d4f99adc8a98f39119f449de532147956bca4
                                        • Instruction ID: af1789c6db798ae63898f3b99aea87818718e39005966194bc5802cea99fa6fd
                                        • Opcode Fuzzy Hash: 1a684d01aa3d340310010d7e553d4f99adc8a98f39119f449de532147956bca4
                                        • Instruction Fuzzy Hash: 3A31D2749012299BCF25DF68DD887DDBBB8BF08314F5081EAE41CA7254EB709B858F54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 10005E13
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 10005E1D
                                        • UnhandledExceptionFilter.KERNEL32(1001AE00,?,?,?,?,?,00000000), ref: 10005E2A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 66f87eb88c692d446a3337f7b7ec48d5d389140ebfaa16b2e8f1496432da3c17
                                        • Instruction ID: fc5e82cea06a4a99fc7ea00731ad32e7b8d93e39b72e25cea1931271f3ce79ea
                                        • Opcode Fuzzy Hash: 66f87eb88c692d446a3337f7b7ec48d5d389140ebfaa16b2e8f1496432da3c17
                                        • Instruction Fuzzy Hash: 0931C474901228ABDB61DF24DD8978DBBB8FF08351F5041EAE41CA7261EB709B818F44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?,013163A3,?,?,?,?,?,0131111D), ref: 013163C6
                                        • TerminateProcess.KERNEL32(00000000,?,013163A3,?,?,?,?,?,0131111D), ref: 013163CD
                                        • ExitProcess.KERNEL32 ref: 013163DF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: c8e25d0da1505143e5d01438894defa01178ea47247ecff4e357042dbf6ca453
                                        • Instruction ID: 17c23583ab96a2895188f5f0d1ae0f45e526131759353fe1e22c484e447e1efb
                                        • Opcode Fuzzy Hash: c8e25d0da1505143e5d01438894defa01178ea47247ecff4e357042dbf6ca453
                                        • Instruction Fuzzy Hash: 58E08C31000118AFEF162FA8DC49A6D3F6AFB00285F408418F8098653ACBB9DD81DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?,1000639F,1001B130,?,?,1001B130), ref: 100063C2
                                        • TerminateProcess.KERNEL32(00000000,?,1000639F,1001B130,?,?,1001B130), ref: 100063C9
                                        • ExitProcess.KERNEL32 ref: 100063DB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: c8e25d0da1505143e5d01438894defa01178ea47247ecff4e357042dbf6ca453
                                        • Instruction ID: d28d41af693122ef4a3fdc208c9b6ec548cec410dbcf845db7b88d7c1263fef1
                                        • Opcode Fuzzy Hash: c8e25d0da1505143e5d01438894defa01178ea47247ecff4e357042dbf6ca453
                                        • Instruction Fuzzy Hash: F9E0B635400158AFEB02AF64CC59A583FAAFF842D1B20941CF9099653ACB35ED92DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0131DBF0,?,?,00000008,?,?,0131D888,00000000), ref: 0131DE22
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: 565050bbb23ac4cc80e4e588e64591540a0f5e0c240284c510e70732ff30bb2c
                                        • Instruction ID: af20dbba6763a62981157966892c3431b8d1d800f1a3f2b824947f33bce3ccba
                                        • Opcode Fuzzy Hash: 565050bbb23ac4cc80e4e588e64591540a0f5e0c240284c510e70732ff30bb2c
                                        • Instruction Fuzzy Hash: F1B15E31210609DFEB19CF6CC48AB647BE0FF46369F258658E99ACF2A5C335E951CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000DBEC,?,?,00000008,?,?,1000D884,00000000), ref: 1000DE1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: 565050bbb23ac4cc80e4e588e64591540a0f5e0c240284c510e70732ff30bb2c
                                        • Instruction ID: d481fbd3fc588cfd4c975a4c04567ca6f41e5e978be349c8cc992988d3df1894
                                        • Opcode Fuzzy Hash: 565050bbb23ac4cc80e4e588e64591540a0f5e0c240284c510e70732ff30bb2c
                                        • Instruction Fuzzy Hash: BFB17C31610609CFE714DF28C486B597BE1FF453A4F25865AE89ACF2A9C335E982CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66d61cea230c33a8d3dfc710698f41e031b458c6bd3fcaeaa2bf3c8758886bf8
                                        • Instruction ID: f3a6d4392b6fdb5377f86e7683b9091ebe511185939d46e6330081a9665133c6
                                        • Opcode Fuzzy Hash: 66d61cea230c33a8d3dfc710698f41e031b458c6bd3fcaeaa2bf3c8758886bf8
                                        • Instruction Fuzzy Hash: 8B4193B5C0421DAFDB24DF6DCC88AAABBB9AF45304F1842DDE41DD3215DA359E848F60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09267a21b81648f1661c6134b1866c23943eef4ef03b71b119c026507b8e51b5
                                        • Instruction ID: 42d0ada291b1fb750969f7353db6fac12aca534de81333c21600c26d88de16c3
                                        • Opcode Fuzzy Hash: 09267a21b81648f1661c6134b1866c23943eef4ef03b71b119c026507b8e51b5
                                        • Instruction Fuzzy Hash: 3341B2B5C0425DAEEB10DF68CC89AAABBB8FF45340F1442E9E44D93205DA359E858F50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: 4aa2f3705dbdff619f11796f64f1a48fd6653a63d3d2bce8c1e7b9126c4ad97b
                                        • Instruction ID: ace803f740e3770d8527394ad06f469c5582c8735380affea44f9bd0810b6bf9
                                        • Opcode Fuzzy Hash: 4aa2f3705dbdff619f11796f64f1a48fd6653a63d3d2bce8c1e7b9126c4ad97b
                                        • Instruction Fuzzy Hash: 79A001706012A1DBE7808FB58A8965D3AA9BA8A7D17058669E445C6A64EB348860AA01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3a6966d67e9b7f41304b287a3a436391084888ed2587b932ee91a9a2a6b0f71
                                        • Instruction ID: 750fe7f7de570d4173e7f48e75ffab854895773ef541da39610b2c30dec2da69
                                        • Opcode Fuzzy Hash: f3a6966d67e9b7f41304b287a3a436391084888ed2587b932ee91a9a2a6b0f71
                                        • Instruction Fuzzy Hash: 1D714470A042C68FFB198F6DD8D06EEBBE6EB5A214F4481BCC65587352C631DA0AC710
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9bb5c1b61b7b98cbc056ea8f67b9a8ca7ef086e949689a6f228cbbfb2ff37ba7
                                        • Instruction ID: ee1a700896fa8527284fbe9d2cdec17d541f1cb94992c217bc716285c416e340
                                        • Opcode Fuzzy Hash: 9bb5c1b61b7b98cbc056ea8f67b9a8ca7ef086e949689a6f228cbbfb2ff37ba7
                                        • Instruction Fuzzy Hash: D531AC76A0874B8FC318DF18C88092AF7E4FF8932CB09496DE99597316D334F9958B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction ID: ce7cc56d8aa869158b5d5159ddfadb30e99a6aa0f8918d23805fdc192ec76cf5
                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction Fuzzy Hash: 83113DBB20414243F6DF8A3ED4B41B7EF97EBC912872D437ADA814B75CD22BE1459600
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction ID: fc051c0c77b7d8f285d5e003e25149b07a31b881b68b3ed896d5cc6226ba84c5
                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction Fuzzy Hash: 8A112B776411C283FAC0C53ED4B45ABE3DAEBC63E1729437FD182AB65CD122ED459600
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                                        • Instruction ID: a430295b2997fb8212f5aaacf516d493cf18ccdfffc1819ddd857fb304484dfb
                                        • Opcode Fuzzy Hash: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                                        • Instruction Fuzzy Hash: 77E08C32A11228EBCF18DB9CC90498EF7ECEB46B08B150096B601E3110C270DE04C7D0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                                        • Instruction ID: fb86bd9e20a4fcbbacb2d46d18a9ba708035e2cf5bc33393a4ad150118a82801
                                        • Opcode Fuzzy Hash: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                                        • Instruction Fuzzy Hash: 5DE0EC72D11228EBCB15DB99C944D8EF3ECFB45A90B114496B505E3115C274DE00C7D0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 0131A095
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A38B
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A39D
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A3AF
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A3C1
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A3D3
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A3E5
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A3F7
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A409
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A41B
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A42D
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A43F
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A451
                                          • Part of subcall function 0131A36E: _free.LIBCMT ref: 0131A463
                                        • _free.LIBCMT ref: 0131A08A
                                          • Part of subcall function 01317A29: HeapFree.KERNEL32(00000000,00000000,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?), ref: 01317A3F
                                          • Part of subcall function 01317A29: GetLastError.KERNEL32(?,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?,?), ref: 01317A51
                                        • _free.LIBCMT ref: 0131A0AC
                                        • _free.LIBCMT ref: 0131A0C1
                                        • _free.LIBCMT ref: 0131A0CC
                                        • _free.LIBCMT ref: 0131A0EE
                                        • _free.LIBCMT ref: 0131A101
                                        • _free.LIBCMT ref: 0131A10F
                                        • _free.LIBCMT ref: 0131A11A
                                        • _free.LIBCMT ref: 0131A152
                                        • _free.LIBCMT ref: 0131A159
                                        • _free.LIBCMT ref: 0131A176
                                        • _free.LIBCMT ref: 0131A18E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: e26546ba47295e784be89e24f599072f55e8abfdf4db8aba69f7d24a67a8c275
                                        • Instruction ID: 06cfd78570e04cf57e7fac6662f876a22c91d919c46ebe683610c7943824271d
                                        • Opcode Fuzzy Hash: e26546ba47295e784be89e24f599072f55e8abfdf4db8aba69f7d24a67a8c275
                                        • Instruction Fuzzy Hash: 5F31A3326013429FFB29AABCDC44B9B77E9EF04799F144429E449E7258DF71E990C720
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 1000A091
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A387
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A399
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A3AB
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A3BD
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A3CF
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A3E1
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A3F3
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A405
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A417
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A429
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A43B
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A44D
                                          • Part of subcall function 1000A36A: _free.LIBCMT ref: 1000A45F
                                        • _free.LIBCMT ref: 1000A086
                                          • Part of subcall function 10007A25: HeapFree.KERNEL32(00000000,00000000,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?), ref: 10007A3B
                                          • Part of subcall function 10007A25: GetLastError.KERNEL32(?,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?,?), ref: 10007A4D
                                        • _free.LIBCMT ref: 1000A0A8
                                        • _free.LIBCMT ref: 1000A0BD
                                        • _free.LIBCMT ref: 1000A0C8
                                        • _free.LIBCMT ref: 1000A0EA
                                        • _free.LIBCMT ref: 1000A0FD
                                        • _free.LIBCMT ref: 1000A10B
                                        • _free.LIBCMT ref: 1000A116
                                        • _free.LIBCMT ref: 1000A14E
                                        • _free.LIBCMT ref: 1000A155
                                        • _free.LIBCMT ref: 1000A172
                                        • _free.LIBCMT ref: 1000A18A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: e26546ba47295e784be89e24f599072f55e8abfdf4db8aba69f7d24a67a8c275
                                        • Instruction ID: 23f9c27e7aae87b4a5cbaa185397e73bf3ee55d7d924a4122350e88dda3bc3c2
                                        • Opcode Fuzzy Hash: e26546ba47295e784be89e24f599072f55e8abfdf4db8aba69f7d24a67a8c275
                                        • Instruction Fuzzy Hash: 73316931A007059FFB21DA38D805B8A73E9FB823D0F114659E449D719AEF35BDD18621
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 013116FB
                                        • GetModuleHandleA.KERNEL32(1001B0AC), ref: 01311719
                                        • K32GetModuleInformation.KERNEL32(00000000,00000000,?,0000000C), ref: 01311738
                                        • CreateFileA.KERNEL32(1001B0B8,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01311766
                                        • CreateFileMappingW.KERNEL32(00000000,00000000,01000002,00000000,00000000,00000000), ref: 0131178B
                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 013117AB
                                        • VirtualProtect.KERNEL32(?,?,00000040,?), ref: 01311841
                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 0131189B
                                        • FreeLibrary.KERNEL32(?), ref: 013118D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File$CreateModuleProtectVirtual$CurrentFreeHandleInformationLibraryMappingProcessView
                                        • String ID: .text
                                        • API String ID: 630715071-2719751843
                                        • Opcode ID: 42bf4af3205321ef4fb61f54ca1fbf8812ee01829e6fef69a317e5cde49720a9
                                        • Instruction ID: 253fded2439e2e9ee08806d15312ebac30817e9150b829de3e5e32ad47ff37a7
                                        • Opcode Fuzzy Hash: 42bf4af3205321ef4fb61f54ca1fbf8812ee01829e6fef69a317e5cde49720a9
                                        • Instruction Fuzzy Hash: 975168B1D01219EBEB21CFA8CD45BEEBFB5EF05724F208249EA24B72D0C7715A059B50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • Address %p has no image-section, xrefs: 00111C6B
                                        • VirtualProtect failed with code 0x%x, xrefs: 00111C26
                                        • Mingw-w64 runtime failure:, xrefs: 00111AE8
                                        • VirtualQuery failed for %d bytes at address %p, xrefs: 00111C57
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: QueryVirtualabortfwritevfprintf
                                        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                        • API String ID: 2513968241-1534286854
                                        • Opcode ID: 641f6bfa8b5dc898c443a64c0527c251d48452a80522cb6d977c6d9a81709e3c
                                        • Instruction ID: 68c39d40279de78a4d800b2eea39a39653129954668c5a41cf172ee56776baf9
                                        • Opcode Fuzzy Hash: 641f6bfa8b5dc898c443a64c0527c251d48452a80522cb6d977c6d9a81709e3c
                                        • Instruction Fuzzy Hash: 745161B19087009FC718EF29D98579AFBF0FF84354F45892CE6989B211E734E885CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 01317433
                                          • Part of subcall function 01317A29: HeapFree.KERNEL32(00000000,00000000,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?), ref: 01317A3F
                                          • Part of subcall function 01317A29: GetLastError.KERNEL32(?,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?,?), ref: 01317A51
                                        • _free.LIBCMT ref: 0131743F
                                        • _free.LIBCMT ref: 0131744A
                                        • _free.LIBCMT ref: 01317455
                                        • _free.LIBCMT ref: 01317460
                                        • _free.LIBCMT ref: 0131746B
                                        • _free.LIBCMT ref: 01317476
                                        • _free.LIBCMT ref: 01317481
                                        • _free.LIBCMT ref: 0131748C
                                        • _free.LIBCMT ref: 0131749A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 444e1461b92e8379c93735419ce03fb5bf1cdfdc2681cae070e80e97769a2938
                                        • Instruction ID: f76b1b8706669b49c2ebfe86b38182c742c3ecb96076080fa093755c98c34ab8
                                        • Opcode Fuzzy Hash: 444e1461b92e8379c93735419ce03fb5bf1cdfdc2681cae070e80e97769a2938
                                        • Instruction Fuzzy Hash: 0921E77691010AEFDB05EFD9D880CDE7BB8BF18684F0451A6F515AB224DB31EB54CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 1000742F
                                          • Part of subcall function 10007A25: HeapFree.KERNEL32(00000000,00000000,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?), ref: 10007A3B
                                          • Part of subcall function 10007A25: GetLastError.KERNEL32(?,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?,?), ref: 10007A4D
                                        • _free.LIBCMT ref: 1000743B
                                        • _free.LIBCMT ref: 10007446
                                        • _free.LIBCMT ref: 10007451
                                        • _free.LIBCMT ref: 1000745C
                                        • _free.LIBCMT ref: 10007467
                                        • _free.LIBCMT ref: 10007472
                                        • _free.LIBCMT ref: 1000747D
                                        • _free.LIBCMT ref: 10007488
                                        • _free.LIBCMT ref: 10007496
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 444e1461b92e8379c93735419ce03fb5bf1cdfdc2681cae070e80e97769a2938
                                        • Instruction ID: e5657994adc7ed1a2cc246168dd0796c991dd7514e8393f5882922e176fde322
                                        • Opcode Fuzzy Hash: 444e1461b92e8379c93735419ce03fb5bf1cdfdc2681cae070e80e97769a2938
                                        • Instruction Fuzzy Hash: 9821BA7AD10108AFDB41DFA8D881DDE7BB8FF48280F0091A6F5199B126DB35EB55CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: signal
                                        • String ID:
                                        • API String ID: 1946981877-0
                                        • Opcode ID: 743c39f8c13b48142a4904d914197be51146af2c4df5b4b0bf89c19cc4225565
                                        • Instruction ID: eb5a1b44638c410820af8cec604225f5435f48fcd04274b39d8fc25b4a45e223
                                        • Opcode Fuzzy Hash: 743c39f8c13b48142a4904d914197be51146af2c4df5b4b0bf89c19cc4225565
                                        • Instruction Fuzzy Hash: 3A3141B01082049AE72CAF78C5413EE76E0BB59364F214B29F5E4C72D1DB7AC8E59753
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0131A4D5: _free.LIBCMT ref: 0131A4FA
                                        • _free.LIBCMT ref: 0131A55B
                                          • Part of subcall function 01317A29: HeapFree.KERNEL32(00000000,00000000,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?), ref: 01317A3F
                                          • Part of subcall function 01317A29: GetLastError.KERNEL32(?,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?,?), ref: 01317A51
                                        • _free.LIBCMT ref: 0131A566
                                        • _free.LIBCMT ref: 0131A571
                                        • _free.LIBCMT ref: 0131A5C5
                                        • _free.LIBCMT ref: 0131A5D0
                                        • _free.LIBCMT ref: 0131A5DB
                                        • _free.LIBCMT ref: 0131A5E6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 480fce83c62a8c88322a9145a6a51a6461a5144a693670f6f3967c9e7c736e28
                                        • Instruction ID: d692a8aad57a5d1ffe557976180d2c9476af4946bcda4d835e898e46e3207aa5
                                        • Opcode Fuzzy Hash: 480fce83c62a8c88322a9145a6a51a6461a5144a693670f6f3967c9e7c736e28
                                        • Instruction Fuzzy Hash: 3311B132581B4ABAE524FBF8CC09FCB779C9F28715F400814B299B7258DE28B6145681
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 1000A4D1: _free.LIBCMT ref: 1000A4F6
                                        • _free.LIBCMT ref: 1000A557
                                          • Part of subcall function 10007A25: HeapFree.KERNEL32(00000000,00000000,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?), ref: 10007A3B
                                          • Part of subcall function 10007A25: GetLastError.KERNEL32(?,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?,?), ref: 10007A4D
                                        • _free.LIBCMT ref: 1000A562
                                        • _free.LIBCMT ref: 1000A56D
                                        • _free.LIBCMT ref: 1000A5C1
                                        • _free.LIBCMT ref: 1000A5CC
                                        • _free.LIBCMT ref: 1000A5D7
                                        • _free.LIBCMT ref: 1000A5E2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 480fce83c62a8c88322a9145a6a51a6461a5144a693670f6f3967c9e7c736e28
                                        • Instruction ID: 6a08519c30dc542fe6de3a9ca7c5e370eea6b5a1d22980f46e9e482a9f3ecec5
                                        • Opcode Fuzzy Hash: 480fce83c62a8c88322a9145a6a51a6461a5144a693670f6f3967c9e7c736e28
                                        • Instruction Fuzzy Hash: 6A11B139E00B14BAF520E7B4CC0BFCB779CFF86380F404A18B69D66057DAA8B6905641
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 0131B3E8
                                        • __fassign.LIBCMT ref: 0131B5CD
                                        • __fassign.LIBCMT ref: 0131B5EA
                                        • WriteFile.KERNEL32(?,01319A41,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0131B632
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0131B672
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0131B71A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                        • String ID:
                                        • API String ID: 1735259414-0
                                        • Opcode ID: 3130eea70465d9b11516ab5b052090fdbb9f79e2c8e3d351a7d1abefc53ad05a
                                        • Instruction ID: f305d31fb3a0335224cfe1eeef22b142f63d041fa5d99142b6402668bfd4918b
                                        • Opcode Fuzzy Hash: 3130eea70465d9b11516ab5b052090fdbb9f79e2c8e3d351a7d1abefc53ad05a
                                        • Instruction Fuzzy Hash: 87C1BC75D002989FDF19CFA8C8809EDFBB5AF48318F28816AE855F7349D6319906CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 1000B3E4
                                        • __fassign.LIBCMT ref: 1000B5C9
                                        • __fassign.LIBCMT ref: 1000B5E6
                                        • WriteFile.KERNEL32(?,10009A3D,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B62E
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 1000B66E
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B716
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                        • String ID:
                                        • API String ID: 1735259414-0
                                        • Opcode ID: 7a952c2bc6f47714c73ebaa6f2af0fe67482dcd2af05cb134e4b3c42274bbe7f
                                        • Instruction ID: c2b63a17de41499b507ccd561170f38153bb6c8ffa4b1ecf6f2925608295950f
                                        • Opcode Fuzzy Hash: 7a952c2bc6f47714c73ebaa6f2af0fe67482dcd2af05cb134e4b3c42274bbe7f
                                        • Instruction Fuzzy Hash: 1CC19E75D046989FEB11CFE8C8809EDBBB5EF48344F28416AE855BB346D631AD42CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,013133F6,013123BE,013126B1), ref: 01313BA6
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 01313BB4
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01313BCD
                                        • SetLastError.KERNEL32(00000000,?,013133F6,013123BE,013126B1), ref: 01313C1F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 3e83183417763c9cfa2e44375187fee262c99798befa417dc6021065c52d0869
                                        • Instruction ID: 311351a07e010f910abd5d0c11ec774924346ecd936cf5b2886fe4c345b65178
                                        • Opcode Fuzzy Hash: 3e83183417763c9cfa2e44375187fee262c99798befa417dc6021065c52d0869
                                        • Instruction Fuzzy Hash: CB01AC332193326EFA1E7B7D6CC476B2A55FF056BDB20422EF524851E9FF618841A150
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,100033F2,100023BA,100026AD), ref: 10003BA2
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003BB0
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003BC9
                                        • SetLastError.KERNEL32(00000000,?,100033F2,100023BA,100026AD), ref: 10003C1B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 4f03ea6735c2e5eabf14a80d6b60370eeecb975f0264ee0372e0d35928224f4b
                                        • Instruction ID: 7ebccb4347339e10fa964b6b3c71b5ce2705e845a88eeb28b2357f110b4ae066
                                        • Opcode Fuzzy Hash: 4f03ea6735c2e5eabf14a80d6b60370eeecb975f0264ee0372e0d35928224f4b
                                        • Instruction Fuzzy Hash: E001D83A21A6726DF217FB749CC5E1B2B9CFB055F5B30C32AF510910EAEF219C026240
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, xrefs: 0131829A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                        • API String ID: 0-3005402082
                                        • Opcode ID: f5272675ea7994c64460e9d8fde802c34aa565be461d8244888e465bbaeec55a
                                        • Instruction ID: dab773f95a62b8c474fc922c864ea2ea96949e5491725deb1cb1e6780404b341
                                        • Opcode Fuzzy Hash: f5272675ea7994c64460e9d8fde802c34aa565be461d8244888e465bbaeec55a
                                        • Instruction Fuzzy Hash: 8F21263520420ABFDB1AAF798C8096B775DEF5136C7084E54F918D3169E730EC0087A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe, xrefs: 10008296
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                        • API String ID: 0-3005402082
                                        • Opcode ID: f5272675ea7994c64460e9d8fde802c34aa565be461d8244888e465bbaeec55a
                                        • Instruction ID: 5973c44a109389617354e6a105dc31dc08590b48bfdd6b3e0bf862e7db057c6e
                                        • Opcode Fuzzy Hash: f5272675ea7994c64460e9d8fde802c34aa565be461d8244888e465bbaeec55a
                                        • Instruction Fuzzy Hash: 8A21D17520465ABFFB10DF608C8091B77ADFF806E47158A24FAA487159EB31FF408760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 01316AEB
                                        • _free.LIBCMT ref: 01316B0B
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01316B6C
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01316B7E
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01316B8B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __crt_fast_encode_pointer$_free
                                        • String ID:
                                        • API String ID: 366466260-0
                                        • Opcode ID: 9ea0d077f56d082f0244d58ff494a3ce0d5827ad2ecc96ab6cea9f4a433516e2
                                        • Instruction ID: 206821563c1e93771a4dbcac5b1f5fee80a73e1a7abe0bcda3a6a08a2055f285
                                        • Opcode Fuzzy Hash: 9ea0d077f56d082f0244d58ff494a3ce0d5827ad2ecc96ab6cea9f4a433516e2
                                        • Instruction Fuzzy Hash: 2541D5B2A002149FDB18DFADC881A5EB7F6EF88718F1584A8D615EB345D771ED02CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 10006AE7
                                        • _free.LIBCMT ref: 10006B07
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10006B68
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10006B7A
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10006B87
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __crt_fast_encode_pointer$_free
                                        • String ID:
                                        • API String ID: 366466260-0
                                        • Opcode ID: 9ea0d077f56d082f0244d58ff494a3ce0d5827ad2ecc96ab6cea9f4a433516e2
                                        • Instruction ID: a71a9c86dbed923a9ac41e3d201ccc45f352d777cfe71cce0c5d600494963926
                                        • Opcode Fuzzy Hash: 9ea0d077f56d082f0244d58ff494a3ce0d5827ad2ecc96ab6cea9f4a433516e2
                                        • Instruction Fuzzy Hash: 4341B676B002109BEB10DFA8C881A5DB3F6EF89794B264469D645EB345D730ED41CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 0131A484
                                          • Part of subcall function 01317A29: HeapFree.KERNEL32(00000000,00000000,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?), ref: 01317A3F
                                          • Part of subcall function 01317A29: GetLastError.KERNEL32(?,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?,?), ref: 01317A51
                                        • _free.LIBCMT ref: 0131A496
                                        • _free.LIBCMT ref: 0131A4A8
                                        • _free.LIBCMT ref: 0131A4BA
                                        • _free.LIBCMT ref: 0131A4CC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: f04bf57bb100680fa17d3bcd6f03363407a82ab894c155684a2f6d4914dcf5fa
                                        • Instruction ID: 2fd176f06ba8e1312a1ed90ddf27b99da879c593d9e81af70bed606bd2c70817
                                        • Opcode Fuzzy Hash: f04bf57bb100680fa17d3bcd6f03363407a82ab894c155684a2f6d4914dcf5fa
                                        • Instruction Fuzzy Hash: 04F0AF33129221ABE228FB9CE8C5C463BD9FA047683599806F108E7688CA30FC904A14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 1000A480
                                          • Part of subcall function 10007A25: HeapFree.KERNEL32(00000000,00000000,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?), ref: 10007A3B
                                          • Part of subcall function 10007A25: GetLastError.KERNEL32(?,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?,?), ref: 10007A4D
                                        • _free.LIBCMT ref: 1000A492
                                        • _free.LIBCMT ref: 1000A4A4
                                        • _free.LIBCMT ref: 1000A4B6
                                        • _free.LIBCMT ref: 1000A4C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: f04bf57bb100680fa17d3bcd6f03363407a82ab894c155684a2f6d4914dcf5fa
                                        • Instruction ID: 1168c823901e5db6dccbd42ca0d523f263c89a7ead570df68ec67f5f204cb02c
                                        • Opcode Fuzzy Hash: f04bf57bb100680fa17d3bcd6f03363407a82ab894c155684a2f6d4914dcf5fa
                                        • Instruction Fuzzy Hash: D6F04F35A182109BE690FB68E4C6C4A73F9FBC22E0350990AF00CD7589DB78FCC18660
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        • Unknown pseudo relocation bit size %d., xrefs: 00111D9E
                                        • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00111EA6
                                        • Unknown pseudo relocation protocol version %d., xrefs: 00111F5B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                        • API String ID: 0-1286557213
                                        • Opcode ID: 921d0947ba6dce7dae181637425a0a93554daf16c77189793c14bee657f12455
                                        • Instruction ID: fdaaea0af68e1a03d7bac672c2ffd7c7545edb6919ab18f04f6b21f5ab51851d
                                        • Opcode Fuzzy Hash: 921d0947ba6dce7dae181637425a0a93554daf16c77189793c14bee657f12455
                                        • Instruction Fuzzy Hash: 5091A171A046159BCB18DF68E9806EEFBF2FF88380F154529EE94A7354D330E885CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free
                                        • String ID: *?
                                        • API String ID: 269201875-2564092906
                                        • Opcode ID: a379ad0498d1bfa82fc73f87a6b09752013568341b8b413912cc90409a7bb23a
                                        • Instruction ID: 2bcb0ff05a985baaa00a994f8bcb2d9a684647a5164caaeab96e6c1c6c4f4ee3
                                        • Opcode Fuzzy Hash: a379ad0498d1bfa82fc73f87a6b09752013568341b8b413912cc90409a7bb23a
                                        • Instruction Fuzzy Hash: 4B612AB6E0021A9FDF19DFACC8805EDFBF5EF48354B28816AD815E7344D631AE418B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free
                                        • String ID: *?
                                        • API String ID: 269201875-2564092906
                                        • Opcode ID: a379ad0498d1bfa82fc73f87a6b09752013568341b8b413912cc90409a7bb23a
                                        • Instruction ID: 75d766dfcdc14df3a16d4d30c49d252bd365b8258aa7062e43023e3f720f993f
                                        • Opcode Fuzzy Hash: a379ad0498d1bfa82fc73f87a6b09752013568341b8b413912cc90409a7bb23a
                                        • Instruction Fuzzy Hash: 32614275D0021A9FEB14CFA8C8819EDFBF5FF48390B25816AE819E7344D775AE418B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0131814F: _free.LIBCMT ref: 0131815D
                                          • Part of subcall function 01318D23: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,01319A41,0131BD28,0000FDE9,00000000,?,?,?,0131BAA1,0000FDE9,00000000,?), ref: 01318DCF
                                        • GetLastError.KERNEL32 ref: 01317B95
                                        • __dosmaperr.LIBCMT ref: 01317B9C
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 01317BDB
                                        • __dosmaperr.LIBCMT ref: 01317BE2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                        • String ID:
                                        • API String ID: 167067550-0
                                        • Opcode ID: 2d13615152cd7a3aab0b518301b32f107b15c398a867bcdfab5a46094f6214a7
                                        • Instruction ID: f9cad1a35e177293875f63f7d529f3a515411a2eff9ca3dbbcfe4e2b47406ebb
                                        • Opcode Fuzzy Hash: 2d13615152cd7a3aab0b518301b32f107b15c398a867bcdfab5a46094f6214a7
                                        • Instruction Fuzzy Hash: 4A21F87160021AAFDB299FAD8C80C7BB79DFF5526C714C528FA2993554D730EC018750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 1000814B: _free.LIBCMT ref: 10008159
                                          • Part of subcall function 10008D1F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,10009A3D,1000BD24,0000FDE9,00000000,?,?,?,1000BA9D,0000FDE9,00000000,?), ref: 10008DCB
                                        • GetLastError.KERNEL32 ref: 10007B91
                                        • __dosmaperr.LIBCMT ref: 10007B98
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10007BD7
                                        • __dosmaperr.LIBCMT ref: 10007BDE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                        • String ID:
                                        • API String ID: 167067550-0
                                        • Opcode ID: 2d13615152cd7a3aab0b518301b32f107b15c398a867bcdfab5a46094f6214a7
                                        • Instruction ID: 8a0ea04460a933745a492a533750d66dc63a6fe5784d0a96b6a1d7f0933c2854
                                        • Opcode Fuzzy Hash: 2d13615152cd7a3aab0b518301b32f107b15c398a867bcdfab5a46094f6214a7
                                        • Instruction Fuzzy Hash: BD21D375A0425AAFFB10DF658C80E5BB7EEFF002E43108128F95C87149EB39ED0187A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b149e3b77e4d7fa048a852574249fba67e2eca2367cb74996d17989fa0385528
                                        • Instruction ID: e648fbd354f8fd63d5873379ead900ad76e55137243e34b7deb194b8b8591a0a
                                        • Opcode Fuzzy Hash: b149e3b77e4d7fa048a852574249fba67e2eca2367cb74996d17989fa0385528
                                        • Instruction Fuzzy Hash: 33212B32A05231EBE726CB6C9C80B2B3759AF007ACF150254EB06A7699D770DD08C6E4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b149e3b77e4d7fa048a852574249fba67e2eca2367cb74996d17989fa0385528
                                        • Instruction ID: b4c3b56f94c89cf6525db24b450891e45fc970c71f978cf6fce7a9cf5e64a853
                                        • Opcode Fuzzy Hash: b149e3b77e4d7fa048a852574249fba67e2eca2367cb74996d17989fa0385528
                                        • Instruction Fuzzy Hash: 8A219971A05237ABF721CB748C84A6E3696FF056E0F210134EE95A7199D630DE0097E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,00000000,01315CCC,00000000,?,1001E428,?,0131111D,51715654), ref: 01317566
                                        • _free.LIBCMT ref: 013175C3
                                        • _free.LIBCMT ref: 013175F9
                                        • SetLastError.KERNEL32(00000000,1001D060,000000FF,?,1001E428,?,0131111D,51715654), ref: 01317604
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast_free
                                        • String ID:
                                        • API String ID: 2283115069-0
                                        • Opcode ID: ca2045c2ede6909046ebb6de5faf6dc40db05544a127ee0c1fd41aee851efbec
                                        • Instruction ID: b42a14f78313f865f50c3622b02722f1fbf8b79ef3cb6e6635a332138486fd8a
                                        • Opcode Fuzzy Hash: ca2045c2ede6909046ebb6de5faf6dc40db05544a127ee0c1fd41aee851efbec
                                        • Instruction Fuzzy Hash: E611023220015B6AE61EB7BD8CC8F3B356E9BE51BCB2C0A38F220931D9DE71C8114310
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(00000000,00000000,?,10005F53,?,10001AD3,00000000), ref: 10007562
                                        • _free.LIBCMT ref: 100075BF
                                        • _free.LIBCMT ref: 100075F5
                                        • SetLastError.KERNEL32(00000000,1001D060,000000FF,?,10005F53,?,10001AD3,00000000), ref: 10007600
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast_free
                                        • String ID:
                                        • API String ID: 2283115069-0
                                        • Opcode ID: 67db74bece170496939b8c5139b99638e393e73ad7f3f8c58c4bf650fb203522
                                        • Instruction ID: 028f4aea2d4eb734ad490660d2abce2a308b5f9f336b45f59c874a46201f0db1
                                        • Opcode Fuzzy Hash: 67db74bece170496939b8c5139b99638e393e73ad7f3f8c58c4bf650fb203522
                                        • Instruction Fuzzy Hash: 69112C36B049522AF601F3B44CC5FAE21ABFBC51F2B210624F52C931DADEB9DC115211
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(01312281,01312281,00000002,01315FDD,01317990,00000000,?,01313303,00000002,00000000,?,00000000,?,0131219A,01312281,00000004), ref: 013176BD
                                        • _free.LIBCMT ref: 0131771A
                                        • _free.LIBCMT ref: 01317750
                                        • SetLastError.KERNEL32(00000000,1001D060,000000FF,?,01313303,00000002,00000000,?,00000000,?,0131219A,01312281,00000004,00000000,00000000,00000000), ref: 0131775B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast_free
                                        • String ID:
                                        • API String ID: 2283115069-0
                                        • Opcode ID: 513d8dd2c5c0007f27d0cdc77bb2cc100b5bbab3944e918e7a67d286b7d82931
                                        • Instruction ID: 0f4b9e53eb2746b2955c3f0f52a6b6c89f52314d2336290aa66676f216156434
                                        • Opcode Fuzzy Hash: 513d8dd2c5c0007f27d0cdc77bb2cc100b5bbab3944e918e7a67d286b7d82931
                                        • Instruction Fuzzy Hash: BC11E5322041262AE61AB7BD4CC4F3A366AABD52FCF290639F525931D9DE31CC114320
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,?,10005FD9,1000798C,?,?,100022D3,?,?,1000195A), ref: 100076B9
                                        • _free.LIBCMT ref: 10007716
                                        • _free.LIBCMT ref: 1000774C
                                        • SetLastError.KERNEL32(00000000,1001D060,000000FF,?,?,?,10005FD9,1000798C,?,?,100022D3,?,?,1000195A), ref: 10007757
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast_free
                                        • String ID:
                                        • API String ID: 2283115069-0
                                        • Opcode ID: 28f7ca06522628db5455a95b119d03fd96581a16a052025b7cfcaa84c6516755
                                        • Instruction ID: 745e41052fbaca32f42bb756e37683497573d5eee9d081bc88f04d8afc660264
                                        • Opcode Fuzzy Hash: 28f7ca06522628db5455a95b119d03fd96581a16a052025b7cfcaa84c6516755
                                        • Instruction Fuzzy Hash: 55110C36F045162AF611F7784CC5F5B22ABFBC11F5B210125F52D871EADE79DC165220
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __p__commode__p__fmode__set_app_type
                                        • String ID:
                                        • API String ID: 3338496922-0
                                        • Opcode ID: 9890280a06709117213a87ccabd329a27772a8a403e4d2e18ac7fe7346a9f201
                                        • Instruction ID: 429bc8b1d6045199f41b36ba5dbe4ca4e4a96ce7254a634bd606d312d0b49d08
                                        • Opcode Fuzzy Hash: 9890280a06709117213a87ccabd329a27772a8a403e4d2e18ac7fe7346a9f201
                                        • Instruction Fuzzy Hash: 3C21E130E00242DBC71CEF20D9013E5B3E0FB48344F558578F2594BA16E77AA8CACB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 0131436A
                                          • Part of subcall function 013142B7: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 013142E6
                                          • Part of subcall function 013142B7: ___AdjustPointer.LIBCMT ref: 01314301
                                        • _UnwindNestedFrames.LIBCMT ref: 0131437F
                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 01314390
                                        • CallCatchBlock.LIBVCRUNTIME ref: 013143B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                        • String ID:
                                        • API String ID: 737400349-0
                                        • Opcode ID: edff6a3e03afdedac9693981a91b17a778d153779bc220ac19370dc36ccaea4f
                                        • Instruction ID: db1f6e692518b4710e3838a3ee1836f5f5d1e8b0c1cc604aa0cb51739e08dd0b
                                        • Opcode Fuzzy Hash: edff6a3e03afdedac9693981a91b17a778d153779bc220ac19370dc36ccaea4f
                                        • Instruction Fuzzy Hash: 2C012932100109BBDF165F99CD41EEB3F7AEF99798F044404FE48A6124C732E861EBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 10004366
                                          • Part of subcall function 100042B3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 100042E2
                                          • Part of subcall function 100042B3: ___AdjustPointer.LIBCMT ref: 100042FD
                                        • _UnwindNestedFrames.LIBCMT ref: 1000437B
                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 1000438C
                                        • CallCatchBlock.LIBVCRUNTIME ref: 100043B4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                        • String ID:
                                        • API String ID: 737400349-0
                                        • Opcode ID: edff6a3e03afdedac9693981a91b17a778d153779bc220ac19370dc36ccaea4f
                                        • Instruction ID: 13e522a11cfe9bb0f3bc65b8fd23c1ca840af45212fbea489e3d86782dc863f8
                                        • Opcode Fuzzy Hash: edff6a3e03afdedac9693981a91b17a778d153779bc220ac19370dc36ccaea4f
                                        • Instruction Fuzzy Hash: 96012976100149BBEF028E95CC42EEF7BAEEF89794F064004FE4866125C732E961DBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,0131C20E,?,00000001,?,00000001,?,0131B777,?,?,00000001), ref: 0131C7C1
                                        • GetLastError.KERNEL32(?,0131C20E,?,00000001,?,00000001,?,0131B777,?,?,00000001,?,00000001,?,0131BCC3,01319A41), ref: 0131C7CD
                                          • Part of subcall function 0131C793: CloseHandle.KERNEL32(1001D860,0131C7DD,?,0131C20E,?,00000001,?,00000001,?,0131B777,?,?,00000001,?,00000001), ref: 0131C7A3
                                        • ___initconout.LIBCMT ref: 0131C7DD
                                          • Part of subcall function 0131C755: CreateFileW.KERNEL32(10012ED8,40000000,00000003,00000000,00000003,00000000,00000000,0131C784,0131C1FB,00000001,?,0131B777,?,?,00000001,?), ref: 0131C768
                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,0131C20E,?,00000001,?,00000001,?,0131B777,?,?,00000001,?), ref: 0131C7F2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: 3e8b5c4873023ce78c5e006788060d58dc10928f671adff8be74f67d3b61025a
                                        • Instruction ID: 82ee11210cebf7514a3a34c8405cb96a27e4d495a0ceb635daa27931f02e1e77
                                        • Opcode Fuzzy Hash: 3e8b5c4873023ce78c5e006788060d58dc10928f671adff8be74f67d3b61025a
                                        • Instruction Fuzzy Hash: 76F0303A040139BFDF227FA5CC48A993F76FB082B0B004014FF1996135DB72C820AB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,1000C20A,?,00000001,?,00000001,?,1000B773,?,?,00000001), ref: 1000C7BD
                                        • GetLastError.KERNEL32(?,1000C20A,?,00000001,?,00000001,?,1000B773,?,?,00000001,?,00000001,?,1000BCBF,10009A3D), ref: 1000C7C9
                                          • Part of subcall function 1000C78F: CloseHandle.KERNEL32(1001D860,1000C7D9,?,1000C20A,?,00000001,?,00000001,?,1000B773,?,?,00000001,?,00000001), ref: 1000C79F
                                        • ___initconout.LIBCMT ref: 1000C7D9
                                          • Part of subcall function 1000C751: CreateFileW.KERNEL32(10012ED8,40000000,00000003,00000000,00000003,00000000,00000000,1000C780,1000C1F7,00000001,?,1000B773,?,?,00000001,?), ref: 1000C764
                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,1000C20A,?,00000001,?,00000001,?,1000B773,?,?,00000001,?), ref: 1000C7EE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: 3e8b5c4873023ce78c5e006788060d58dc10928f671adff8be74f67d3b61025a
                                        • Instruction ID: 74073595b79dbcfe4d645a5764d908114dcc060acbde7e8b16f5045f31ca4ebc
                                        • Opcode Fuzzy Hash: 3e8b5c4873023ce78c5e006788060d58dc10928f671adff8be74f67d3b61025a
                                        • Instruction Fuzzy Hash: DBF0A23A50416DBBEF126FD5CC44E9A3F66EB082F1B054014FB1C95525DB31D861EB94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 01316DA8
                                          • Part of subcall function 01317A29: HeapFree.KERNEL32(00000000,00000000,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?), ref: 01317A3F
                                          • Part of subcall function 01317A29: GetLastError.KERNEL32(?,?,0131A4FF,?,00000000,?,00000002,?,0131A526,?,00000007,?,?,0131A1E8,?,?), ref: 01317A51
                                        • _free.LIBCMT ref: 01316DBB
                                        • _free.LIBCMT ref: 01316DCC
                                        • _free.LIBCMT ref: 01316DDD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 2b0c8f2609e1e4d19fe36947605b32938c7631f69fdd2cb405b6aa7a0151ab25
                                        • Instruction ID: 1f65e1e3cbb2fbedb9c7975f84c825ff4b1876836eec0ca303ae0aba496db097
                                        • Opcode Fuzzy Hash: 2b0c8f2609e1e4d19fe36947605b32938c7631f69fdd2cb405b6aa7a0151ab25
                                        • Instruction Fuzzy Hash: 17E0B6B6C202B29AF60AAFA99CC458DBA61E75CB54305C006E42423334C6B18FB2DFD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 10006DA4
                                          • Part of subcall function 10007A25: HeapFree.KERNEL32(00000000,00000000,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?), ref: 10007A3B
                                          • Part of subcall function 10007A25: GetLastError.KERNEL32(?,?,1000A4FB,?,00000000,?,?,?,1000A522,?,00000007,?,?,1000A1E4,?,?), ref: 10007A4D
                                        • _free.LIBCMT ref: 10006DB7
                                        • _free.LIBCMT ref: 10006DC8
                                        • _free.LIBCMT ref: 10006DD9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 2b0c8f2609e1e4d19fe36947605b32938c7631f69fdd2cb405b6aa7a0151ab25
                                        • Instruction ID: 74161ce90208f91b247a55d149e76b9ac9a006f5e05c4def407a73229e26e147
                                        • Opcode Fuzzy Hash: 2b0c8f2609e1e4d19fe36947605b32938c7631f69fdd2cb405b6aa7a0151ab25
                                        • Instruction Fuzzy Hash: 5CE0BFB5D102B09AF6069F399CC958D7A61F78D750301C04AF42813236D6759FB3DF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 013134A7
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 01313560
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 3480331319-1018135373
                                        • Opcode ID: 874856047c16bd33f7fc55a96c496f6d454f6ceb1e7d21065a126a07fa9bd22e
                                        • Instruction ID: 36dc7de6ba8c49763a64fadbad44996587fccfd7aeeba77cad673fab8dfcc451
                                        • Opcode Fuzzy Hash: 874856047c16bd33f7fc55a96c496f6d454f6ceb1e7d21065a126a07fa9bd22e
                                        • Instruction Fuzzy Hash: 6641B034A00219DBCF18DF6DC880AAEBFB5BF44728F0480A9E914AB359D731DA01CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 100034A3
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 1000355C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 3480331319-1018135373
                                        • Opcode ID: 874856047c16bd33f7fc55a96c496f6d454f6ceb1e7d21065a126a07fa9bd22e
                                        • Instruction ID: ff9ebd3c1c81eb1899def5ed99c00ae477f6477e44b6034c33ad9c020c15aeb4
                                        • Opcode Fuzzy Hash: 874856047c16bd33f7fc55a96c496f6d454f6ceb1e7d21065a126a07fa9bd22e
                                        • Instruction Fuzzy Hash: 9341C278A006089BDB02DF68CC80A9F7BF9EF44394F11C155E915AB2AAD731EA41CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                        • API String ID: 0-3005402082
                                        • Opcode ID: 2472693c82e54f292de73cb85fe516634e050d81ff585f47dcf8ccd8f7f9a9b1
                                        • Instruction ID: 6585af1d002916337cb94f90c0675def2e0e793bea451c51ca5d48d010255124
                                        • Opcode Fuzzy Hash: 2472693c82e54f292de73cb85fe516634e050d81ff585f47dcf8ccd8f7f9a9b1
                                        • Instruction Fuzzy Hash: 4841C8B1A00255EFDB2ADFDDCC8199EBBFCEB99308F14405AE50597258D7B0CA50C750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.RunPowerShellNET.8.14140.19596.exe
                                        • API String ID: 0-3005402082
                                        • Opcode ID: 2472693c82e54f292de73cb85fe516634e050d81ff585f47dcf8ccd8f7f9a9b1
                                        • Instruction ID: 2e73bdc33c76d4dd023edafdf97d182192ae4307d939274121133ae1da29e7d0
                                        • Opcode Fuzzy Hash: 2472693c82e54f292de73cb85fe516634e050d81ff585f47dcf8ccd8f7f9a9b1
                                        • Instruction Fuzzy Hash: B341A374E00655AFEB22CF998C8199EBBF9FB8D390F21006AF40497259D7B1DE40C790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00111A7F
                                        • Unknown error, xrefs: 00111A32
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: fprintf
                                        • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                        • API String ID: 383729395-3474627141
                                        • Opcode ID: 162008276de98e65594f5b657b4326e225cdab7d2b1cc1e821714e06093116cb
                                        • Instruction ID: d0cd5d6af3366aab12a000a657251f4ef066572b56992eca4849ca740a4e5915
                                        • Opcode Fuzzy Hash: 162008276de98e65594f5b657b4326e225cdab7d2b1cc1e821714e06093116cb
                                        • Instruction Fuzzy Hash: 2A0192B0418B45DBD304AF15E68855AFFF2FF89350F868898F5C446269CB32D8B8C746
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0131229C
                                          • Part of subcall function 01312213: std::exception::exception.LIBCONCRT ref: 01312220
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 013122AA
                                          • Part of subcall function 0131335B: RaiseException.KERNEL32(?,?,0131228F,00000000,00000000,?,?,?,?,?,?,0131228F,00000000,1001BAFC,?,00000000), ref: 013133BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528290767.0000000001310000.00000040.00001000.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1310000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                        • String ID: Unknown exception
                                        • API String ID: 1586462112-410509341
                                        • Opcode ID: 270a42b036f740911cf048f47e808695e1a2384dd15910c3e8e1676963722a71
                                        • Instruction ID: 746ac8ee2674563758fd1935231c4cd56c4f7a0a9aa386eb40fd190b35153650
                                        • Opcode Fuzzy Hash: 270a42b036f740911cf048f47e808695e1a2384dd15910c3e8e1676963722a71
                                        • Instruction Fuzzy Hash: B8D0A738D0010977CB08EAA8CC40DDD776CAF00104B904454B514C7549EB71D60687C1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 10002298
                                          • Part of subcall function 1000220F: std::exception::exception.LIBCONCRT ref: 1000221C
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 100022A6
                                          • Part of subcall function 10003357: RaiseException.KERNEL32(?,?,?,10002A31,?,?,?,?,?,?,?,?,10002A31,0000000C,1001BBF4,0000000C), ref: 100033B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4531328256.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10001000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                        • String ID: Unknown exception
                                        • API String ID: 1586462112-410509341
                                        • Opcode ID: 1497d7aab37bc32c0cfd94839d72483e237d148937bb315cc1f7f91bd02e2623
                                        • Instruction ID: 66a027f7a664b98449d705b15b83149621ebdc4aa7e795b7145d904884e3e54c
                                        • Opcode Fuzzy Hash: 1497d7aab37bc32c0cfd94839d72483e237d148937bb315cc1f7f91bd02e2623
                                        • Instruction Fuzzy Hash: D6D0A73890014977DB00DAE4CC81D8D77ACEF00180BC08054B614D650EEB75EA0587C1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0011235B,?,?,?,?,?,00111968), ref: 0011219E
                                        • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,0011235B,?,?,?,?,?,00111968), ref: 001121C5
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,0011235B,?,?,?,?,?,00111968), ref: 001121CC
                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,0011235B,?,?,?,?,?,00111968), ref: 001121EC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4528074559.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                        • Associated: 00000000.00000002.4528059831.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528091170.0000000000113000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528111874.0000000000132000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528124963.0000000000135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4528139880.0000000000138000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_110000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterErrorLastLeaveValue
                                        • String ID:
                                        • API String ID: 682475483-0
                                        • Opcode ID: 00f2f5780abecd62710d9bf63ddd5a2ceb22fdf40f0eb18f1cc6ce4fc103b182
                                        • Instruction ID: 4b016c7e5b4645cae208cbae1414065cc74389b762b9f1b96738fdb10dc7c2f2
                                        • Opcode Fuzzy Hash: 00f2f5780abecd62710d9bf63ddd5a2ceb22fdf40f0eb18f1cc6ce4fc103b182
                                        • Instruction Fuzzy Hash: 29F0C2B6A006149BCB10BF78EEC865E7BA4EB04740F050438DE849B315E730B8D9CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%