Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mdWXrbOxsY.exe

Overview

General Information

Sample name:mdWXrbOxsY.exe
renamed because original name is a hash value
Original sample name:51b0ed6b4908a21e5cc1d9ec7c046040.exe
Analysis ID:1428421
MD5:51b0ed6b4908a21e5cc1d9ec7c046040
SHA1:d874f6da7327b2f1b3ace5e66bc763c557ac382e
SHA256:4e68c5a537320cbe88842a53e5691b7f1a590b9c0b491a12baaeeda111dcaa4d
Tags:32exetrojan
Infos:

Detection

Xehook Stealer
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Xehook Stealer
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • mdWXrbOxsY.exe (PID: 6932 cmdline: "C:\Users\user\Desktop\mdWXrbOxsY.exe" MD5: 51B0ED6B4908A21E5CC1D9EC7C046040)
    • conhost.exe (PID: 6928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 2076 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 6640 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: mdWXrbOxsY.exe PID: 6932JoeSecurity_xehookStealerYara detected Xehook StealerJoe Security
    Process Memory Space: RegAsm.exe PID: 6640JoeSecurity_xehookStealerYara detected Xehook StealerJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: mdWXrbOxsY.exeReversingLabs: Detection: 75%
      Source: mdWXrbOxsY.exeJoe Sandbox ML: detected
      Source: mdWXrbOxsY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.67.169.128:443 -> 192.168.2.4:49731 version: TLS 1.0
      Source: mdWXrbOxsY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6A223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A6A223
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: unotree.ruConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /getjson.php?id=88 HTTP/1.1Host: unotree.ru
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
      Source: unknownDNS query: name: ip-api.com
      Source: unknownHTTPS traffic detected: 172.67.169.128:443 -> 192.168.2.4:49731 version: TLS 1.0
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: unotree.ruConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /getjson.php?id=88 HTTP/1.1Host: unotree.ru
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: unotree.ru
      Source: mdWXrbOxsY.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: mdWXrbOxsY.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: RegAsm.exe, 00000003.00000002.1836943376.0000000006330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mF
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
      Source: mdWXrbOxsY.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
      Source: RegAsm.exe, 00000003.00000002.1836259380.0000000003247000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
      Source: mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=11827
      Source: mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1836259380.0000000003247000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
      Source: mdWXrbOxsY.exeString found in binary or memory: http://ocsp.digicert.com0A
      Source: mdWXrbOxsY.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: mdWXrbOxsY.exeString found in binary or memory: http://ocsp.digicert.com0H
      Source: mdWXrbOxsY.exeString found in binary or memory: http://ocsp.digicert.com0I
      Source: mdWXrbOxsY.exeString found in binary or memory: http://ocsp.digicert.com0X
      Source: RegAsm.exe, 00000003.00000002.1836259380.0000000003179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: RegAsm.exe, 00000003.00000002.1836259380.000000000318A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://unotree.ru
      Source: mdWXrbOxsY.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
      Source: mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1836259380.0000000003111000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://aiwhcpoaw.ru/
      Source: mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/xehook
      Source: RegAsm.exe, 00000003.00000002.1836259380.0000000003179000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1836259380.00000000031CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://unotree.ru
      Source: mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1836259380.0000000003111000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://unotree.ru/
      Source: RegAsm.exe, 00000003.00000002.1836259380.00000000031CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://unotree.ru/getjson.php?id=88
      Source: mdWXrbOxsY.exeString found in binary or memory: https://www.digicert.com/CPS0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A610400_2_00A61040
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A658CE0_2_00A658CE
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A72C100_2_00A72C10
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A689AF0_2_00A689AF
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6DAB00_2_00A6DAB0
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6DF380_2_00A6DF38
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02EF64E03_2_02EF64E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02EF6DB03_2_02EF6DB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02EF61983_2_02EF6198
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: String function: 00A61F30 appears 35 times
      Source: mdWXrbOxsY.exeStatic PE information: invalid certificate
      Source: mdWXrbOxsY.exeBinary or memory string: OriginalFilename vs mdWXrbOxsY.exe
      Source: mdWXrbOxsY.exe, 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexehook.exe" vs mdWXrbOxsY.exe
      Source: mdWXrbOxsY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@6/1@2/2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6928:120:WilError_03
      Source: mdWXrbOxsY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: mdWXrbOxsY.exeReversingLabs: Detection: 75%
      Source: unknownProcess created: C:\Users\user\Desktop\mdWXrbOxsY.exe "C:\Users\user\Desktop\mdWXrbOxsY.exe"
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: mdWXrbOxsY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: mdWXrbOxsY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: mdWXrbOxsY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: mdWXrbOxsY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: mdWXrbOxsY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: mdWXrbOxsY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: mdWXrbOxsY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A73344 push ecx; ret 0_2_00A73357
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2EB0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599891Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599563Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599438Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599313Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599188Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599078Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598969Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1793Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -2767011611056431s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -600000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599891s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3720Thread sleep count: 1793 > 30Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599781s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599672s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599563s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599438s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599313s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599188s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -599078s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3488Thread sleep time: -598969s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5816Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3720Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6A223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A6A223
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599891Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599563Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599438Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599313Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599188Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599078Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598969Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: RegAsm.exe, 00000003.00000002.1836259380.0000000003247000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
      Source: RegAsm.exe, 00000003.00000002.1836259380.0000000003247000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: RegAsm.exe, 00000003.00000002.1835499855.00000000012E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllO
      Source: RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBox.dllNONE
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A61D08 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A61D08
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6B79B mov eax, dword ptr fs:[00000030h]0_2_00A6B79B
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A66FF9 mov ecx, dword ptr fs:[00000030h]0_2_00A66FF9
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6C211 GetProcessHeap,0_2_00A6C211
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6187D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A6187D
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A61D08 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A61D08
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A61E64 SetUnhandledExceptionFilter,0_2_00A61E64
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A6636B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A6636B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A91C7D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00A91C7D
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 418000Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: EA2008Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A61F75 cpuid 0_2_00A61F75
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\mdWXrbOxsY.exeCode function: 0_2_00A61BF5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A61BF5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: mdWXrbOxsY.exe PID: 6932, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6640, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: mdWXrbOxsY.exe PID: 6932, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6640, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
      Windows Management Instrumentation
      1
      DLL Side-Loading
      411
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory231
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
      Virtualization/Sandbox Evasion
      Security Account Manager141
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      System Network Configuration Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync33
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      mdWXrbOxsY.exe75%ReversingLabsWin32.Trojan.Znyonm
      mdWXrbOxsY.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      unotree.ru
      172.67.169.128
      truefalse
        unknown
        ip-api.com
        208.95.112.1
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://unotree.ru/false
            unknown
            https://unotree.ru/getjson.php?id=88false
              unknown
              http://ip-api.com/line/?fields=hostingfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://t.me/xehookmdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  high
                  http://unotree.ruRegAsm.exe, 00000003.00000002.1836259380.000000000318A000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://aiwhcpoaw.ru/mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1836259380.0000000003111000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.1836259380.0000000003179000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.mFRegAsm.exe, 00000003.00000002.1836943376.0000000006330000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://ip-api.com/json/?fields=11827mdWXrbOxsY.exe, mdWXrbOxsY.exe, 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1835305839.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://unotree.ruRegAsm.exe, 00000003.00000002.1836259380.0000000003179000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1836259380.00000000031CD000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://ip-api.comRegAsm.exe, 00000003.00000002.1836259380.0000000003247000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                208.95.112.1
                                ip-api.comUnited States
                                53334TUT-ASUSfalse
                                172.67.169.128
                                unotree.ruUnited States
                                13335CLOUDFLARENETUSfalse
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1428421
                                Start date and time:2024-04-18 22:52:05 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 2m 58s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:4
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:mdWXrbOxsY.exe
                                renamed because original name is a hash value
                                Original Sample Name:51b0ed6b4908a21e5cc1d9ec7c046040.exe
                                Detection:MAL
                                Classification:mal84.troj.evad.winEXE@6/1@2/2
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 31
                                • Number of non-executed functions: 26
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Stop behavior analysis, all processes terminated
                                • Execution Graph export aborted for target RegAsm.exe, PID 6640 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: mdWXrbOxsY.exe
                                TimeTypeDescription
                                22:53:10API Interceptor11x Sleep call for process: RegAsm.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                208.95.112.1Syknivkloo.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                Shipping Dcuments_CI PKL_HL_.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • ip-api.com/line/?fields=hosting
                                transferencia_BBVA_97866456345354678976543425678.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                order & specification.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • ip-api.com/line/?fields=hosting
                                CTM REQUEST BIRTHSHIP.docGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                SHIPPING DOCUMENTS_PDF..vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • ip-api.com/line/?fields=hosting
                                Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                • ip-api.com/json/?fields=query,status,countryCode,city,timezone
                                Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                • ip-api.com/json/?fields=query,status,countryCode,city,timezone
                                xmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                                • ip-api.com/json/
                                TransactionSummary_910020049836765_110424045239.xlsxGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                172.67.169.12899Rv0CX3IN.exeGet hashmaliciousFormBookBrowse
                                • www.sdrsg.top/hs94/?Xtu0F8pX=3yAAkKMFYss6bhJ/eePpeET7tCe9FhXs4BAzFDlSz0EGpOZkeED3iMDFL4Afpyqnhw9lZkfkBQ==&_jlXP=ZdmdX8opyj
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                unotree.ruHj8wbvoT1k.exeGet hashmaliciousXehook StealerBrowse
                                • 104.21.54.236
                                Hj8wbvoT1k.exeGet hashmaliciousXehook StealerBrowse
                                • 172.67.169.128
                                PEE1tTQcx4.exeGet hashmaliciousXehook StealerBrowse
                                • 104.21.54.236
                                Ghost Loader 8.7.1.exeGet hashmaliciousPureLog Stealer, Xehook StealerBrowse
                                • 104.21.54.236
                                file.exeGet hashmaliciousSmokeLoader, Xehook StealerBrowse
                                • 172.67.169.128
                                ip-api.comSyknivkloo.exeGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                Shipping Dcuments_CI PKL_HL_.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                transferencia_BBVA_97866456345354678976543425678.exeGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                order & specification.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                CTM REQUEST BIRTHSHIP.docGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                SHIPPING DOCUMENTS_PDF..vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                • 208.95.112.1
                                Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                • 208.95.112.1
                                xmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                                • 208.95.112.1
                                TransactionSummary_910020049836765_110424045239.xlsxGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUShttp://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiyeGet hashmaliciousHTMLPhisherBrowse
                                • 104.21.71.20
                                KZWCMNWmmqi9lvI.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.12.205
                                Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                • 104.26.13.205
                                DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                • 104.26.12.205
                                Gcerti Quote.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.12.205
                                Arba Outstanding Statement.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                • 104.26.12.205
                                wFtZih4nN9.elfGet hashmaliciousMiraiBrowse
                                • 104.28.24.146
                                https://nwcchicago-my.sharepoint.com/:b:/p/jpsanavaitis/EZA36vHeUQxCnJ96O418g94BWiWpCx4SyNTLHION5X1T7g?e=N00DO7Get hashmaliciousHTMLPhisherBrowse
                                • 104.17.25.14
                                https://tracker.club-os.com/campaign/click?msgId=f8ea317d963149a518aa35e03e5541f797badf3c&target=splendidanimations.com%2F%40%2FBigge/aDRmd79087aDRmd79087aDRmd/ZHN3ZWF6YUBiaWdnZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                • 104.17.2.184
                                PO_983888123.xlsGet hashmaliciousUnknownBrowse
                                • 172.67.206.230
                                TUT-ASUSSyknivkloo.exeGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                Shipping Dcuments_CI PKL_HL_.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                transferencia_BBVA_97866456345354678976543425678.exeGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                order & specification.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                CTM REQUEST BIRTHSHIP.docGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                SHIPPING DOCUMENTS_PDF..vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 208.95.112.1
                                Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                • 208.95.112.1
                                Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                • 208.95.112.1
                                xmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                                • 208.95.112.1
                                TransactionSummary_910020049836765_110424045239.xlsxGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                54328bd36c14bd82ddaa0c04b25ed9adM0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                • 172.67.169.128
                                Hj8wbvoT1k.exeGet hashmaliciousXehook StealerBrowse
                                • 172.67.169.128
                                Hj8wbvoT1k.exeGet hashmaliciousXehook StealerBrowse
                                • 172.67.169.128
                                rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 172.67.169.128
                                Request For Quotation.exeGet hashmaliciousPureLog StealerBrowse
                                • 172.67.169.128
                                Request For Quotation.exeGet hashmaliciousPureLog StealerBrowse
                                • 172.67.169.128
                                PEE1tTQcx4.exeGet hashmaliciousXehook StealerBrowse
                                • 172.67.169.128
                                SecuriteInfo.com.FileRepPup.2542.22578.exeGet hashmaliciousUnknownBrowse
                                • 172.67.169.128
                                SecuriteInfo.com.FileRepMalware.1286.7375.exeGet hashmaliciousUnknownBrowse
                                • 172.67.169.128
                                SecuriteInfo.com.FileRepMalware.1286.7375.exeGet hashmaliciousUnknownBrowse
                                • 172.67.169.128
                                No context
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1159
                                Entropy (8bit):5.3458720040787515
                                Encrypted:false
                                SSDEEP:24:ML9E4KlKDE4KhKiKhIE4KnKIE4oKNzKoZAE4KzeosXE4qdKm:MxHKlYHKh3oIHKntHo6hAHKzePHA
                                MD5:C646C30644D2229016DFAB3E9EAE4F00
                                SHA1:A7715298F1AB001361AD6E0FA5C3FA06BF7BAB74
                                SHA-256:053C89344DED8FB71CBB38E5B56E9128B3E06A6177AA0BA89E4F1735D7E84366
                                SHA-512:174C65C1504F4E16D261E1B1E3798676833283AFF2F6B166BE7D57F76AF38404888CE1A7AF27B8B564AD898F63720458EF30B233409F6BF749488AEA6C7F27C5
                                Malicious:false
                                Reputation:low
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, Pu
                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                Entropy (8bit):7.4188328050455254
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:mdWXrbOxsY.exe
                                File size:215'152 bytes
                                MD5:51b0ed6b4908a21e5cc1d9ec7c046040
                                SHA1:d874f6da7327b2f1b3ace5e66bc763c557ac382e
                                SHA256:4e68c5a537320cbe88842a53e5691b7f1a590b9c0b491a12baaeeda111dcaa4d
                                SHA512:48ec96b209d7061a1276496feb250cf183891b950465d3a916c999aa1efc1c8831b068ce0fce4ce21d09677f945b3d816ed4040146462a0ce0845318041586a2
                                SSDEEP:6144:gQtdqzqv7rArb/LoEyavuW6uqQqNW14pv:gQtdqWk/LDmQqQqK4pv
                                TLSH:0F24D00275C1C472E9B62D391460DBB65E3EFC340F6499EB235856BA4F303C29629E7B
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.N.-.N.-.N.-.....D.-...(...-...).Z.-..$(.h.-..$).\.-..$..\.-...,.K.-.N.,...-..'$.O.-..'..O.-..'/.O.-.RichN.-................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x401873
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows cui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x662020C5 [Wed Apr 17 19:19:33 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:82004e1f718cc406824f64c2578845d6
                                Signature Valid:false
                                Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                Signature Validation Error:The digital signature of the object did not verify
                                Error Number:-2146869232
                                Not Before, Not After
                                • 08/10/2020 01:00:00 12/10/2023 13:00:00
                                Subject Chain
                                • CN=ASUSTeK COMPUTER INC., O=ASUSTeK COMPUTER INC., L=Beitou District, S=Taipei City, C=TW, SERIALNUMBER=23638777, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=TW
                                Version:3
                                Thumbprint MD5:332CDC164B1324C3FF3F64E228C5FFFC
                                Thumbprint SHA-1:CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13
                                Thumbprint SHA-256:531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943
                                Serial:0C9838F673F9B1CCE395CFAB2B6684E4
                                Instruction
                                call 00007F6739332C1Fh
                                jmp 00007F67393326C9h
                                push ebp
                                mov ebp, esp
                                push 00000000h
                                call dword ptr [00414020h]
                                push dword ptr [ebp+08h]
                                call dword ptr [0041401Ch]
                                push C0000409h
                                call dword ptr [00414024h]
                                push eax
                                call dword ptr [00414028h]
                                pop ebp
                                ret
                                push ebp
                                mov ebp, esp
                                sub esp, 00000324h
                                push 00000017h
                                call dword ptr [0041402Ch]
                                test eax, eax
                                je 00007F6739332857h
                                push 00000002h
                                pop ecx
                                int 29h
                                mov dword ptr [00432118h], eax
                                mov dword ptr [00432114h], ecx
                                mov dword ptr [00432110h], edx
                                mov dword ptr [0043210Ch], ebx
                                mov dword ptr [00432108h], esi
                                mov dword ptr [00432104h], edi
                                mov word ptr [00432130h], ss
                                mov word ptr [00432124h], cs
                                mov word ptr [00432100h], ds
                                mov word ptr [004320FCh], es
                                mov word ptr [004320F8h], fs
                                mov word ptr [004320F4h], gs
                                pushfd
                                pop dword ptr [00432128h]
                                mov eax, dword ptr [ebp+00h]
                                mov dword ptr [0043211Ch], eax
                                mov eax, dword ptr [ebp+04h]
                                mov dword ptr [00432120h], eax
                                lea eax, dword ptr [ebp+08h]
                                mov dword ptr [0043212Ch], eax
                                mov eax, dword ptr [ebp-00000324h]
                                mov dword ptr [00432068h], 00010001h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1a4440x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x330000x1e0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x322000x2670
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x340000x1024.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x199900x1c.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x198d00x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x140000x128.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x12a5e0x12c00f6ccadd9ff87e1a997e6b45145621f49False0.6113151041666667COM executable for DOS6.648723080106595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x140000x6aec0x6c0061dc35e7cd6c6a53effc6b7024d883ecFalse0.4721137152777778data5.155468083915453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x1b0000x17a440x17200310378bb2024d62e7652078329c328feFalse0.9713999155405405data7.951005189964415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x330000x1e00x2007d123d6987b6fa0f191e9ee2fb0d9484False0.52734375data4.7113407225994175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x340000x10240x120052f90ef0453ffd330c5d98a658b368d0False0.7083333333333334data6.223288107692463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_MANIFEST0x330600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                GDI32.dllOffsetRgn
                                KERNEL32.dllVirtualProtect, WaitForSingleObject, CloseHandle, FreeConsole, CreateThread, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, WriteConsoleW, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, GetProcessHeap, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, HeapSize, HeapReAlloc, CreateFileW, DecodePointer
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 22:53:11.064599037 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.064697027 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.064811945 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.077316046 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.077358007 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.305000067 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.305114985 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.312829971 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.312880039 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.313322067 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.364798069 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.610054016 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:11.656131983 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.993846893 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.993983030 CEST44349731172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:11.994057894 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.005104065 CEST49731443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.009016991 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.009061098 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.009143114 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.009417057 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.009434938 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.234766006 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.236896992 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.236929893 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.743427038 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.743923903 CEST44349732172.67.169.128192.168.2.4
                                Apr 18, 2024 22:53:12.744018078 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.744556904 CEST49732443192.168.2.4172.67.169.128
                                Apr 18, 2024 22:53:12.918029070 CEST4973380192.168.2.4208.95.112.1
                                Apr 18, 2024 22:53:13.034010887 CEST8049733208.95.112.1192.168.2.4
                                Apr 18, 2024 22:53:13.034187078 CEST4973380192.168.2.4208.95.112.1
                                Apr 18, 2024 22:53:13.034480095 CEST4973380192.168.2.4208.95.112.1
                                Apr 18, 2024 22:53:13.154808998 CEST8049733208.95.112.1192.168.2.4
                                Apr 18, 2024 22:53:13.165008068 CEST4973380192.168.2.4208.95.112.1
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 22:53:10.740794897 CEST5102953192.168.2.41.1.1.1
                                Apr 18, 2024 22:53:11.057687044 CEST53510291.1.1.1192.168.2.4
                                Apr 18, 2024 22:53:12.811954021 CEST5965353192.168.2.41.1.1.1
                                Apr 18, 2024 22:53:12.916814089 CEST53596531.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 18, 2024 22:53:10.740794897 CEST192.168.2.41.1.1.10xd0c7Standard query (0)unotree.ruA (IP address)IN (0x0001)false
                                Apr 18, 2024 22:53:12.811954021 CEST192.168.2.41.1.1.10x9186Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 18, 2024 22:53:11.057687044 CEST1.1.1.1192.168.2.40xd0c7No error (0)unotree.ru172.67.169.128A (IP address)IN (0x0001)false
                                Apr 18, 2024 22:53:11.057687044 CEST1.1.1.1192.168.2.40xd0c7No error (0)unotree.ru104.21.54.236A (IP address)IN (0x0001)false
                                Apr 18, 2024 22:53:12.916814089 CEST1.1.1.1192.168.2.40x9186No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                • unotree.ru
                                • ip-api.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.449733208.95.112.1806640C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                Apr 18, 2024 22:53:13.034480095 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                Host: ip-api.com
                                Connection: Keep-Alive
                                Apr 18, 2024 22:53:13.154808998 CEST174INHTTP/1.1 200 OK
                                Date: Thu, 18 Apr 2024 20:53:12 GMT
                                Content-Type: text/plain; charset=utf-8
                                Content-Length: 5
                                Access-Control-Allow-Origin: *
                                X-Ttl: 60
                                X-Rl: 44
                                Data Raw: 74 72 75 65 0a
                                Data Ascii: true


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.449731172.67.169.1284436640C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-04-18 20:53:11 UTC60OUTGET / HTTP/1.1
                                Host: unotree.ru
                                Connection: Keep-Alive
                                2024-04-18 20:53:11 UTC625INHTTP/1.1 200 OK
                                Date: Thu, 18 Apr 2024 20:53:11 GMT
                                Content-Type: text/html
                                Transfer-Encoding: chunked
                                Connection: close
                                Last-Modified: Wed, 17 Jan 2024 08:02:34 GMT
                                Accept-Ranges: bytes
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m4OPjG2utPdNWvC4%2BveC4f5NLn3E8rBytqRi%2BzYXN%2FR1CzWVqo0eO81W62es%2FZRe9u%2BMEksoh6WQDAb%2F1d5GmDGUvfuzeIspiKPICwBFUQL4l464gCnTcr2F6%2BIX"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 87678afbedaaadc9-ATL
                                alt-svc: h3=":443"; ma=86400
                                2024-04-18 20:53:11 UTC15INData Raw: 61 0d 0a 69 6e 64 65 78 2e 68 74 6d 6c 0d 0a
                                Data Ascii: aindex.html
                                2024-04-18 20:53:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.449732172.67.169.1284436640C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-04-18 20:53:12 UTC53OUTGET /getjson.php?id=88 HTTP/1.1
                                Host: unotree.ru
                                2024-04-18 20:53:12 UTC583INHTTP/1.1 200 OK
                                Date: Thu, 18 Apr 2024 20:53:12 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Vary: Accept-Encoding
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JDIdvKDiouO3diDNfAH13VGszvSk5YX8qESAViUILh1W%2BYfVAvxmzGpNchbwwlPZC91C8L4ooMWCYBig0ceMce3GsXtdMYI6P271cLBWuFTlzcXHjW4uhqYDsTTA"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 87678b00bbb0674b-ATL
                                alt-svc: h3=":443"; ma=86400
                                2024-04-18 20:53:12 UTC335INData Raw: 31 34 38 0d 0a 7b 0d 0a 09 22 64 65 62 75 67 22 3a 20 22 30 22 2c 0d 0a 09 22 65 6d 75 6c 61 74 65 22 3a 20 22 30 22 2c 0d 0a 09 22 76 69 72 74 75 61 6c 62 6f 78 22 3a 20 22 31 22 2c 0d 0a 09 22 76 69 72 75 73 74 6f 74 61 6c 22 3a 20 22 31 22 2c 0d 0a 09 22 65 72 72 6f 72 22 3a 20 22 30 22 2c 0d 0a 09 22 65 72 72 6f 72 6e 61 6d 65 22 3a 20 22 4e 4f 4e 45 22 2c 0d 0a 09 22 65 72 72 74 65 78 74 62 6f 78 22 3a 20 22 4e 4f 4e 45 22 2c 0d 0a 09 22 63 6f 6d 70 65 74 69 74 6f 72 22 3a 20 22 30 22 2c 0d 0a 09 22 73 65 6c 66 6d 65 6c 66 22 3a 20 22 30 22 2c 0d 0a 09 22 64 6f 6d 61 69 6e 64 65 74 65 63 74 22 3a 20 22 66 61 63 65 62 6f 6f 6b 2e 63 6f 6d 3b 6c 69 6e 6b 65 64 69 6e 2e 63 6f 6d 3b 74 77 69 74 74 65 72 2e 63 6f 6d 22 2c 0d 0a 09 22 66 69 6c 65 78 74 22
                                Data Ascii: 148{"debug": "0","emulate": "0","virtualbox": "1","virustotal": "1","error": "0","errorname": "NONE","errtextbox": "NONE","competitor": "0","selfmelf": "0","domaindetect": "facebook.com;linkedin.com;twitter.com","filext"
                                2024-04-18 20:53:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:22:53:09
                                Start date:18/04/2024
                                Path:C:\Users\user\Desktop\mdWXrbOxsY.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\mdWXrbOxsY.exe"
                                Imagebase:0xa60000
                                File size:215'152 bytes
                                MD5 hash:51B0ED6B4908A21E5CC1D9EC7C046040
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:22:53:09
                                Start date:18/04/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:22:53:09
                                Start date:18/04/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0x260000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:22:53:09
                                Start date:18/04/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xd70000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:5.7%
                                  Dynamic/Decrypted Code Coverage:0.6%
                                  Signature Coverage:4.6%
                                  Total number of Nodes:1446
                                  Total number of Limit Nodes:25
                                  execution_graph 11678 a69a24 11679 a69a3f 11678->11679 11680 a69a2f 11678->11680 11684 a69a45 11680->11684 11683 a67a6f __freea 14 API calls 11683->11679 11685 a69a60 11684->11685 11686 a69a5a 11684->11686 11688 a67a6f __freea 14 API calls 11685->11688 11687 a67a6f __freea 14 API calls 11686->11687 11687->11685 11689 a69a6c 11688->11689 11690 a67a6f __freea 14 API calls 11689->11690 11691 a69a77 11690->11691 11692 a67a6f __freea 14 API calls 11691->11692 11693 a69a82 11692->11693 11694 a67a6f __freea 14 API calls 11693->11694 11695 a69a8d 11694->11695 11696 a67a6f __freea 14 API calls 11695->11696 11697 a69a98 11696->11697 11698 a67a6f __freea 14 API calls 11697->11698 11699 a69aa3 11698->11699 11700 a67a6f __freea 14 API calls 11699->11700 11701 a69aae 11700->11701 11702 a67a6f __freea 14 API calls 11701->11702 11703 a69ab9 11702->11703 11704 a67a6f __freea 14 API calls 11703->11704 11705 a69ac7 11704->11705 11710 a69871 11705->11710 11711 a6987d __FrameHandler3::FrameUnwindToState 11710->11711 11726 a6b73c EnterCriticalSection 11711->11726 11713 a698b1 11727 a698d0 11713->11727 11715 a69887 11715->11713 11717 a67a6f __freea 14 API calls 11715->11717 11717->11713 11718 a698dc 11719 a698e8 __FrameHandler3::FrameUnwindToState 11718->11719 11731 a6b73c EnterCriticalSection 11719->11731 11721 a698f2 11722 a69b12 __dosmaperr 14 API calls 11721->11722 11723 a69905 11722->11723 11732 a69925 11723->11732 11726->11715 11730 a6b784 LeaveCriticalSection 11727->11730 11729 a698be 11729->11718 11730->11729 11731->11721 11735 a6b784 LeaveCriticalSection 11732->11735 11734 a69913 11734->11683 11735->11734 11026 a6f6a5 11027 a69691 ___scrt_uninitialize_crt 38 API calls 11026->11027 11029 a6f6b2 11027->11029 11028 a6f6be 11029->11028 11030 a6f70a 11029->11030 11038 a6f86d 11029->11038 11030->11028 11033 a696fa 38 API calls 11030->11033 11037 a6f76c 11030->11037 11035 a6f75f 11033->11035 11035->11037 11046 a7147b 11035->11046 11051 a6f79b 11037->11051 11039 a6f887 11038->11039 11040 a6f883 11038->11040 11041 a6b9f1 ___scrt_uninitialize_crt 38 API calls 11039->11041 11045 a6f8d6 11039->11045 11040->11030 11042 a6f8a8 11041->11042 11043 a6f8b0 SetFilePointerEx 11042->11043 11042->11045 11044 a6f8c7 GetFileSizeEx 11043->11044 11043->11045 11044->11045 11045->11030 11047 a67a12 __dosmaperr 14 API calls 11046->11047 11048 a71498 11047->11048 11049 a67a6f __freea 14 API calls 11048->11049 11050 a714a2 11049->11050 11050->11037 11052 a69691 ___scrt_uninitialize_crt 38 API calls 11051->11052 11053 a6f7aa 11052->11053 11054 a6f850 11053->11054 11055 a6f7bd 11053->11055 11056 a6d625 ___scrt_uninitialize_crt 63 API calls 11054->11056 11057 a6f7da 11055->11057 11060 a6f801 11055->11060 11059 a6f77d 11056->11059 11058 a6d625 ___scrt_uninitialize_crt 63 API calls 11057->11058 11058->11059 11060->11059 11062 a70987 11060->11062 11063 a7099b __strnicoll 11062->11063 11068 a707de 11063->11068 11066 a65190 __strnicoll 38 API calls 11067 a709bf 11066->11067 11067->11059 11069 a707ea __FrameHandler3::FrameUnwindToState 11068->11069 11070 a708c8 11069->11070 11072 a70846 11069->11072 11078 a707f2 11069->11078 11071 a664ea __strnicoll 38 API calls 11070->11071 11071->11078 11079 a6b91a EnterCriticalSection 11072->11079 11074 a7084c 11075 a70871 11074->11075 11080 a70904 11074->11080 11086 a708c0 11075->11086 11078->11066 11079->11074 11081 a6b9f1 ___scrt_uninitialize_crt 38 API calls 11080->11081 11082 a70916 11081->11082 11083 a70932 SetFilePointerEx 11082->11083 11085 a7091e ___scrt_uninitialize_crt 11082->11085 11084 a7094a GetLastError 11083->11084 11083->11085 11084->11085 11085->11075 11089 a6b93d LeaveCriticalSection 11086->11089 11088 a708c6 11088->11078 11089->11088 11848 a6c223 11849 a6c23c 11848->11849 11850 a6c25a 11848->11850 11849->11850 11851 a68392 2 API calls 11849->11851 11851->11849 11864 a6162c 11865 a61634 11864->11865 11881 a6711c 11865->11881 11867 a6163f 11888 a61a53 11867->11888 11869 a61654 __RTC_Initialize 11879 a616b1 11869->11879 11894 a61be0 11869->11894 11870 a61d08 4 API calls 11871 a616d6 11870->11871 11873 a6166d 11873->11879 11897 a61c9a InitializeSListHead 11873->11897 11875 a61683 11898 a61ca9 11875->11898 11877 a616a6 11904 a6721e 11877->11904 11879->11870 11880 a616ce 11879->11880 11882 a6714e 11881->11882 11883 a6712b 11881->11883 11882->11867 11883->11882 11884 a679ff __dosmaperr 14 API calls 11883->11884 11885 a6713e 11884->11885 11886 a66567 __strnicoll 38 API calls 11885->11886 11887 a67149 11886->11887 11887->11867 11889 a61a63 11888->11889 11890 a61a5f 11888->11890 11891 a61a70 ___scrt_release_startup_lock 11889->11891 11892 a61d08 4 API calls 11889->11892 11890->11869 11891->11869 11893 a61ad9 11892->11893 11911 a61bb3 11894->11911 11897->11875 11946 a67756 11898->11946 11900 a61cba 11901 a61cc1 11900->11901 11902 a61d08 4 API calls 11900->11902 11901->11877 11903 a61cc9 11902->11903 11903->11877 11905 a69b5d _unexpected 38 API calls 11904->11905 11906 a67229 11905->11906 11907 a679ff __dosmaperr 14 API calls 11906->11907 11910 a67261 11906->11910 11908 a67256 11907->11908 11909 a66567 __strnicoll 38 API calls 11908->11909 11909->11910 11910->11879 11912 a61bc2 11911->11912 11913 a61bc9 11911->11913 11917 a67569 11912->11917 11920 a675e6 11913->11920 11916 a61bc7 11916->11873 11918 a675e6 41 API calls 11917->11918 11919 a6757b 11918->11919 11919->11916 11923 a67332 11920->11923 11924 a6733e __FrameHandler3::FrameUnwindToState 11923->11924 11931 a6b73c EnterCriticalSection 11924->11931 11926 a6734c 11932 a6738d 11926->11932 11928 a67359 11942 a67381 11928->11942 11931->11926 11933 a673a8 11932->11933 11934 a6741b __dosmaperr 11932->11934 11933->11934 11935 a673fb 11933->11935 11936 a6c1a4 41 API calls 11933->11936 11934->11928 11935->11934 11937 a6c1a4 41 API calls 11935->11937 11938 a673f1 11936->11938 11939 a67411 11937->11939 11940 a67a6f __freea 14 API calls 11938->11940 11941 a67a6f __freea 14 API calls 11939->11941 11940->11935 11941->11934 11945 a6b784 LeaveCriticalSection 11942->11945 11944 a6736a 11944->11916 11945->11944 11947 a67794 11946->11947 11949 a67774 11946->11949 11947->11900 11948 a679ff __dosmaperr 14 API calls 11950 a6778a 11948->11950 11949->11948 11951 a66567 __strnicoll 38 API calls 11950->11951 11951->11947 11550 a671f7 11553 a6717e 11550->11553 11554 a6718a __FrameHandler3::FrameUnwindToState 11553->11554 11561 a6b73c EnterCriticalSection 11554->11561 11556 a67194 11557 a671c2 11556->11557 11560 a6c154 __strnicoll 14 API calls 11556->11560 11562 a671e0 11557->11562 11560->11556 11561->11556 11565 a6b784 LeaveCriticalSection 11562->11565 11564 a671ce 11565->11564 9511 a616f1 9512 a616fd __FrameHandler3::FrameUnwindToState 9511->9512 9537 a61a1a 9512->9537 9514 a61704 9515 a6185d 9514->9515 9525 a6172e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 9514->9525 9581 a61d08 IsProcessorFeaturePresent 9515->9581 9517 a61864 9518 a6186a 9517->9518 9560 a67106 9517->9560 9585 a670ca 9518->9585 9522 a6174d 9523 a617ce 9548 a66d44 9523->9548 9525->9522 9525->9523 9563 a670e0 9525->9563 9527 a617d4 9552 a61040 9527->9552 9529 a617eb 9570 a61e22 GetModuleHandleW 9529->9570 9532 a617f9 9533 a61802 9532->9533 9572 a670bb 9532->9572 9575 a61b8b 9533->9575 9538 a61a23 9537->9538 9588 a61f75 IsProcessorFeaturePresent 9538->9588 9542 a61a34 9543 a61a38 9542->9543 9598 a67714 9542->9598 9543->9514 9546 a61a4f 9546->9514 9549 a66d52 9548->9549 9550 a66d4d 9548->9550 9549->9527 9670 a66a9e 9550->9670 9553 a610ab VirtualProtect FreeConsole 9552->9553 9556 a61410 9553->9556 9555 a61541 OffsetRgn 9555->9556 9556->9555 9558 a615ca CreateThread WaitForSingleObject CloseHandle 9556->9558 10302 a61010 9556->10302 9559 a61608 CatchGuardHandler 9558->9559 10755 a91c78 9558->10755 9559->9529 10765 a66eee 9560->10765 9564 a670f6 __dosmaperr 9563->9564 9565 a677b5 __FrameHandler3::FrameUnwindToState 9563->9565 9564->9523 9566 a69b5d _unexpected 38 API calls 9565->9566 9569 a677c6 9566->9569 9567 a67856 CallUnexpected 38 API calls 9568 a677f0 9567->9568 9569->9567 9571 a617f5 9570->9571 9571->9517 9571->9532 9573 a66eee CallUnexpected 23 API calls 9572->9573 9574 a670c6 9573->9574 9574->9533 9576 a61b97 9575->9576 9578 a6180b 9576->9578 10842 a67726 9576->10842 9578->9522 9579 a61ba5 9580 a6231d ___scrt_uninitialize_crt 7 API calls 9579->9580 9580->9578 9582 a61d1e CallUnexpected 9581->9582 9583 a61dc9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9582->9583 9584 a61e0d CallUnexpected 9583->9584 9584->9517 9586 a66eee CallUnexpected 23 API calls 9585->9586 9587 a61872 9586->9587 9589 a61a2f 9588->9589 9590 a622fe 9589->9590 9607 a62931 9590->9607 9594 a6230f 9595 a6231a 9594->9595 9621 a6296d 9594->9621 9595->9542 9597 a62307 9597->9542 9661 a6c22c 9598->9661 9601 a6231d 9602 a62326 9601->9602 9603 a62330 9601->9603 9604 a62916 ___vcrt_uninitialize_ptd 6 API calls 9602->9604 9603->9543 9605 a6232b 9604->9605 9606 a6296d ___vcrt_uninitialize_locks DeleteCriticalSection 9605->9606 9606->9603 9608 a6293a 9607->9608 9610 a62963 9608->9610 9612 a62303 9608->9612 9625 a62bad 9608->9625 9611 a6296d ___vcrt_uninitialize_locks DeleteCriticalSection 9610->9611 9611->9612 9612->9597 9613 a628e3 9612->9613 9642 a62abe 9613->9642 9616 a628f8 9616->9594 9619 a62913 9619->9594 9622 a62997 9621->9622 9623 a62978 9621->9623 9622->9597 9624 a62982 DeleteCriticalSection 9623->9624 9624->9622 9624->9624 9630 a629d3 9625->9630 9628 a62be5 InitializeCriticalSectionAndSpinCount 9629 a62bd0 9628->9629 9629->9608 9631 a629f0 9630->9631 9634 a629f4 9630->9634 9631->9628 9631->9629 9632 a62a5c GetProcAddress 9632->9631 9634->9631 9634->9632 9635 a62a4d 9634->9635 9637 a62a73 LoadLibraryExW 9634->9637 9635->9632 9636 a62a55 FreeLibrary 9635->9636 9636->9632 9638 a62aba 9637->9638 9639 a62a8a GetLastError 9637->9639 9638->9634 9639->9638 9640 a62a95 ___vcrt_FlsSetValue 9639->9640 9640->9638 9641 a62aab LoadLibraryExW 9640->9641 9641->9634 9643 a629d3 ___vcrt_FlsSetValue 5 API calls 9642->9643 9644 a62ad8 9643->9644 9645 a62af1 TlsAlloc 9644->9645 9646 a628ed 9644->9646 9646->9616 9647 a62b6f 9646->9647 9648 a629d3 ___vcrt_FlsSetValue 5 API calls 9647->9648 9649 a62b89 9648->9649 9650 a62ba4 TlsSetValue 9649->9650 9651 a62906 9649->9651 9650->9651 9651->9619 9652 a62916 9651->9652 9653 a62920 9652->9653 9654 a62926 9652->9654 9656 a62af9 9653->9656 9654->9616 9657 a629d3 ___vcrt_FlsSetValue 5 API calls 9656->9657 9658 a62b13 9657->9658 9659 a62b2b TlsFree 9658->9659 9660 a62b1f 9658->9660 9659->9660 9660->9654 9662 a6c23c 9661->9662 9663 a61a41 9661->9663 9662->9663 9665 a68392 9662->9665 9663->9546 9663->9601 9668 a68399 9665->9668 9666 a683dc GetStdHandle 9666->9668 9667 a6843e 9667->9662 9668->9666 9668->9667 9669 a683ef GetFileType 9668->9669 9669->9668 9671 a66aa7 9670->9671 9674 a66abd 9670->9674 9671->9674 9676 a66aca 9671->9676 9673 a66ab4 9673->9674 9693 a66c35 9673->9693 9674->9549 9677 a66ad6 9676->9677 9678 a66ad3 9676->9678 9701 a6ae1d 9677->9701 9678->9673 9683 a66ae7 9728 a67a6f 9683->9728 9684 a66af3 9734 a66b24 9684->9734 9689 a67a6f __freea 14 API calls 9690 a66b17 9689->9690 9691 a67a6f __freea 14 API calls 9690->9691 9692 a66b1d 9691->9692 9692->9673 9694 a66ca6 9693->9694 9695 a66c44 9693->9695 9694->9674 9695->9694 9696 a67a12 __dosmaperr 14 API calls 9695->9696 9697 a66caa 9695->9697 9699 a6b1e5 WideCharToMultiByte ___scrt_uninitialize_crt 9695->9699 9700 a67a6f __freea 14 API calls 9695->9700 9696->9695 9698 a67a6f __freea 14 API calls 9697->9698 9698->9694 9699->9695 9700->9695 9702 a6ae26 9701->9702 9706 a66adc 9701->9706 9756 a69c18 9702->9756 9707 a6b2d3 GetEnvironmentStringsW 9706->9707 9708 a6b2eb 9707->9708 9721 a66ae1 9707->9721 9709 a6b1e5 ___scrt_uninitialize_crt WideCharToMultiByte 9708->9709 9710 a6b308 9709->9710 9711 a6b312 FreeEnvironmentStringsW 9710->9711 9712 a6b31d 9710->9712 9711->9721 9713 a684ce 15 API calls 9712->9713 9714 a6b324 9713->9714 9715 a6b32c 9714->9715 9716 a6b33d 9714->9716 9718 a67a6f __freea 14 API calls 9715->9718 9717 a6b1e5 ___scrt_uninitialize_crt WideCharToMultiByte 9716->9717 9720 a6b34d 9717->9720 9719 a6b331 FreeEnvironmentStringsW 9718->9719 9719->9721 9722 a6b354 9720->9722 9723 a6b35c 9720->9723 9721->9683 9721->9684 9724 a67a6f __freea 14 API calls 9722->9724 9725 a67a6f __freea 14 API calls 9723->9725 9726 a6b35a FreeEnvironmentStringsW 9724->9726 9725->9726 9726->9721 9729 a67a7a HeapFree 9728->9729 9733 a66aed 9728->9733 9730 a67a8f GetLastError 9729->9730 9729->9733 9731 a67a9c __dosmaperr 9730->9731 9732 a679ff __dosmaperr 12 API calls 9731->9732 9732->9733 9733->9673 9735 a66b39 9734->9735 9736 a67a12 __dosmaperr 14 API calls 9735->9736 9737 a66b60 9736->9737 9738 a66b68 9737->9738 9743 a66b72 9737->9743 9739 a67a6f __freea 14 API calls 9738->9739 9740 a66afa 9739->9740 9740->9689 9741 a66bcf 9742 a67a6f __freea 14 API calls 9741->9742 9742->9740 9743->9741 9743->9743 9744 a67a12 __dosmaperr 14 API calls 9743->9744 9745 a66bde 9743->9745 9750 a66bf9 9743->9750 9752 a67a6f __freea 14 API calls 9743->9752 10283 a677fc 9743->10283 9744->9743 10292 a66c06 9745->10292 9749 a67a6f __freea 14 API calls 9751 a66beb 9749->9751 10298 a66577 IsProcessorFeaturePresent 9750->10298 9754 a67a6f __freea 14 API calls 9751->9754 9752->9743 9754->9740 9755 a66c05 9757 a69c23 9756->9757 9758 a69c29 9756->9758 9804 a67d99 9757->9804 9762 a69c2f 9758->9762 9809 a67dd8 9758->9809 9780 a69c34 9762->9780 9826 a67856 9762->9826 9766 a69c53 9767 a69c70 9766->9767 9768 a69c5b 9766->9768 9769 a67dd8 __dosmaperr 6 API calls 9767->9769 9770 a67dd8 __dosmaperr 6 API calls 9768->9770 9771 a69c7c 9769->9771 9772 a69c67 9770->9772 9773 a69c80 9771->9773 9774 a69c8f 9771->9774 9775 a67a6f __freea 14 API calls 9772->9775 9776 a67dd8 __dosmaperr 6 API calls 9773->9776 9821 a6998b 9774->9821 9775->9762 9776->9772 9779 a67a6f __freea 14 API calls 9779->9780 9781 a6ac28 9780->9781 10099 a6ad7d 9781->10099 9788 a6ac84 9790 a67a6f __freea 14 API calls 9788->9790 9789 a6ac92 10124 a6ae78 9789->10124 9792 a6ac6b 9790->9792 9792->9706 9793 a6acbf 9794 a6acca 9793->9794 9798 a6ace5 9793->9798 9795 a679ff __dosmaperr 14 API calls 9794->9795 9797 a6accf 9795->9797 9796 a6ad11 9799 a6ad5a 9796->9799 10133 a6a89a 9796->10133 9800 a67a6f __freea 14 API calls 9797->9800 9798->9796 9801 a67a6f __freea 14 API calls 9798->9801 9803 a67a6f __freea 14 API calls 9799->9803 9800->9792 9801->9796 9803->9792 9837 a67bdc 9804->9837 9807 a67dd0 TlsGetValue 9808 a67dbe 9808->9758 9810 a67bdc __dosmaperr 5 API calls 9809->9810 9811 a67df4 9810->9811 9812 a67e12 TlsSetValue 9811->9812 9813 a67dfd 9811->9813 9813->9762 9814 a67a12 9813->9814 9817 a67a1f __dosmaperr 9814->9817 9815 a67a5f 9855 a679ff 9815->9855 9816 a67a4a HeapAlloc 9816->9817 9818 a67a5d 9816->9818 9817->9815 9817->9816 9852 a6c2d4 9817->9852 9818->9766 9892 a6981f 9821->9892 9994 a6c42b 9826->9994 9829 a67866 9831 a67870 IsProcessorFeaturePresent 9829->9831 9836 a6788f 9829->9836 9832 a6787c 9831->9832 10024 a6636b 9832->10024 9833 a670ca CallUnexpected 23 API calls 9835 a67899 9833->9835 9836->9833 9838 a67c0a 9837->9838 9842 a67c06 9837->9842 9838->9842 9844 a67b11 9838->9844 9841 a67c24 GetProcAddress 9841->9842 9843 a67c34 __dosmaperr 9841->9843 9842->9807 9842->9808 9843->9842 9850 a67b22 ___vcrt_FlsSetValue 9844->9850 9845 a67b40 LoadLibraryExW 9847 a67bbf 9845->9847 9848 a67b5b GetLastError 9845->9848 9846 a67bb8 9846->9841 9846->9842 9847->9846 9849 a67bd1 FreeLibrary 9847->9849 9848->9850 9849->9846 9850->9845 9850->9846 9851 a67b8e LoadLibraryExW 9850->9851 9851->9847 9851->9850 9858 a6c301 9852->9858 9869 a69cae GetLastError 9855->9869 9857 a67a04 9857->9818 9859 a6c30d __FrameHandler3::FrameUnwindToState 9858->9859 9864 a6b73c EnterCriticalSection 9859->9864 9861 a6c318 9865 a6c354 9861->9865 9864->9861 9868 a6b784 LeaveCriticalSection 9865->9868 9867 a6c2df 9867->9817 9868->9867 9870 a69cc4 9869->9870 9871 a69cca 9869->9871 9873 a67d99 __dosmaperr 6 API calls 9870->9873 9872 a67dd8 __dosmaperr 6 API calls 9871->9872 9875 a69cce SetLastError 9871->9875 9874 a69ce6 9872->9874 9873->9871 9874->9875 9877 a67a12 __dosmaperr 12 API calls 9874->9877 9875->9857 9878 a69cfb 9877->9878 9879 a69d14 9878->9879 9880 a69d03 9878->9880 9882 a67dd8 __dosmaperr 6 API calls 9879->9882 9881 a67dd8 __dosmaperr 6 API calls 9880->9881 9890 a69d11 9881->9890 9883 a69d20 9882->9883 9884 a69d24 9883->9884 9885 a69d3b 9883->9885 9888 a67dd8 __dosmaperr 6 API calls 9884->9888 9887 a6998b __dosmaperr 12 API calls 9885->9887 9886 a67a6f __freea 12 API calls 9886->9875 9889 a69d46 9887->9889 9888->9890 9891 a67a6f __freea 12 API calls 9889->9891 9890->9886 9891->9875 9893 a6982b __FrameHandler3::FrameUnwindToState 9892->9893 9906 a6b73c EnterCriticalSection 9893->9906 9895 a69835 9907 a69865 9895->9907 9898 a69931 9899 a6993d __FrameHandler3::FrameUnwindToState 9898->9899 9911 a6b73c EnterCriticalSection 9899->9911 9901 a69947 9912 a69b12 9901->9912 9903 a6995f 9916 a6997f 9903->9916 9906->9895 9910 a6b784 LeaveCriticalSection 9907->9910 9909 a69853 9909->9898 9910->9909 9911->9901 9913 a69b21 __dosmaperr 9912->9913 9915 a69b48 __dosmaperr 9912->9915 9913->9915 9919 a6be87 9913->9919 9915->9903 9993 a6b784 LeaveCriticalSection 9916->9993 9918 a6996d 9918->9779 9920 a6bf07 9919->9920 9923 a6be9d 9919->9923 9922 a67a6f __freea 14 API calls 9920->9922 9946 a6bf55 9920->9946 9924 a6bf29 9922->9924 9923->9920 9925 a6bed0 9923->9925 9927 a67a6f __freea 14 API calls 9923->9927 9926 a67a6f __freea 14 API calls 9924->9926 9932 a67a6f __freea 14 API calls 9925->9932 9945 a6bef2 9925->9945 9928 a6bf3c 9926->9928 9931 a6bec5 9927->9931 9933 a67a6f __freea 14 API calls 9928->9933 9929 a67a6f __freea 14 API calls 9934 a6befc 9929->9934 9930 a6bfc3 9936 a67a6f __freea 14 API calls 9930->9936 9947 a6ba71 9931->9947 9938 a6bee7 9932->9938 9939 a6bf4a 9933->9939 9935 a67a6f __freea 14 API calls 9934->9935 9935->9920 9940 a6bfc9 9936->9940 9975 a6bb6f 9938->9975 9943 a67a6f __freea 14 API calls 9939->9943 9940->9915 9941 a6bf63 9941->9930 9944 a67a6f 14 API calls __freea 9941->9944 9943->9946 9944->9941 9945->9929 9987 a6bff8 9946->9987 9948 a6ba82 9947->9948 9974 a6bb6b 9947->9974 9949 a6ba93 9948->9949 9950 a67a6f __freea 14 API calls 9948->9950 9951 a6baa5 9949->9951 9952 a67a6f __freea 14 API calls 9949->9952 9950->9949 9953 a6bab7 9951->9953 9955 a67a6f __freea 14 API calls 9951->9955 9952->9951 9954 a6bac9 9953->9954 9956 a67a6f __freea 14 API calls 9953->9956 9957 a6badb 9954->9957 9958 a67a6f __freea 14 API calls 9954->9958 9955->9953 9956->9954 9959 a67a6f __freea 14 API calls 9957->9959 9962 a6baed 9957->9962 9958->9957 9959->9962 9960 a6bb11 9965 a6bb23 9960->9965 9966 a67a6f __freea 14 API calls 9960->9966 9961 a6baff 9961->9960 9964 a67a6f __freea 14 API calls 9961->9964 9962->9961 9963 a67a6f __freea 14 API calls 9962->9963 9963->9961 9964->9960 9967 a6bb35 9965->9967 9968 a67a6f __freea 14 API calls 9965->9968 9966->9965 9969 a6bb47 9967->9969 9971 a67a6f __freea 14 API calls 9967->9971 9968->9967 9970 a6bb59 9969->9970 9972 a67a6f __freea 14 API calls 9969->9972 9973 a67a6f __freea 14 API calls 9970->9973 9970->9974 9971->9969 9972->9970 9973->9974 9974->9925 9976 a6bb7c 9975->9976 9986 a6bbd4 9975->9986 9977 a6bb8c 9976->9977 9978 a67a6f __freea 14 API calls 9976->9978 9979 a67a6f __freea 14 API calls 9977->9979 9980 a6bb9e 9977->9980 9978->9977 9979->9980 9981 a67a6f __freea 14 API calls 9980->9981 9983 a6bbb0 9980->9983 9981->9983 9982 a6bbc2 9985 a67a6f __freea 14 API calls 9982->9985 9982->9986 9983->9982 9984 a67a6f __freea 14 API calls 9983->9984 9984->9982 9985->9986 9986->9945 9988 a6c005 9987->9988 9992 a6c024 9987->9992 9989 a6bbfd __dosmaperr 14 API calls 9988->9989 9988->9992 9990 a6c01e 9989->9990 9991 a67a6f __freea 14 API calls 9990->9991 9991->9992 9992->9941 9993->9918 10028 a6c35d 9994->10028 9997 a6c470 9998 a6c47c __FrameHandler3::FrameUnwindToState 9997->9998 9999 a69cae __dosmaperr 14 API calls 9998->9999 10000 a6c4a9 CallUnexpected 9998->10000 10003 a6c4a3 CallUnexpected 9998->10003 9999->10003 10006 a6c51c 10000->10006 10042 a6b73c EnterCriticalSection 10000->10042 10001 a6c4f0 10002 a679ff __dosmaperr 14 API calls 10001->10002 10004 a6c4f5 10002->10004 10003->10000 10003->10001 10014 a6c4da 10003->10014 10039 a66567 10004->10039 10009 a6c55e 10006->10009 10010 a6c64f 10006->10010 10021 a6c58d 10006->10021 10009->10021 10043 a69b5d GetLastError 10009->10043 10012 a6c65a 10010->10012 10074 a6b784 LeaveCriticalSection 10010->10074 10013 a670ca CallUnexpected 23 API calls 10012->10013 10016 a6c662 10013->10016 10014->9829 10018 a69b5d _unexpected 38 API calls 10022 a6c5e2 10018->10022 10020 a69b5d _unexpected 38 API calls 10020->10021 10070 a6c5fc 10021->10070 10022->10014 10023 a69b5d _unexpected 38 API calls 10022->10023 10023->10014 10025 a66387 CallUnexpected 10024->10025 10026 a663b3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10025->10026 10027 a66484 CatchGuardHandler CallUnexpected 10026->10027 10027->9836 10029 a6c369 __FrameHandler3::FrameUnwindToState 10028->10029 10034 a6b73c EnterCriticalSection 10029->10034 10031 a6c377 10035 a6c3b5 10031->10035 10034->10031 10038 a6b784 LeaveCriticalSection 10035->10038 10037 a6785b 10037->9829 10037->9997 10038->10037 10075 a664b3 10039->10075 10042->10006 10044 a69b73 10043->10044 10045 a69b79 10043->10045 10046 a67d99 __dosmaperr 6 API calls 10044->10046 10047 a67dd8 __dosmaperr 6 API calls 10045->10047 10049 a69b7d SetLastError 10045->10049 10046->10045 10048 a69b95 10047->10048 10048->10049 10051 a67a12 __dosmaperr 14 API calls 10048->10051 10053 a69c12 10049->10053 10054 a69c0d 10049->10054 10052 a69baa 10051->10052 10056 a69bb2 10052->10056 10057 a69bc3 10052->10057 10055 a67856 CallUnexpected 36 API calls 10053->10055 10054->10020 10058 a69c17 10055->10058 10059 a67dd8 __dosmaperr 6 API calls 10056->10059 10060 a67dd8 __dosmaperr 6 API calls 10057->10060 10067 a69bc0 10059->10067 10061 a69bcf 10060->10061 10062 a69bd3 10061->10062 10063 a69bea 10061->10063 10064 a67dd8 __dosmaperr 6 API calls 10062->10064 10066 a6998b __dosmaperr 14 API calls 10063->10066 10064->10067 10065 a67a6f __freea 14 API calls 10065->10049 10068 a69bf5 10066->10068 10067->10065 10069 a67a6f __freea 14 API calls 10068->10069 10069->10049 10071 a6c602 10070->10071 10072 a6c5d3 10070->10072 10098 a6b784 LeaveCriticalSection 10071->10098 10072->10014 10072->10018 10072->10022 10074->10012 10076 a664c5 __strnicoll 10075->10076 10081 a664ea 10076->10081 10078 a664dd 10092 a65190 10078->10092 10082 a66501 10081->10082 10083 a664fa 10081->10083 10085 a66342 __strnicoll GetLastError SetLastError 10082->10085 10088 a6650f 10082->10088 10084 a653a0 __strnicoll 16 API calls 10083->10084 10084->10082 10086 a66536 10085->10086 10087 a66577 __strnicoll 6 API calls 10086->10087 10086->10088 10089 a66566 10087->10089 10088->10078 10090 a664b3 __strnicoll 38 API calls 10089->10090 10091 a66573 10090->10091 10091->10078 10093 a6519c 10092->10093 10094 a651b3 10093->10094 10095 a653f0 __strnicoll 38 API calls 10093->10095 10096 a651c6 10094->10096 10097 a653f0 __strnicoll 38 API calls 10094->10097 10095->10094 10096->10014 10097->10096 10098->10072 10100 a6ad89 __FrameHandler3::FrameUnwindToState 10099->10100 10101 a6ada3 10100->10101 10141 a6b73c EnterCriticalSection 10100->10141 10104 a6ac52 10101->10104 10106 a67856 CallUnexpected 38 API calls 10101->10106 10103 a6addf 10142 a6adfc 10103->10142 10110 a6a9a8 10104->10110 10108 a6ae1c 10106->10108 10107 a6adb3 10107->10103 10109 a67a6f __freea 14 API calls 10107->10109 10109->10103 10146 a6a4a8 10110->10146 10113 a6a9db 10115 a6a9f2 10113->10115 10116 a6a9e0 GetACP 10113->10116 10114 a6a9c9 GetOEMCP 10114->10115 10115->9792 10117 a684ce 10115->10117 10116->10115 10118 a6850c 10117->10118 10122 a684dc __dosmaperr 10117->10122 10120 a679ff __dosmaperr 14 API calls 10118->10120 10119 a684f7 RtlAllocateHeap 10121 a6850a 10119->10121 10119->10122 10120->10121 10121->9788 10121->9789 10122->10118 10122->10119 10123 a6c2d4 __dosmaperr 2 API calls 10122->10123 10123->10122 10125 a6a9a8 40 API calls 10124->10125 10126 a6ae98 10125->10126 10127 a6aed5 IsValidCodePage 10126->10127 10132 a6af11 CatchGuardHandler CallUnexpected 10126->10132 10128 a6aee7 10127->10128 10127->10132 10129 a6af16 GetCPInfo 10128->10129 10130 a6aef0 CallUnexpected 10128->10130 10129->10130 10129->10132 10188 a6aa7c 10130->10188 10132->9793 10134 a6a8a6 __FrameHandler3::FrameUnwindToState 10133->10134 10257 a6b73c EnterCriticalSection 10134->10257 10136 a6a8b0 10258 a6a8e7 10136->10258 10141->10107 10145 a6b784 LeaveCriticalSection 10142->10145 10144 a6ae03 10144->10101 10145->10144 10147 a6a4c6 10146->10147 10148 a6a4bf 10146->10148 10147->10148 10149 a69b5d _unexpected 38 API calls 10147->10149 10148->10113 10148->10114 10150 a6a4e7 10149->10150 10154 a687ee 10150->10154 10155 a68801 10154->10155 10156 a68816 10154->10156 10155->10156 10162 a6c0d3 10155->10162 10158 a6884c 10156->10158 10159 a68874 10158->10159 10160 a6885f 10158->10160 10159->10148 10160->10159 10183 a6ae65 10160->10183 10163 a6c0df __FrameHandler3::FrameUnwindToState 10162->10163 10164 a69b5d _unexpected 38 API calls 10163->10164 10165 a6c0e8 10164->10165 10166 a6c12e 10165->10166 10175 a6b73c EnterCriticalSection 10165->10175 10166->10156 10168 a6c106 10176 a6c154 10168->10176 10173 a67856 CallUnexpected 38 API calls 10174 a6c153 10173->10174 10175->10168 10177 a6c162 __dosmaperr 10176->10177 10178 a6c117 10176->10178 10177->10178 10179 a6be87 __dosmaperr 14 API calls 10177->10179 10180 a6c133 10178->10180 10179->10178 10181 a6b784 CallUnexpected LeaveCriticalSection 10180->10181 10182 a6c12a 10181->10182 10182->10166 10182->10173 10184 a69b5d _unexpected 38 API calls 10183->10184 10185 a6ae6a 10184->10185 10186 a6ad7d __strnicoll 38 API calls 10185->10186 10187 a6ae75 10186->10187 10187->10159 10189 a6aaa4 GetCPInfo 10188->10189 10190 a6ab6d CatchGuardHandler 10188->10190 10189->10190 10191 a6aabc 10189->10191 10190->10132 10197 a6bce1 10191->10197 10193 a6ab24 10210 a701e2 10193->10210 10196 a701e2 42 API calls 10196->10190 10198 a6a4a8 __strnicoll 38 API calls 10197->10198 10199 a6bd01 10198->10199 10215 a6b169 10199->10215 10201 a6bdbd 10218 a6bdea 10201->10218 10202 a6bd2e 10202->10201 10204 a684ce 15 API calls 10202->10204 10205 a6bdc5 CatchGuardHandler 10202->10205 10206 a6bd53 CallUnexpected __alloca_probe_16 10202->10206 10204->10206 10205->10193 10206->10201 10207 a6b169 ___scrt_uninitialize_crt MultiByteToWideChar 10206->10207 10208 a6bd9e 10207->10208 10208->10201 10209 a6bda9 GetStringTypeW 10208->10209 10209->10201 10211 a6a4a8 __strnicoll 38 API calls 10210->10211 10212 a701f5 10211->10212 10222 a6fff4 10212->10222 10214 a6ab45 10214->10196 10216 a6b17a MultiByteToWideChar 10215->10216 10216->10202 10219 a6bdf6 10218->10219 10220 a6be07 10218->10220 10219->10220 10221 a67a6f __freea 14 API calls 10219->10221 10220->10205 10221->10220 10223 a7000f 10222->10223 10224 a6b169 ___scrt_uninitialize_crt MultiByteToWideChar 10223->10224 10226 a70055 10224->10226 10225 a701cd CatchGuardHandler 10225->10214 10226->10225 10227 a684ce 15 API calls 10226->10227 10229 a7007b __alloca_probe_16 10226->10229 10236 a70101 10226->10236 10227->10229 10228 a6bdea __freea 14 API calls 10228->10225 10230 a6b169 ___scrt_uninitialize_crt MultiByteToWideChar 10229->10230 10229->10236 10231 a700c0 10230->10231 10231->10236 10248 a67e65 10231->10248 10234 a700f2 10234->10236 10240 a67e65 6 API calls 10234->10240 10235 a7012a 10237 a701b5 10235->10237 10238 a684ce 15 API calls 10235->10238 10241 a7013c __alloca_probe_16 10235->10241 10236->10228 10239 a6bdea __freea 14 API calls 10237->10239 10238->10241 10239->10236 10240->10236 10241->10237 10242 a67e65 6 API calls 10241->10242 10243 a7017f 10242->10243 10243->10237 10254 a6b1e5 10243->10254 10245 a70199 10245->10237 10246 a701a2 10245->10246 10247 a6bdea __freea 14 API calls 10246->10247 10247->10236 10249 a67add LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 10248->10249 10250 a67e70 10249->10250 10251 a67ec2 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 10250->10251 10253 a67e76 10250->10253 10252 a67eb6 LCMapStringW 10251->10252 10252->10253 10253->10234 10253->10235 10253->10236 10255 a6b1fc WideCharToMultiByte 10254->10255 10255->10245 10257->10136 10268 a6b080 10258->10268 10260 a6a909 10261 a6b080 38 API calls 10260->10261 10262 a6a928 10261->10262 10263 a6a8bd 10262->10263 10264 a67a6f __freea 14 API calls 10262->10264 10265 a6a8db 10263->10265 10264->10263 10282 a6b784 LeaveCriticalSection 10265->10282 10267 a6a8c9 10267->9799 10269 a6b091 10268->10269 10273 a6b08d __InternalCxxFrameHandler 10268->10273 10270 a6b098 10269->10270 10275 a6b0ab CallUnexpected 10269->10275 10271 a679ff __dosmaperr 14 API calls 10270->10271 10272 a6b09d 10271->10272 10274 a66567 __strnicoll 38 API calls 10272->10274 10273->10260 10274->10273 10275->10273 10276 a6b0e2 10275->10276 10277 a6b0d9 10275->10277 10276->10273 10279 a679ff __dosmaperr 14 API calls 10276->10279 10278 a679ff __dosmaperr 14 API calls 10277->10278 10280 a6b0de 10278->10280 10279->10280 10281 a66567 __strnicoll 38 API calls 10280->10281 10281->10273 10282->10267 10284 a6780a 10283->10284 10286 a67818 10283->10286 10284->10286 10290 a67830 10284->10290 10285 a679ff __dosmaperr 14 API calls 10287 a67820 10285->10287 10286->10285 10288 a66567 __strnicoll 38 API calls 10287->10288 10289 a6782a 10288->10289 10289->9743 10290->10289 10291 a679ff __dosmaperr 14 API calls 10290->10291 10291->10287 10293 a66be4 10292->10293 10294 a66c13 10292->10294 10293->9749 10295 a66c2a 10294->10295 10296 a67a6f __freea 14 API calls 10294->10296 10297 a67a6f __freea 14 API calls 10295->10297 10296->10294 10297->10293 10299 a66583 10298->10299 10300 a6636b CallUnexpected 3 API calls 10299->10300 10301 a66598 GetCurrentProcess TerminateProcess 10300->10301 10301->9755 10303 a6101c 10302->10303 10306 a6629e 10303->10306 10307 a662b2 __strnicoll 10306->10307 10308 a662d4 10307->10308 10310 a662fb 10307->10310 10309 a664ea __strnicoll 38 API calls 10308->10309 10311 a662ef 10309->10311 10315 a645bc 10310->10315 10313 a65190 __strnicoll 38 API calls 10311->10313 10314 a61037 10313->10314 10314->9556 10316 a645c8 __FrameHandler3::FrameUnwindToState 10315->10316 10323 a64594 EnterCriticalSection 10316->10323 10318 a645d6 10324 a6520a 10318->10324 10320 a645e3 10333 a6460b 10320->10333 10323->10318 10336 a69735 10324->10336 10326 a65231 10343 a654c4 10326->10343 10332 a65292 CatchGuardHandler 10332->10320 10754 a645a8 LeaveCriticalSection 10333->10754 10335 a645f4 10335->10311 10365 a696fa 10336->10365 10338 a69746 10339 a684ce 15 API calls 10338->10339 10340 a697a9 10338->10340 10341 a697a0 10339->10341 10340->10326 10342 a67a6f __freea 14 API calls 10341->10342 10342->10340 10387 a660b6 10343->10387 10346 a654ed 10348 a664ea __strnicoll 38 API calls 10346->10348 10347 a65278 10358 a651cc 10347->10358 10348->10347 10351 a65518 10351->10347 10354 a656f5 10351->10354 10393 a66040 10351->10393 10400 a6544c 10351->10400 10403 a65770 10351->10403 10435 a658ce 10351->10435 10355 a664ea __strnicoll 38 API calls 10354->10355 10356 a65711 10355->10356 10357 a664ea __strnicoll 38 API calls 10356->10357 10357->10347 10359 a67a6f __freea 14 API calls 10358->10359 10360 a651dc 10359->10360 10361 a697e1 10360->10361 10362 a697ec 10361->10362 10363 a69807 10361->10363 10362->10363 10663 a681c5 10362->10663 10363->10332 10366 a69706 10365->10366 10370 a69727 10366->10370 10371 a69691 10366->10371 10368 a69721 10378 a6f8fd 10368->10378 10370->10338 10372 a696b2 10371->10372 10373 a6969d 10371->10373 10372->10368 10374 a679ff __dosmaperr 14 API calls 10373->10374 10375 a696a2 10374->10375 10376 a66567 __strnicoll 38 API calls 10375->10376 10377 a696ad 10376->10377 10377->10368 10379 a6f917 10378->10379 10380 a6f90a 10378->10380 10383 a6f923 10379->10383 10384 a679ff __dosmaperr 14 API calls 10379->10384 10381 a679ff __dosmaperr 14 API calls 10380->10381 10382 a6f90f 10381->10382 10382->10370 10383->10370 10385 a6f944 10384->10385 10386 a66567 __strnicoll 38 API calls 10385->10386 10386->10382 10388 a660e3 10387->10388 10389 a660c1 10387->10389 10462 a660ee 10388->10462 10391 a664ea __strnicoll 38 API calls 10389->10391 10392 a654df 10391->10392 10392->10346 10392->10347 10392->10351 10470 a653f0 10393->10470 10509 a64712 10400->10509 10402 a65487 10402->10351 10404 a65777 10403->10404 10405 a6578e 10403->10405 10407 a658f2 10404->10407 10408 a65963 10404->10408 10409 a657cd 10404->10409 10406 a664ea __strnicoll 38 API calls 10405->10406 10405->10409 10410 a657c2 10406->10410 10411 a65990 10407->10411 10412 a658f8 10407->10412 10413 a659b6 10408->10413 10414 a65968 10408->10414 10409->10351 10410->10351 10551 a64abc 10411->10551 10419 a65935 10412->10419 10422 a658fe 10412->10422 10413->10411 10413->10419 10433 a6591a 10413->10433 10415 a659aa 10414->10415 10416 a6596a 10414->10416 10568 a65f84 10415->10568 10420 a6590c 10416->10420 10421 a6596f 10416->10421 10434 a6592e CatchGuardHandler 10419->10434 10532 a64c39 10419->10532 10420->10433 10420->10434 10558 a65cc4 10420->10558 10421->10411 10425 a65974 10421->10425 10422->10420 10424 a6594a 10422->10424 10422->10433 10424->10434 10539 a65e4e 10424->10539 10427 a65987 10425->10427 10428 a65979 10425->10428 10547 a65ee3 10427->10547 10428->10434 10543 a65f67 10428->10543 10433->10434 10571 a693f4 10433->10571 10434->10351 10436 a658f2 10435->10436 10437 a65963 10435->10437 10438 a65990 10436->10438 10439 a658f8 10436->10439 10440 a659b6 10437->10440 10441 a65968 10437->10441 10445 a64abc 39 API calls 10438->10445 10444 a65935 10439->10444 10449 a658fe 10439->10449 10440->10438 10440->10444 10460 a6591a 10440->10460 10442 a659aa 10441->10442 10443 a6596a 10441->10443 10447 a65f84 39 API calls 10442->10447 10446 a6596f 10443->10446 10456 a6590c 10443->10456 10452 a64c39 39 API calls 10444->10452 10461 a6592e CatchGuardHandler 10444->10461 10445->10460 10446->10438 10451 a65974 10446->10451 10447->10460 10448 a6594a 10455 a65e4e 40 API calls 10448->10455 10448->10461 10449->10448 10449->10456 10449->10460 10450 a65cc4 41 API calls 10450->10460 10453 a65987 10451->10453 10457 a65979 10451->10457 10452->10460 10454 a65ee3 38 API calls 10453->10454 10454->10460 10455->10460 10456->10450 10456->10460 10456->10461 10458 a65f67 39 API calls 10457->10458 10457->10461 10458->10460 10459 a693f4 40 API calls 10459->10460 10460->10459 10460->10461 10461->10351 10463 a66102 10462->10463 10469 a6616c 10462->10469 10464 a69691 ___scrt_uninitialize_crt 38 API calls 10463->10464 10465 a66109 10464->10465 10466 a679ff __dosmaperr 14 API calls 10465->10466 10465->10469 10467 a66161 10466->10467 10468 a66567 __strnicoll 38 API calls 10467->10468 10468->10469 10469->10392 10471 a653fe GetLastError 10470->10471 10472 a6543f 10470->10472 10473 a6540d 10471->10473 10479 a6881b 10472->10479 10487 a69d5f 10473->10487 10476 a65446 10477 a67856 CallUnexpected 36 API calls 10476->10477 10478 a6544b 10477->10478 10480 a68832 10479->10480 10481 a6606d 10479->10481 10480->10481 10482 a6c0d3 __strnicoll 38 API calls 10480->10482 10483 a68879 10481->10483 10482->10481 10484 a6607a 10483->10484 10485 a68890 10483->10485 10484->10351 10485->10484 10486 a6ae65 __strnicoll 38 API calls 10485->10486 10486->10484 10488 a69d72 10487->10488 10489 a69d78 10487->10489 10491 a67d99 __dosmaperr 6 API calls 10488->10491 10490 a67dd8 __dosmaperr 6 API calls 10489->10490 10508 a6542a SetLastError 10489->10508 10492 a69d92 10490->10492 10491->10489 10493 a67a12 __dosmaperr 14 API calls 10492->10493 10492->10508 10494 a69da2 10493->10494 10495 a69dbf 10494->10495 10496 a69daa 10494->10496 10497 a67dd8 __dosmaperr 6 API calls 10495->10497 10498 a67dd8 __dosmaperr 6 API calls 10496->10498 10499 a69dcb 10497->10499 10500 a69db6 10498->10500 10501 a69dde 10499->10501 10502 a69dcf 10499->10502 10505 a67a6f __freea 14 API calls 10500->10505 10504 a6998b __dosmaperr 14 API calls 10501->10504 10503 a67dd8 __dosmaperr 6 API calls 10502->10503 10503->10500 10506 a69de9 10504->10506 10505->10508 10507 a67a6f __freea 14 API calls 10506->10507 10507->10508 10508->10472 10508->10476 10519 a6609b 10509->10519 10511 a64724 10512 a64739 10511->10512 10515 a6476c 10511->10515 10518 a64754 10511->10518 10513 a664ea __strnicoll 38 API calls 10512->10513 10513->10518 10514 a64803 10516 a6600b 38 API calls 10514->10516 10515->10514 10526 a6600b 10515->10526 10516->10518 10518->10402 10520 a660b3 10519->10520 10521 a660a0 10519->10521 10520->10511 10522 a679ff __dosmaperr 14 API calls 10521->10522 10523 a660a5 10522->10523 10524 a66567 __strnicoll 38 API calls 10523->10524 10525 a660b0 10524->10525 10525->10511 10527 a66030 10526->10527 10528 a6601c 10526->10528 10527->10514 10528->10527 10529 a679ff __dosmaperr 14 API calls 10528->10529 10530 a66025 10529->10530 10531 a66567 __strnicoll 38 API calls 10530->10531 10531->10527 10533 a64c4d 10532->10533 10534 a64c6f 10533->10534 10536 a64c96 10533->10536 10535 a664ea __strnicoll 38 API calls 10534->10535 10538 a64c8c 10535->10538 10536->10538 10581 a6462f 10536->10581 10538->10433 10540 a65e69 10539->10540 10541 a65ea0 10540->10541 10542 a693f4 40 API calls 10540->10542 10541->10433 10542->10541 10544 a65f73 10543->10544 10595 a6493f 10544->10595 10546 a65f83 10546->10433 10550 a65ef8 10547->10550 10548 a664ea __strnicoll 38 API calls 10549 a65f19 10548->10549 10549->10433 10550->10548 10550->10549 10552 a64ad0 10551->10552 10553 a64af2 10552->10553 10554 a64b19 10552->10554 10555 a664ea __strnicoll 38 API calls 10553->10555 10556 a64b0f 10554->10556 10557 a6462f 15 API calls 10554->10557 10555->10556 10556->10433 10557->10556 10559 a65cde 10558->10559 10560 a6462f 15 API calls 10559->10560 10561 a65d1f 10560->10561 10602 a69273 10561->10602 10564 a65dcd 10566 a66040 ___scrt_uninitialize_crt 38 API calls 10564->10566 10567 a65e00 10564->10567 10565 a66040 ___scrt_uninitialize_crt 38 API calls 10565->10564 10566->10567 10567->10433 10569 a64c39 39 API calls 10568->10569 10570 a65f99 10569->10570 10570->10433 10572 a69409 10571->10572 10573 a6944a 10572->10573 10574 a66040 ___scrt_uninitialize_crt 38 API calls 10572->10574 10578 a6940d CallUnexpected 10572->10578 10580 a69436 CallUnexpected 10572->10580 10576 a6b1e5 ___scrt_uninitialize_crt WideCharToMultiByte 10573->10576 10573->10578 10573->10580 10574->10573 10575 a664ea __strnicoll 38 API calls 10575->10578 10577 a69505 10576->10577 10577->10578 10579 a6951b GetLastError 10577->10579 10578->10433 10579->10578 10579->10580 10580->10575 10580->10578 10582 a64656 10581->10582 10583 a64644 10581->10583 10582->10583 10584 a684ce 15 API calls 10582->10584 10583->10538 10585 a6467a 10584->10585 10586 a64682 10585->10586 10587 a6468d 10585->10587 10588 a67a6f __freea 14 API calls 10586->10588 10592 a651e6 10587->10592 10588->10583 10591 a67a6f __freea 14 API calls 10591->10583 10593 a67a6f __freea 14 API calls 10592->10593 10594 a64698 10593->10594 10594->10591 10596 a64953 10595->10596 10597 a64975 10596->10597 10600 a6499c 10596->10600 10598 a664ea __strnicoll 38 API calls 10597->10598 10599 a64992 10598->10599 10599->10546 10600->10599 10601 a6462f 15 API calls 10600->10601 10601->10599 10603 a692a8 10602->10603 10605 a69284 10602->10605 10603->10605 10606 a692db 10603->10606 10604 a664ea __strnicoll 38 API calls 10616 a65da9 10604->10616 10605->10604 10607 a69343 10606->10607 10609 a69314 10606->10609 10608 a69371 10607->10608 10610 a6936c 10607->10610 10629 a689af 10608->10629 10621 a69117 10609->10621 10613 a693d3 10610->10613 10614 a69399 10610->10614 10656 a68cdb 10613->10656 10617 a6939e 10614->10617 10618 a693b9 10614->10618 10616->10564 10616->10565 10639 a69048 10617->10639 10649 a68ec4 10618->10649 10622 a6912d 10621->10622 10623 a69138 10621->10623 10622->10616 10624 a677fc ___std_exception_copy 38 API calls 10623->10624 10625 a69193 10624->10625 10626 a6919d 10625->10626 10627 a66577 __strnicoll 6 API calls 10625->10627 10626->10616 10628 a691ab 10627->10628 10630 a689c2 10629->10630 10631 a689f3 10630->10631 10632 a689d1 10630->10632 10634 a68a0d 10631->10634 10636 a68a62 10631->10636 10633 a664ea __strnicoll 38 API calls 10632->10633 10638 a689e9 __alldvrm CallUnexpected _strrchr 10633->10638 10635 a68cdb 40 API calls 10634->10635 10635->10638 10637 a66040 ___scrt_uninitialize_crt 38 API calls 10636->10637 10636->10638 10637->10638 10638->10616 10640 a6df38 40 API calls 10639->10640 10641 a69078 10640->10641 10642 a6d9ab 38 API calls 10641->10642 10643 a690b6 10642->10643 10644 a690bd 10643->10644 10645 a690f6 10643->10645 10646 a690cf 10643->10646 10644->10616 10647 a68d7f 38 API calls 10645->10647 10648 a68f5a 38 API calls 10646->10648 10647->10644 10648->10644 10650 a6df38 40 API calls 10649->10650 10651 a68ef3 10650->10651 10652 a6d9ab 38 API calls 10651->10652 10653 a68f34 10652->10653 10654 a68f5a 38 API calls 10653->10654 10655 a68f3b 10653->10655 10654->10655 10655->10616 10657 a6df38 40 API calls 10656->10657 10658 a68d05 10657->10658 10659 a6d9ab 38 API calls 10658->10659 10660 a68d53 10659->10660 10661 a68d5a 10660->10661 10662 a68d7f 38 API calls 10660->10662 10661->10616 10662->10661 10664 a681de 10663->10664 10665 a68205 10663->10665 10664->10665 10666 a69691 ___scrt_uninitialize_crt 38 API calls 10664->10666 10665->10363 10667 a681fa 10666->10667 10669 a6d625 10667->10669 10672 a6d631 __FrameHandler3::FrameUnwindToState 10669->10672 10670 a6d639 10670->10665 10671 a6d6f5 10673 a664ea __strnicoll 38 API calls 10671->10673 10672->10670 10672->10671 10674 a6d686 10672->10674 10673->10670 10680 a6b91a EnterCriticalSection 10674->10680 10676 a6d68c 10677 a6d6a9 10676->10677 10681 a6d72d 10676->10681 10709 a6d6ed 10677->10709 10680->10676 10682 a6d752 10681->10682 10700 a6d775 ___scrt_uninitialize_crt 10681->10700 10683 a6d756 10682->10683 10685 a6d7b4 10682->10685 10684 a664ea __strnicoll 38 API calls 10683->10684 10684->10700 10686 a6d7cb 10685->10686 10724 a709c7 10685->10724 10712 a6d2b1 10686->10712 10690 a6d81b 10694 a6d87e WriteFile 10690->10694 10695 a6d82f 10690->10695 10691 a6d7db 10692 a6d805 10691->10692 10693 a6d7e2 10691->10693 10732 a6ce77 GetConsoleOutputCP 10692->10732 10693->10700 10727 a6d249 10693->10727 10697 a6d8a0 GetLastError 10694->10697 10708 a6d816 10694->10708 10698 a6d837 10695->10698 10699 a6d86c 10695->10699 10697->10708 10703 a6d83c 10698->10703 10704 a6d85a 10698->10704 10719 a6d32f 10699->10719 10700->10677 10703->10700 10705 a6d845 10703->10705 10747 a6d4f3 10704->10747 10742 a6d40a 10705->10742 10708->10700 10753 a6b93d LeaveCriticalSection 10709->10753 10711 a6d6f3 10711->10670 10713 a6f8fd ___scrt_uninitialize_crt 38 API calls 10712->10713 10714 a6d2c3 10713->10714 10715 a6d2f1 10714->10715 10716 a66040 ___scrt_uninitialize_crt 38 API calls 10714->10716 10718 a6d324 10714->10718 10717 a6d30b GetConsoleMode 10715->10717 10715->10718 10716->10715 10717->10718 10718->10690 10718->10691 10723 a6d33e ___scrt_uninitialize_crt 10719->10723 10720 a6d3ef CatchGuardHandler 10720->10700 10721 a6d3ae WriteFile 10722 a6d3f1 GetLastError 10721->10722 10721->10723 10722->10720 10723->10720 10723->10721 10725 a70904 ___scrt_uninitialize_crt 40 API calls 10724->10725 10726 a709e0 10725->10726 10726->10686 10728 a6d2a0 10727->10728 10731 a6d26b 10727->10731 10728->10700 10729 a709e5 5 API calls ___scrt_uninitialize_crt 10729->10731 10730 a6d2a2 GetLastError 10730->10728 10731->10728 10731->10729 10731->10730 10733 a6cee9 10732->10733 10738 a6cef0 __InternalCxxFrameHandler ___scrt_uninitialize_crt 10732->10738 10734 a66040 ___scrt_uninitialize_crt 38 API calls 10733->10734 10734->10738 10735 a6955e 39 API calls ___scrt_uninitialize_crt 10735->10738 10736 a6d1ad CatchGuardHandler 10736->10708 10736->10736 10737 a6b1e5 ___scrt_uninitialize_crt WideCharToMultiByte 10737->10738 10738->10735 10738->10736 10738->10737 10739 a6d128 WriteFile 10738->10739 10741 a6d168 WriteFile 10738->10741 10739->10738 10740 a6d220 GetLastError 10739->10740 10740->10736 10741->10738 10741->10740 10744 a6d419 ___scrt_uninitialize_crt 10742->10744 10743 a6d48e WriteFile 10743->10744 10745 a6d4da GetLastError 10743->10745 10744->10743 10746 a6d4d8 CatchGuardHandler 10744->10746 10745->10746 10746->10700 10750 a6d502 ___scrt_uninitialize_crt 10747->10750 10748 a6d60a CatchGuardHandler 10748->10708 10749 a6b1e5 ___scrt_uninitialize_crt WideCharToMultiByte 10749->10750 10750->10748 10750->10749 10751 a6d60c GetLastError 10750->10751 10752 a6d5c1 WriteFile 10750->10752 10751->10748 10752->10750 10752->10751 10753->10711 10754->10335 10757 a91c7d 10755->10757 10760 a91cb5 10757->10760 10758 a91dc3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 10759 a91e92 WriteProcessMemory 10758->10759 10758->10760 10761 a91ed7 10759->10761 10760->10758 10764 a91e82 TerminateProcess 10760->10764 10762 a91f19 WriteProcessMemory Wow64SetThreadContext ResumeThread 10761->10762 10763 a91edc WriteProcessMemory 10761->10763 10763->10761 10764->10758 10766 a66f2d 10765->10766 10767 a66f1b 10765->10767 10777 a66db6 10766->10777 10792 a66fb6 GetModuleHandleW 10767->10792 10772 a66f6a 10772->9518 10776 a66f7f 10778 a66dc2 __FrameHandler3::FrameUnwindToState 10777->10778 10800 a6b73c EnterCriticalSection 10778->10800 10780 a66dcc 10801 a66e03 10780->10801 10782 a66dd9 10805 a66df7 10782->10805 10785 a66f85 10830 a66ff9 10785->10830 10788 a66fa3 10790 a6701b CallUnexpected 3 API calls 10788->10790 10789 a66f93 GetCurrentProcess TerminateProcess 10789->10788 10791 a66fab ExitProcess 10790->10791 10793 a66f20 10792->10793 10793->10766 10794 a6701b GetModuleHandleExW 10793->10794 10795 a6705a GetProcAddress 10794->10795 10796 a6707b 10794->10796 10795->10796 10797 a6706e 10795->10797 10798 a67081 FreeLibrary 10796->10798 10799 a66f2c 10796->10799 10797->10796 10798->10799 10799->10766 10800->10780 10802 a66e0f __FrameHandler3::FrameUnwindToState 10801->10802 10804 a66e76 CallUnexpected 10802->10804 10808 a6757f 10802->10808 10804->10782 10829 a6b784 LeaveCriticalSection 10805->10829 10807 a66de5 10807->10772 10807->10785 10809 a6758b __EH_prolog3 10808->10809 10812 a672d7 10809->10812 10811 a675b2 CallUnexpected 10811->10804 10813 a672e3 __FrameHandler3::FrameUnwindToState 10812->10813 10820 a6b73c EnterCriticalSection 10813->10820 10815 a672f1 10821 a6748f 10815->10821 10820->10815 10822 a674ae 10821->10822 10823 a672fe 10821->10823 10822->10823 10824 a67a6f __freea 14 API calls 10822->10824 10825 a67326 10823->10825 10824->10823 10828 a6b784 LeaveCriticalSection 10825->10828 10827 a6730f 10827->10811 10828->10827 10829->10807 10835 a6b79b GetPEB 10830->10835 10833 a67003 GetPEB 10834 a66f8f 10833->10834 10834->10788 10834->10789 10836 a6b7b5 10835->10836 10838 a66ffe 10835->10838 10839 a67c5f 10836->10839 10838->10833 10838->10834 10840 a67bdc __dosmaperr 5 API calls 10839->10840 10841 a67c7b 10840->10841 10841->10838 10844 a67731 10842->10844 10845 a67743 ___scrt_uninitialize_crt 10842->10845 10843 a6773f 10843->9579 10844->10843 10847 a68293 10844->10847 10845->9579 10850 a68120 10847->10850 10853 a68074 10850->10853 10854 a68080 __FrameHandler3::FrameUnwindToState 10853->10854 10861 a6b73c EnterCriticalSection 10854->10861 10856 a6808a ___scrt_uninitialize_crt 10857 a680f6 10856->10857 10862 a67fe8 10856->10862 10870 a68114 10857->10870 10861->10856 10863 a67ff4 __FrameHandler3::FrameUnwindToState 10862->10863 10873 a64594 EnterCriticalSection 10863->10873 10865 a68037 10887 a68068 10865->10887 10866 a67ffe ___scrt_uninitialize_crt 10866->10865 10874 a6822e 10866->10874 10935 a6b784 LeaveCriticalSection 10870->10935 10872 a68102 10872->10843 10873->10866 10875 a68243 __strnicoll 10874->10875 10876 a68255 10875->10876 10877 a6824a 10875->10877 10879 a681c5 ___scrt_uninitialize_crt 63 API calls 10876->10879 10878 a68120 ___scrt_uninitialize_crt 67 API calls 10877->10878 10886 a68250 10878->10886 10880 a6825f 10879->10880 10883 a69691 ___scrt_uninitialize_crt 38 API calls 10880->10883 10880->10886 10881 a65190 __strnicoll 38 API calls 10882 a6828d 10881->10882 10882->10865 10884 a68276 10883->10884 10890 a6cdfa 10884->10890 10886->10881 10934 a645a8 LeaveCriticalSection 10887->10934 10889 a68056 10889->10856 10891 a6ce0b 10890->10891 10895 a6ce18 10890->10895 10892 a679ff __dosmaperr 14 API calls 10891->10892 10900 a6ce10 10892->10900 10893 a6ce61 10894 a679ff __dosmaperr 14 API calls 10893->10894 10896 a6ce66 10894->10896 10895->10893 10897 a6ce3f 10895->10897 10899 a66567 __strnicoll 38 API calls 10896->10899 10901 a6cd58 10897->10901 10899->10900 10900->10886 10902 a6cd64 __FrameHandler3::FrameUnwindToState 10901->10902 10914 a6b91a EnterCriticalSection 10902->10914 10904 a6cd73 10912 a6cdb8 10904->10912 10915 a6b9f1 10904->10915 10905 a679ff __dosmaperr 14 API calls 10907 a6cdbf 10905->10907 10931 a6cdee 10907->10931 10908 a6cd9f FlushFileBuffers 10908->10907 10909 a6cdab GetLastError 10908->10909 10928 a679ec 10909->10928 10912->10905 10914->10904 10916 a6b9fe 10915->10916 10920 a6ba13 10915->10920 10917 a679ec __dosmaperr 14 API calls 10916->10917 10919 a6ba03 10917->10919 10918 a679ec __dosmaperr 14 API calls 10921 a6ba43 10918->10921 10922 a679ff __dosmaperr 14 API calls 10919->10922 10920->10918 10923 a6ba38 10920->10923 10924 a679ff __dosmaperr 14 API calls 10921->10924 10925 a6ba0b 10922->10925 10923->10908 10926 a6ba4b 10924->10926 10925->10908 10927 a66567 __strnicoll 38 API calls 10926->10927 10927->10925 10929 a69cae __dosmaperr 14 API calls 10928->10929 10930 a679f1 10929->10930 10930->10912 10932 a6b93d ___scrt_uninitialize_crt LeaveCriticalSection 10931->10932 10933 a6cdd7 10932->10933 10933->10900 10934->10889 10935->10872 12224 a68442 12225 a6844e __FrameHandler3::FrameUnwindToState 12224->12225 12236 a6b73c EnterCriticalSection 12225->12236 12227 a68455 12237 a6b87c 12227->12237 12230 a68473 12256 a68499 12230->12256 12235 a68392 2 API calls 12235->12230 12236->12227 12238 a6b888 __FrameHandler3::FrameUnwindToState 12237->12238 12239 a6b8b2 12238->12239 12240 a6b891 12238->12240 12259 a6b73c EnterCriticalSection 12239->12259 12242 a679ff __dosmaperr 14 API calls 12240->12242 12243 a6b896 12242->12243 12244 a66567 __strnicoll 38 API calls 12243->12244 12246 a68464 12244->12246 12245 a6b8ea 12267 a6b911 12245->12267 12246->12230 12250 a682dc GetStartupInfoW 12246->12250 12247 a6b8be 12247->12245 12260 a6b7cc 12247->12260 12251 a6838d 12250->12251 12252 a682f9 12250->12252 12251->12235 12252->12251 12253 a6b87c 39 API calls 12252->12253 12254 a68321 12253->12254 12254->12251 12255 a68351 GetFileType 12254->12255 12255->12254 12271 a6b784 LeaveCriticalSection 12256->12271 12258 a68484 12259->12247 12261 a67a12 __dosmaperr 14 API calls 12260->12261 12262 a6b7de 12261->12262 12264 a67e1a 6 API calls 12262->12264 12266 a6b7eb 12262->12266 12263 a67a6f __freea 14 API calls 12265 a6b840 12263->12265 12264->12262 12265->12247 12266->12263 12270 a6b784 LeaveCriticalSection 12267->12270 12269 a6b918 12269->12246 12270->12269 12271->12258 12282 a64548 12283 a68293 ___scrt_uninitialize_crt 67 API calls 12282->12283 12284 a64550 12283->12284 12292 a67f3d 12284->12292 12286 a64555 12302 a6829c 12286->12302 12289 a6457f 12290 a67a6f __freea 14 API calls 12289->12290 12291 a6458a 12290->12291 12293 a67f49 __FrameHandler3::FrameUnwindToState 12292->12293 12306 a6b73c EnterCriticalSection 12293->12306 12295 a67fc0 12313 a67fdf 12295->12313 12298 a67f94 DeleteCriticalSection 12299 a67a6f __freea 14 API calls 12298->12299 12301 a67f54 12299->12301 12301->12295 12301->12298 12307 a6cd28 12301->12307 12303 a682b3 12302->12303 12305 a64564 DeleteCriticalSection 12302->12305 12304 a67a6f __freea 14 API calls 12303->12304 12303->12305 12304->12305 12305->12286 12305->12289 12306->12301 12308 a6cd3b __strnicoll 12307->12308 12316 a6cc03 12308->12316 12310 a6cd47 12311 a65190 __strnicoll 38 API calls 12310->12311 12312 a6cd53 12311->12312 12312->12301 12388 a6b784 LeaveCriticalSection 12313->12388 12315 a67fcc 12315->12286 12317 a6cc0f __FrameHandler3::FrameUnwindToState 12316->12317 12318 a6cc3c 12317->12318 12319 a6cc19 12317->12319 12321 a6cc34 12318->12321 12327 a64594 EnterCriticalSection 12318->12327 12320 a664ea __strnicoll 38 API calls 12319->12320 12320->12321 12321->12310 12323 a6cc5a 12328 a6cc9a 12323->12328 12325 a6cc67 12342 a6cc92 12325->12342 12327->12323 12329 a6cca7 12328->12329 12331 a6ccca 12328->12331 12330 a664ea __strnicoll 38 API calls 12329->12330 12332 a6ccc2 12330->12332 12331->12332 12333 a681c5 ___scrt_uninitialize_crt 63 API calls 12331->12333 12332->12325 12334 a6cce2 12333->12334 12335 a6829c 14 API calls 12334->12335 12336 a6ccea 12335->12336 12337 a69691 ___scrt_uninitialize_crt 38 API calls 12336->12337 12338 a6ccf6 12337->12338 12345 a70660 12338->12345 12341 a67a6f __freea 14 API calls 12341->12332 12387 a645a8 LeaveCriticalSection 12342->12387 12344 a6cc98 12344->12321 12346 a70689 12345->12346 12351 a6ccfd 12345->12351 12347 a706d8 12346->12347 12349 a706b0 12346->12349 12348 a664ea __strnicoll 38 API calls 12347->12348 12348->12351 12352 a705cf 12349->12352 12351->12332 12351->12341 12353 a705db __FrameHandler3::FrameUnwindToState 12352->12353 12360 a6b91a EnterCriticalSection 12353->12360 12355 a705e9 12356 a7061a 12355->12356 12361 a70703 12355->12361 12374 a70654 12356->12374 12360->12355 12362 a6b9f1 ___scrt_uninitialize_crt 38 API calls 12361->12362 12365 a70713 12362->12365 12363 a70719 12377 a6b960 12363->12377 12365->12363 12366 a6b9f1 ___scrt_uninitialize_crt 38 API calls 12365->12366 12373 a7074b 12365->12373 12369 a70742 12366->12369 12367 a6b9f1 ___scrt_uninitialize_crt 38 API calls 12368 a70757 CloseHandle 12367->12368 12368->12363 12370 a70763 GetLastError 12368->12370 12371 a6b9f1 ___scrt_uninitialize_crt 38 API calls 12369->12371 12370->12363 12371->12373 12372 a70771 ___scrt_uninitialize_crt 12372->12356 12373->12363 12373->12367 12386 a6b93d LeaveCriticalSection 12374->12386 12376 a7063d 12376->12351 12378 a6b9d6 12377->12378 12380 a6b96f 12377->12380 12379 a679ff __dosmaperr 14 API calls 12378->12379 12381 a6b9db 12379->12381 12380->12378 12385 a6b999 12380->12385 12382 a679ec __dosmaperr 14 API calls 12381->12382 12383 a6b9c6 12382->12383 12383->12372 12384 a6b9c0 SetStdHandle 12384->12383 12385->12383 12385->12384 12386->12376 12387->12344 12388->12315

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00A91DEC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00A91DFF
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00A91E1D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A91E41
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00A91E6C
                                  • TerminateProcess.KERNELBASE(?,00000000), ref: 00A91E8B
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00A91EC4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00A91F0F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A91F4D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 00A91F89
                                  • ResumeThread.KERNELBASE(?), ref: 00A91F98
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2440066154-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: 22f75ff730e6f4b060e6e2ef8288f678888291d98d3af143d4429c23ccc79382
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: 2EB1D57664028AAFDB60CF68CC80BDA77E5FF88714F158524EA08AB341D774FA518B94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 22 a61040-a610a9 23 a610d3-a610dd 22->23 24 a610ab-a610b1 22->24 27 a610df-a610e9 23->27 25 a61103-a61110 24->25 26 a610b3-a610d1 24->26 29 a61113-a61133 25->29 26->27 27->25 28 a610eb-a610ee 27->28 30 a610f0-a61101 28->30 31 a6115c-a61176 28->31 29->31 32 a61135-a61138 29->32 30->29 35 a6117a-a6117d 31->35 33 a61196-a6119d 32->33 34 a6113a-a6115a 32->34 37 a611a3-a611b2 33->37 34->35 35->33 36 a6117f-a61182 35->36 38 a611d4-a611e8 36->38 39 a61184-a61194 36->39 37->38 40 a611b4-a611d2 37->40 41 a611ec-a611f0 38->41 39->37 40->41 42 a611f2-a61211 41->42 43 a61213-a61219 41->43 44 a6121b-a6121e 42->44 43->44 45 a61220-a61225 44->45 46 a6122d-a61244 44->46 47 a61227-a6122b 45->47 48 a61299-a612ac 45->48 49 a61246-a6126b 46->49 47->49 51 a612b0-a612d2 48->51 49->48 50 a6126d-a61273 49->50 52 a612e4-a612e6 50->52 53 a61275-a61297 50->53 51->52 54 a612d4-a612e2 51->54 55 a612ea-a61309 52->55 53->51 54->55 56 a61315-a6131e 55->56 57 a6130b-a61313 55->57 58 a61320-a61330 56->58 57->58 59 a61332-a61338 58->59 60 a6135a 58->60 61 a6133a-a61358 59->61 62 a6137b-a61390 59->62 63 a6135f-a61364 60->63 61->63 65 a61393-a61399 62->65 63->62 64 a61366-a6136c 63->64 66 a613b3-a613bb 64->66 67 a6136e-a61379 64->67 65->66 68 a6139b-a613b1 65->68 69 a613be-a6140a VirtualProtect FreeConsole 66->69 67->65 68->69 70 a61410-a6145d 69->70 70->70 71 a6145f-a61464 70->71 72 a61466 71->72 73 a6149f 71->73 74 a61470-a6149d 72->74 75 a614a1-a614cd 73->75 74->73 74->74 75->75 76 a614cf-a614d7 75->76 77 a614e0-a614f9 76->77 78 a61503-a6151f 77->78 79 a614fb-a61502 77->79 78->77 80 a61521-a6152a 78->80 79->78 81 a61530-a61537 80->81 82 a61541-a61567 OffsetRgn 81->82 83 a61539-a61540 81->83 84 a61570-a615c4 call a61010 82->84 85 a61569-a6156f 82->85 83->82 84->81 88 a615ca-a61603 CreateThread WaitForSingleObject CloseHandle call a61610 84->88 85->84 90 a61608-a6160f 88->90
                                  APIs
                                  • VirtualProtect.KERNELBASE(00A91AF0,000004AC,00000040,?), ref: 00A613D2
                                  • FreeConsole.KERNEL32 ref: 00A613D8
                                  • OffsetRgn.GDI32(00000000,00000000,00000000), ref: 00A6154A
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00031C78,00A7B8F0,00000000,?), ref: 00A615DE
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00A615E9
                                  • CloseHandle.KERNEL32(00000000), ref: 00A615F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: CloseConsoleCreateFreeHandleObjectOffsetProtectSingleThreadVirtualWait
                                  • String ID: C
                                  • API String ID: 3676713088-1037565863
                                  • Opcode ID: d8e3c2cd16a89999e27890720f44ddd1699f9c691888e1299dd1a94eb47b9cc3
                                  • Instruction ID: 9c7d5eca350ff6a3c2922120910afebeedcc87af27d7e0dbbd36ba87e18de4f8
                                  • Opcode Fuzzy Hash: d8e3c2cd16a89999e27890720f44ddd1699f9c691888e1299dd1a94eb47b9cc3
                                  • Instruction Fuzzy Hash: 54D1F02352091A0AF3049B7A8C563F67EB5EF56364F9D4336EEBAD73E2D7280542C244
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b0a67a22df8ded71e183b6d3aee453c070db472df862139261e9af044e7a5a5
                                  • Instruction ID: efd9df761475b4ccb711a17739c0f57e97d6a6f605f204ef833f12e67faa905b
                                  • Opcode Fuzzy Hash: 7b0a67a22df8ded71e183b6d3aee453c070db472df862139261e9af044e7a5a5
                                  • Instruction Fuzzy Hash: BEE08C32922268EFCB14DB88CA0498AF3FCEB84F40B1104AAB501D3101C770DE40CBE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5642aa5a6774b5c0f550719bbd6caf530dee3c6aa7e7309ccfe1a7bc17351e2
                                  • Instruction ID: be7095a64f0024af259746ffd3ea5d83961ffba32b65993af9c8c7497e06b786
                                  • Opcode Fuzzy Hash: c5642aa5a6774b5c0f550719bbd6caf530dee3c6aa7e7309ccfe1a7bc17351e2
                                  • Instruction Fuzzy Hash: 16C08C340219004ACE299A1082717AC3374A3D2796FC0088CC8024B782C61FAD8AE7A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 91 a67b11-a67b1d 92 a67baf-a67bb2 91->92 93 a67b22-a67b33 92->93 94 a67bb8 92->94 96 a67b35-a67b38 93->96 97 a67b40-a67b59 LoadLibraryExW 93->97 95 a67bba-a67bbe 94->95 98 a67b3e 96->98 99 a67bd8-a67bda 96->99 100 a67bbf-a67bcf 97->100 101 a67b5b-a67b64 GetLastError 97->101 103 a67bac 98->103 99->95 100->99 102 a67bd1-a67bd2 FreeLibrary 100->102 104 a67b66-a67b78 call a67928 101->104 105 a67b9d-a67baa 101->105 102->99 103->92 104->105 108 a67b7a-a67b8c call a67928 104->108 105->103 108->105 111 a67b8e-a67b9b LoadLibraryExW 108->111 111->100 111->105
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00A67C1E,00A680EE,?,00000000,00000000,00000000,?,00A67DF4,00000021,FlsSetValue,00A755C0,00A755C8,00000000), ref: 00A67BD2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: 85491977b6ccfede54e4a6bf4890d6db4fe78329340470aa41fb732f3c8e52ad
                                  • Instruction ID: 450bfc94861c2c0276a3166315b126f99edb7c0c5b2a74e3959f7f457b643c90
                                  • Opcode Fuzzy Hash: 85491977b6ccfede54e4a6bf4890d6db4fe78329340470aa41fb732f3c8e52ad
                                  • Instruction Fuzzy Hash: C6210672A25210BBC721EB61EC45E5E7778EB45768F264160ED1BE7290EB34ED02CAD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32(00A670DB,?,00A66F7F,00000000,?,?,00A670DB,63A8B917,?,00A670DB), ref: 00A66F96
                                  • TerminateProcess.KERNEL32(00000000,?,00A66F7F,00000000,?,?,00A670DB,63A8B917,?,00A670DB), ref: 00A66F9D
                                  • ExitProcess.KERNEL32 ref: 00A66FAF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 545fd68fee37db251f6112fcffd28d997b063f5c175b2f55543ab04711d95e5b
                                  • Instruction ID: e4d8c6abd3d8551bd29ed89306647d4b59018bad4a95a066ebec24314b3c960c
                                  • Opcode Fuzzy Hash: 545fd68fee37db251f6112fcffd28d997b063f5c175b2f55543ab04711d95e5b
                                  • Instruction Fuzzy Hash: ABD06C32404208AFCF116FA0ED0999A3F2AAA4C752B418020BA098A161CB39D9939A94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 119 a6d72d-a6d74c 120 a6d926 119->120 121 a6d752-a6d754 119->121 124 a6d928-a6d92c 120->124 122 a6d756-a6d775 call a664ea 121->122 123 a6d780-a6d7a6 121->123 130 a6d778-a6d77b 122->130 126 a6d7ac-a6d7b2 123->126 127 a6d7a8-a6d7aa 123->127 126->122 129 a6d7b4-a6d7be 126->129 127->126 127->129 131 a6d7c0-a6d7cb call a709c7 129->131 132 a6d7ce-a6d7d9 call a6d2b1 129->132 130->124 131->132 137 a6d81b-a6d82d 132->137 138 a6d7db-a6d7e0 132->138 141 a6d87e-a6d89e WriteFile 137->141 142 a6d82f-a6d835 137->142 139 a6d805-a6d819 call a6ce77 138->139 140 a6d7e2-a6d7e6 138->140 162 a6d7fe-a6d800 139->162 143 a6d8ee-a6d900 140->143 144 a6d7ec-a6d7fb call a6d249 140->144 146 a6d8a0-a6d8a6 GetLastError 141->146 147 a6d8a9 141->147 148 a6d837-a6d83a 142->148 149 a6d86c-a6d877 call a6d32f 142->149 150 a6d902-a6d908 143->150 151 a6d90a-a6d91c 143->151 144->162 146->147 155 a6d8ac-a6d8b7 147->155 156 a6d83c-a6d83f 148->156 157 a6d85a-a6d86a call a6d4f3 148->157 161 a6d87c 149->161 150->120 150->151 151->130 163 a6d921-a6d924 155->163 164 a6d8b9-a6d8be 155->164 156->143 158 a6d845-a6d850 call a6d40a 156->158 167 a6d855-a6d858 157->167 158->167 161->167 162->155 163->124 168 a6d8c0-a6d8c5 164->168 169 a6d8ec 164->169 167->162 170 a6d8c7-a6d8d9 168->170 171 a6d8de-a6d8e7 call a679c8 168->171 169->143 170->130 171->130
                                  APIs
                                    • Part of subcall function 00A6CE77: GetConsoleOutputCP.KERNEL32(63A8B917,?,00000000,?), ref: 00A6CEDA
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,?,?,00A6825F,?), ref: 00A6D896
                                  • GetLastError.KERNEL32(?,?,00A6825F,?,00A680EE,00000000,?,00000000,00A680EE,?,?,?,00A7A1C8,0000002C,00A6815F,?), ref: 00A6D8A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorFileLastOutputWrite
                                  • String ID:
                                  • API String ID: 2915228174-0
                                  • Opcode ID: 9524725f57b2880d7802f22bcfc7852d010f5652af75a66dc440684e86ae360d
                                  • Instruction ID: 62c034518b1f3021ce3c6e59c77c8df063583c0ea240570af2167b8e6119ffa1
                                  • Opcode Fuzzy Hash: 9524725f57b2880d7802f22bcfc7852d010f5652af75a66dc440684e86ae360d
                                  • Instruction Fuzzy Hash: A361B3B1E00249AFDF15CFA8C988EEEBFB9AF09344F144095E914A7252D731D946CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 174 a6d32f-a6d384 call a73600 177 a6d386 174->177 178 a6d3f9-a6d409 call a61610 174->178 180 a6d38c 177->180 182 a6d392-a6d394 180->182 183 a6d396-a6d39b 182->183 184 a6d3ae-a6d3d3 WriteFile 182->184 187 a6d3a4-a6d3ac 183->187 188 a6d39d-a6d3a3 183->188 185 a6d3d5-a6d3e0 184->185 186 a6d3f1-a6d3f7 GetLastError 184->186 185->178 189 a6d3e2-a6d3ed 185->189 186->178 187->182 187->184 188->187 189->180 190 a6d3ef 189->190 190->178
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,00000000,?,?,00A6D87C,?,?,?,00000000,?,?), ref: 00A6D3CB
                                  • GetLastError.KERNEL32(?,00A6D87C,?,?,?,00000000,?,?,?,00000000,?,?,00000000,?,?,00A6825F), ref: 00A6D3F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID:
                                  • API String ID: 442123175-0
                                  • Opcode ID: 0cf0c4decee41be97f8efdba87ae0b93766a584f9fed6270a86323107ccc5283
                                  • Instruction ID: 853bd03e5ca4ed2ce182609add0c505ef85e2a5d6aa78caf40e7b83d9be72d43
                                  • Opcode Fuzzy Hash: 0cf0c4decee41be97f8efdba87ae0b93766a584f9fed6270a86323107ccc5283
                                  • Instruction Fuzzy Hash: 94217175B002199BCF15CF6ADD809DDB7B9EB4C341F1480AAEA0ADB311D730DE868B61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 191 a68392-a68397 192 a68399-a683b1 191->192 193 a683b3-a683b7 192->193 194 a683bf-a683c8 192->194 193->194 195 a683b9-a683bd 193->195 196 a683da 194->196 197 a683ca-a683cd 194->197 198 a68434-a68438 195->198 201 a683dc-a683e9 GetStdHandle 196->201 199 a683d6-a683d8 197->199 200 a683cf-a683d4 197->200 198->192 202 a6843e-a68441 198->202 199->201 200->201 203 a68416-a68428 201->203 204 a683eb-a683ed 201->204 203->198 206 a6842a-a6842d 203->206 204->203 205 a683ef-a683f8 GetFileType 204->205 205->203 207 a683fa-a68403 205->207 206->198 208 a68405-a68409 207->208 209 a6840b-a6840e 207->209 208->198 209->198 210 a68410-a68414 209->210 210->198
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F6), ref: 00A683DE
                                  • GetFileType.KERNELBASE(00000000), ref: 00A683F0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: FileHandleType
                                  • String ID:
                                  • API String ID: 3000768030-0
                                  • Opcode ID: e7774f71ed82e3ab2ea2db9ce601092c2cec130f3a77c9f4d6a7f8359e39c8cd
                                  • Instruction ID: a2f20c4dc503ddde2adc95bda375c686459192b0baecb29fb59d72903423205b
                                  • Opcode Fuzzy Hash: e7774f71ed82e3ab2ea2db9ce601092c2cec130f3a77c9f4d6a7f8359e39c8cd
                                  • Instruction Fuzzy Hash: 3F119A715147424AC7308F3E9C8C6227ABDA766370B340719D1B6976F2CF78D887D641
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 211 a67bdc-a67c04 212 a67c06-a67c08 211->212 213 a67c0a-a67c0c 211->213 214 a67c5b-a67c5e 212->214 215 a67c12-a67c19 call a67b11 213->215 216 a67c0e-a67c10 213->216 218 a67c1e-a67c22 215->218 216->214 219 a67c24-a67c32 GetProcAddress 218->219 220 a67c41-a67c58 218->220 219->220 221 a67c34-a67c3f call a66706 219->221 222 a67c5a 220->222 221->222 222->214
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d0bfdbece0e8b33fe83b9f1a8150fb66ec063faea8e2015f33c5f060d4e2cb41
                                  • Instruction ID: 6c31d775e0ff19518e739598aa73741eadd527d0ae6daffe37c340611cb3fc65
                                  • Opcode Fuzzy Hash: d0bfdbece0e8b33fe83b9f1a8150fb66ec063faea8e2015f33c5f060d4e2cb41
                                  • Instruction Fuzzy Hash: ED01F5333241199FEB16CF69ED40A5E37BABBC43247148120FA15CB194EB31C8529790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 225 a684ce-a684da 226 a6850c-a68517 call a679ff 225->226 227 a684dc-a684de 225->227 235 a68519-a6851b 226->235 228 a684f7-a68508 RtlAllocateHeap 227->228 229 a684e0-a684e1 227->229 231 a684e3-a684ea call a67280 228->231 232 a6850a 228->232 229->228 231->226 237 a684ec-a684f5 call a6c2d4 231->237 232->235 237->226 237->228
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00A6AC7C,00A680EE,?,00A6AC7C,00000220,?,?,00A680EE), ref: 00A68500
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 06ea4f06da4265ca4f4003583b1153449274696f76d497d02bed158816175a73
                                  • Instruction ID: 1ede54bd8cc636873d0c2e33fb9fc77e276dea35b226b5d6dc6552b02e5be9b0
                                  • Opcode Fuzzy Hash: 06ea4f06da4265ca4f4003583b1153449274696f76d497d02bed158816175a73
                                  • Instruction Fuzzy Hash: 6DE0E53210925167D63137A59C04B9B3ABC9B427B0F090321FC5692091CF1CCC00C6A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: b6341bce1862bb7b3a227adbf2c473beafc81228274be55e51287f302c91fece
                                  • Instruction ID: 2ef25b28b8bf5a06961b20a934193cf23b4cc5f14468a0a1116f46a478b6eb88
                                  • Opcode Fuzzy Hash: b6341bce1862bb7b3a227adbf2c473beafc81228274be55e51287f302c91fece
                                  • Instruction Fuzzy Hash: 8CD22976E082288FDB65CF28DD447EAB7B5EB44345F1441EAD40EE7240EB78AE858F41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 2b07b3fb4d2f284f18c26563648069489a7a7ede171d4699298821c16c55e531
                                  • Instruction ID: 3000062d89be115f86ab66665444239750fca997a35489c53deddc2b114550af
                                  • Opcode Fuzzy Hash: 2b07b3fb4d2f284f18c26563648069489a7a7ede171d4699298821c16c55e531
                                  • Instruction Fuzzy Hash: F2B157729052459FDB15CF68C881BFEBBB9EF59340F15836AE905AB341DA3C9D01CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00A6A313
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00A6A407
                                  • FindClose.KERNEL32(00000000), ref: 00A6A446
                                  • FindClose.KERNEL32(00000000), ref: 00A6A479
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: d434a41eac2471c545d9ea7944b766be038bc03dcbead0807c42baeded5f0a34
                                  • Instruction ID: 320db752a54451213c8a344f95509d1abecd129c0f4206e5a0e66dff169ce83f
                                  • Opcode Fuzzy Hash: d434a41eac2471c545d9ea7944b766be038bc03dcbead0807c42baeded5f0a34
                                  • Instruction Fuzzy Hash: 1B71F175844128AFDF21EF78CC9DAEEBBB9EB25300F1481D9E00DA7251DA318E858F11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00A61D14
                                  • IsDebuggerPresent.KERNEL32 ref: 00A61DE0
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A61DF9
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00A61E03
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: 4deaf1ee986b8f2d2206182a1b3634d8af83f43c505bbe999012385314285865
                                  • Instruction ID: ff29d25d6f5e311ed4db9adc2acd93a242c28d843fd32c750ebe0c4d730034e1
                                  • Opcode Fuzzy Hash: 4deaf1ee986b8f2d2206182a1b3634d8af83f43c505bbe999012385314285865
                                  • Instruction Fuzzy Hash: D631F575D05218DBDB21DFA4DD497CDBBB8BF08300F1041AAE50DAB250EB759A868F45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00A66463
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A6646D
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00A6647A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: 60744417c7a52b5074cf13a84461e8259cd3c1517f330e2859cde515bfc6fe61
                                  • Instruction ID: f2dab7a8c354c2a99fe4a201c988e13461d97dc1d7c4e447f667ac290192bca4
                                  • Opcode Fuzzy Hash: 60744417c7a52b5074cf13a84461e8259cd3c1517f330e2859cde515bfc6fe61
                                  • Instruction Fuzzy Hash: 2631C4749112289BCB21DF68DD8979DBBB8BF08310F5081DAE41CA7251EB749B818F44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a7af88f4e99abe7e2ba8ad786fdd64479588621e3e2152c05de48b6c75abf19
                                  • Instruction ID: 9519a6d0c8ddc9ab8ec66091cb5d9d226d4df1073dfa7caa07bb15d7ace76a78
                                  • Opcode Fuzzy Hash: 7a7af88f4e99abe7e2ba8ad786fdd64479588621e3e2152c05de48b6c75abf19
                                  • Instruction Fuzzy Hash: D4F14071E012199FDF14CFA9C980AADBBB1FF88354F158269E815AB384D731AE41CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A72C0B,?,?,00000008,?,?,00A72815,00000000), ref: 00A72E3D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: f2d23fd9db3935451f89ecc19f785cdd906e1287c48e6b8b085f3f3234a8598b
                                  • Instruction ID: 29c905b0fd2e876f42178200d26613a6a423679da6e0d3ad359ed71d9d5347b0
                                  • Opcode Fuzzy Hash: f2d23fd9db3935451f89ecc19f785cdd906e1287c48e6b8b085f3f3234a8598b
                                  • Instruction Fuzzy Hash: 76B10A31610609DFD725CF28C88AB657BB1FF45365F29C658E899CF2A2C335E992CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00A61F8B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 8fa0278dfe10b06b08e0d443b46ca60acbb0959c946b46df053bdf1cbd7e885c
                                  • Instruction ID: 60f311e0fbc37cdd54e56205f0ad5e3e73306be61e14bb6e4af9ef6fb0d47427
                                  • Opcode Fuzzy Hash: 8fa0278dfe10b06b08e0d443b46ca60acbb0959c946b46df053bdf1cbd7e885c
                                  • Instruction Fuzzy Hash: 3651CFB1A11609DFDB18CFA8D8857AEBBF4FB48310F10852AD415EB6A0E7799D42CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 3c9fc9105847d94d201f63a7004d26f89d404f9da2d3b2d35c50d2bae5108a39
                                  • Instruction ID: 471a8daa86871e0507f83271c52f5851e25349a862f58b3494c6c3da02156ef5
                                  • Opcode Fuzzy Hash: 3c9fc9105847d94d201f63a7004d26f89d404f9da2d3b2d35c50d2bae5108a39
                                  • Instruction Fuzzy Hash: B5B1C171E00E0ACBCB24CFB8C995ABEB7B5AF15314F24061ED492EB691DB31AD41CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00001E70,00A616E4), ref: 00A61E69
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: e480ea96c097c3c8b82f01002d0b8c8930fd4bfe03fca5813197bb1838821b23
                                  • Instruction ID: 9af6d7f85bd537fd465e20aa6ff08e18e88fa83a160565985e49ce67497e8e0c
                                  • Opcode Fuzzy Hash: e480ea96c097c3c8b82f01002d0b8c8930fd4bfe03fca5813197bb1838821b23
                                  • Instruction Fuzzy Hash:
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: HeapProcess
                                  • String ID:
                                  • API String ID: 54951025-0
                                  • Opcode ID: 1d8802b44095d5334652780597fd811a46f2b5aaab14cb654076b107ad7d717a
                                  • Instruction ID: 11a270c71f8bd379a1d4be5cc03fe8ac785dd974bb68d1481e9b650afc19f588
                                  • Opcode Fuzzy Hash: 1d8802b44095d5334652780597fd811a46f2b5aaab14cb654076b107ad7d717a
                                  • Instruction Fuzzy Hash: 19A02230302202CF8300CFF2AE0A30C3AECBB0A2C0300C03AA00AC0A30FF3880838B08
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 00A6389A
                                  • ___TypeMatch.LIBVCRUNTIME ref: 00A639A8
                                  • _UnwindNestedFrames.LIBCMT ref: 00A63AFA
                                  • CallUnexpected.LIBVCRUNTIME ref: 00A63B15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2751267872-393685449
                                  • Opcode ID: bc0605f1fcbdf6647011f2632d059e6fa0bbf01d696b41f1291181b4e2831289
                                  • Instruction ID: f8dab7048671070c86a9c9c90b48d063fc097f58c4416543b906e0e7625feebb
                                  • Opcode Fuzzy Hash: bc0605f1fcbdf6647011f2632d059e6fa0bbf01d696b41f1291181b4e2831289
                                  • Instruction Fuzzy Hash: 34B14672C00209EFCF19DFA4CA81AAEBBB5FF14310B14415AE8516B252D772EB52DF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 127012223-0
                                  • Opcode ID: 5febda913ae1d11f3433cf8332d6a3318ea4141549a5ca01b90c35a6386e75e5
                                  • Instruction ID: bc5598ef5cbb02d3d09700907bc72b23c338792b2f0705326242ee63fe4c8e82
                                  • Opcode Fuzzy Hash: 5febda913ae1d11f3433cf8332d6a3318ea4141549a5ca01b90c35a6386e75e5
                                  • Instruction Fuzzy Hash: A171C772900205ABDF259FACCD81BAE77FAAF45710F28C155ED0CA7281E775DC418BA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00A621D7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00A621DF
                                  • _ValidateLocalCookies.LIBCMT ref: 00A62268
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00A62293
                                  • _ValidateLocalCookies.LIBCMT ref: 00A622E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 0ea1a5d0f6810ca1e114007fdaeb2cf4260ea883d9cba20b927e59ddf434a3fd
                                  • Instruction ID: 9a0a7c089992fd4cd4bdd6da7b794c0a1790f3566ed04c41e6cb82254c8da92c
                                  • Opcode Fuzzy Hash: 0ea1a5d0f6810ca1e114007fdaeb2cf4260ea883d9cba20b927e59ddf434a3fd
                                  • Instruction Fuzzy Hash: F341B274A00608ABCF10DF78CC90BDEBBB5BF45324F14C155E919AB392D731AA46CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLastError.KERNEL32(?,?,00A62848,00A6251C,00A61EB4), ref: 00A6285F
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A6286D
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A62886
                                  • SetLastError.KERNEL32(00000000,00A62848,00A6251C,00A61EB4), ref: 00A628D8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 8444eee619cd80e78f5d7bbb6f3472781ec61fedcc3fcadaecda25033fffc203
                                  • Instruction ID: 473c6fc4ee60ed48d8aa8a3d6f0486c7d0db9a2bea01d06f9a162ef2577ece82
                                  • Opcode Fuzzy Hash: 8444eee619cd80e78f5d7bbb6f3472781ec61fedcc3fcadaecda25033fffc203
                                  • Instruction Fuzzy Hash: 6101DF72619B155EA6246BF86C95B6B27B4EB01B78720433AFA28460F1FF114C839360
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  • C:\Users\user\Desktop\mdWXrbOxsY.exe, xrefs: 00A6A718
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: C:\Users\user\Desktop\mdWXrbOxsY.exe
                                  • API String ID: 0-2702633102
                                  • Opcode ID: b0d38e534341f2f7a3a54582b5d48bfddce64b61e2e31244b7605d8a6bfa1874
                                  • Instruction ID: 21251769920c2f17f054df7be36c9b07df65f197761d2d5ca0b3b864c49941e9
                                  • Opcode Fuzzy Hash: b0d38e534341f2f7a3a54582b5d48bfddce64b61e2e31244b7605d8a6bfa1874
                                  • Instruction Fuzzy Hash: EF218EB2204205AFDB10AF758D80C6BB7BAEF713647108524F929E7150EB30EC918FA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,63A8B917,?,?,00000000,00A739FA,000000FF,?,00A66FAB,00A670DB,?,00A66F7F,00000000), ref: 00A67050
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00A67062
                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,00A739FA,000000FF,?,00A66FAB,00A670DB,?,00A66F7F,00000000), ref: 00A67084
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 5bdf4617dd522dd1ac93d1b0aa4ee3525f963cc6f035a1a9c4ed07f05cad14f7
                                  • Instruction ID: 92b24addfdea3b5d63b7ffa069d924497a224fd9203b03a4054c40ce3cdad56d
                                  • Opcode Fuzzy Hash: 5bdf4617dd522dd1ac93d1b0aa4ee3525f963cc6f035a1a9c4ed07f05cad14f7
                                  • Instruction Fuzzy Hash: B801A232A54619EFDB128B94CC05BAFBBBCFB08B15F018625F916E2690EB749941CA50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 00A7007B
                                  • __alloca_probe_16.LIBCMT ref: 00A7013C
                                  • __freea.LIBCMT ref: 00A701A3
                                    • Part of subcall function 00A684CE: RtlAllocateHeap.NTDLL(00000000,00A6AC7C,00A680EE,?,00A6AC7C,00000220,?,?,00A680EE), ref: 00A68500
                                  • __freea.LIBCMT ref: 00A701B8
                                  • __freea.LIBCMT ref: 00A701C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                  • String ID:
                                  • API String ID: 1423051803-0
                                  • Opcode ID: efda8eb5a2b42a1b0a53a3717c340e25e1fd6ee13be4f3aba1541542cc6c2b22
                                  • Instruction ID: 7a374e63f517d8839f12b68a93961e3c57ce670fcdb4f6637229c1c2eff96796
                                  • Opcode Fuzzy Hash: efda8eb5a2b42a1b0a53a3717c340e25e1fd6ee13be4f3aba1541542cc6c2b22
                                  • Instruction Fuzzy Hash: C4518BB2610206EFEB219F64CD81EBB7AA9EF44354F55C228FD0CD6251EB71CD908760
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00A62A24,00000000,?,00A923A0,?,?,?,00A62BC7,00000004,InitializeCriticalSectionEx,00A74C38,InitializeCriticalSectionEx), ref: 00A62A80
                                  • GetLastError.KERNEL32(?,00A62A24,00000000,?,00A923A0,?,?,?,00A62BC7,00000004,InitializeCriticalSectionEx,00A74C38,InitializeCriticalSectionEx,00000000,?,00A62947), ref: 00A62A8A
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00A62AB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: daac2a5096647fcb626652e0041dee0a295bebadd43720089aaf21bdfdb09c61
                                  • Instruction ID: f769d0f458dfef814fa46be491fed76a910f89b5c6ab674029f4674e4d742db3
                                  • Opcode Fuzzy Hash: daac2a5096647fcb626652e0041dee0a295bebadd43720089aaf21bdfdb09c61
                                  • Instruction Fuzzy Hash: D2E04871340604BBDF205BD0DC06F593F7AAB14B92F508420FE0DE84E1D7A5D896D645
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(63A8B917,?,00000000,?), ref: 00A6CEDA
                                    • Part of subcall function 00A6B1E5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00A70199,?,00000000,-00000008), ref: 00A6B291
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00A6D135
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00A6D17D
                                  • GetLastError.KERNEL32 ref: 00A6D220
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: 4746e509e035d46c95d0f66c71eefb321fd590ef828ce679f6d5cabe06955786
                                  • Instruction ID: fdd5a35803d723871fb737d52f9b0476ea90d7c6cc6d94c22c63b2c9092eb718
                                  • Opcode Fuzzy Hash: 4746e509e035d46c95d0f66c71eefb321fd590ef828ce679f6d5cabe06955786
                                  • Instruction Fuzzy Hash: DED148B5E002489FCF15CFE8D890AADBBB5FF09310F18852AE956EB351D730A942CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: 68e42c13d0368438ae0404449014a2fef5cd17aa4d4543ac9b14d569a852db2f
                                  • Instruction ID: 170620daf69cf7b57e1004d1625379f95094853799e7821721b81a2c8f7c7d11
                                  • Opcode Fuzzy Hash: 68e42c13d0368438ae0404449014a2fef5cd17aa4d4543ac9b14d569a852db2f
                                  • Instruction Fuzzy Hash: 5F51D1B7A05602BFDF288F14C945B6BB7B4EF04710F14852EE90687291E731EE82CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00A6B1E5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00A70199,?,00000000,-00000008), ref: 00A6B291
                                  • GetLastError.KERNEL32 ref: 00A69F76
                                  • __dosmaperr.LIBCMT ref: 00A69F7D
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00A69FB7
                                  • __dosmaperr.LIBCMT ref: 00A69FBE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: da9f24618c9cbe87c5b964852a984dc3a034a10702655fc0c3951501120c75b3
                                  • Instruction ID: 98f5c3037645fc4c0ded090de8e7d448830f5c56ac544289df1d16a96b95e06a
                                  • Opcode Fuzzy Hash: da9f24618c9cbe87c5b964852a984dc3a034a10702655fc0c3951501120c75b3
                                  • Instruction Fuzzy Hash: 9E219272608205AF9B10EFA5CD8086BB7BDEF543687128519F919D7240D735EC51CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 00A6B2DB
                                    • Part of subcall function 00A6B1E5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00A70199,?,00000000,-00000008), ref: 00A6B291
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A6B313
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A6B333
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 158306478-0
                                  • Opcode ID: 4577b8daf33c2b6de56fe40ce89a165de6e2cef4650525572a04cd88078ba797
                                  • Instruction ID: bf1dfede2f00341d0e6cde611c650defb1770c0239d73b886cfdfb4aaa120c75
                                  • Opcode Fuzzy Hash: 4577b8daf33c2b6de56fe40ce89a165de6e2cef4650525572a04cd88078ba797
                                  • Instruction Fuzzy Hash: D111D2B2625625BEA71177F16D8ACAF6A7CDE893D87104025F606D6201FF28CE828570
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,00A70A03,?,00000001,?,?,?,00A6D274,?,?,00000000), ref: 00A7197C
                                  • GetLastError.KERNEL32(?,00A70A03,?,00000001,?,?,?,00A6D274,?,?,00000000,?,?,?,00A6D7FB,?), ref: 00A71988
                                    • Part of subcall function 00A7194E: CloseHandle.KERNEL32(FFFFFFFE,00A71998,?,00A70A03,?,00000001,?,?,?,00A6D274,?,?,00000000,?,?), ref: 00A7195E
                                  • ___initconout.LIBCMT ref: 00A71998
                                    • Part of subcall function 00A71910: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00A7193F,00A709F0,?,?,00A6D274,?,?,00000000,?), ref: 00A71923
                                  • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,00A70A03,?,00000001,?,?,?,00A6D274,?,?,00000000,?), ref: 00A719AD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: cd123d33100044d530dea45e4ff5b110aab2cf39776d01aa046cec98892d4ad6
                                  • Instruction ID: fdeb7feea367af51704f25352a66a808ebb2b341b1e360f0ae9c9abe1a19f447
                                  • Opcode Fuzzy Hash: cd123d33100044d530dea45e4ff5b110aab2cf39776d01aa046cec98892d4ad6
                                  • Instruction Fuzzy Hash: 14F0FE36100158BBCF226FD5AC14A897FA5FB493A0B04C410FB2C95120D73288629B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?), ref: 00A63B45
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: dc6e3d81323c7734dc18188ddb66273a2e42bf333bc930561b562787a62d5444
                                  • Instruction ID: 920f874b8e8d731cc496fc2b2a2beb4956efdb8733b1266c12ce3a4d3ffd8d95
                                  • Opcode Fuzzy Hash: dc6e3d81323c7734dc18188ddb66273a2e42bf333bc930561b562787a62d5444
                                  • Instruction Fuzzy Hash: 7B415772900249AFDF15DF98CD81AAEBBB5FF48304F188099FA05B7261D3359A62DB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1809059094.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                  • Associated: 00000000.00000002.1809043271.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809098497.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809122261.0000000000A7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809143351.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809161853.0000000000A92000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1809178351.0000000000A93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_a60000_mdWXrbOxsY.jbxd
                                  Similarity
                                  • API ID: CommandLine
                                  • String ID: `%
                                  • API String ID: 3253501508-3167696263
                                  • Opcode ID: d9c200f539d1318cb6d48e2d127452eb93f770bbbb5ccc25064182020790a88f
                                  • Instruction ID: 1600c5c6935e869df664822f469fb2c1be16f64f6644a08a52ed542d7461429a
                                  • Opcode Fuzzy Hash: d9c200f539d1318cb6d48e2d127452eb93f770bbbb5ccc25064182020790a88f
                                  • Instruction Fuzzy Hash: 7EB00879A45300AF8B40DFF5AD2C2457AA4BA5865238295569919C2720EB3D4087DF10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 023014cb5551b5343a7bab5b1497f14cc6acfb8bb3e577a17299d4679869de28
                                  • Instruction ID: 0e3c5ee717e7e301a7afb1906c4b45d3c9cf270b748be8f751a3189020e11c24
                                  • Opcode Fuzzy Hash: 023014cb5551b5343a7bab5b1497f14cc6acfb8bb3e577a17299d4679869de28
                                  • Instruction Fuzzy Hash: 73B18B70E002098FDF50CFA8C9857AEBBF6BF88308F14D529D925A7294EB749845CF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9b7edac8c8dfe43d24280bef5823c3e88e6e637976041d7944c2a351ff5080f
                                  • Instruction ID: f2bf4cb50c6b9f27b84a02aefea42da5eda627caa4927d2513db7a3d066f3848
                                  • Opcode Fuzzy Hash: c9b7edac8c8dfe43d24280bef5823c3e88e6e637976041d7944c2a351ff5080f
                                  • Instruction Fuzzy Hash: DEB19C71E00209CFDB50CFA9D8817EEBBF2AF88318F14D529E915E7294EB749845CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (hq$(hq
                                  • API String ID: 0-2483692461
                                  • Opcode ID: beb8c5ae7feee3b740a94dac62bfbbbd96559aa8c1af44672bb93d997e7aabdd
                                  • Instruction ID: 7b22d9f26e244677211d611e56a878b933a91a09c0c2a2ce17e3c2b87d86276e
                                  • Opcode Fuzzy Hash: beb8c5ae7feee3b740a94dac62bfbbbd96559aa8c1af44672bb93d997e7aabdd
                                  • Instruction Fuzzy Hash: 82B18871B10209CFCF54DB6DD4906AEB7F2EF89215B10956AD60ADB754EB30EC02CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Tedq
                                  • API String ID: 0-228892971
                                  • Opcode ID: 0f9877e31aff9db1e34b780df385178351e75054d28eef53c7960b4c1c2c4227
                                  • Instruction ID: 4fea108ea7b06b69a729b6176c29010c3b104f1b6b2764e9ecdb6d8e5ab179d2
                                  • Opcode Fuzzy Hash: 0f9877e31aff9db1e34b780df385178351e75054d28eef53c7960b4c1c2c4227
                                  • Instruction Fuzzy Hash: 4371ED70B403058FDB44AB76D95466E7BA2EF84748B408929E90ADB358EF349C46CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Tedq
                                  • API String ID: 0-228892971
                                  • Opcode ID: 246ca3d4344b6530fe354dff6010a92bbe706609f65f26f4f84cfcaf0f96f90d
                                  • Instruction ID: 7721aae32bc13127305314fcfe204d61e80bd2c7c0425465aa1426a195fdcb49
                                  • Opcode Fuzzy Hash: 246ca3d4344b6530fe354dff6010a92bbe706609f65f26f4f84cfcaf0f96f90d
                                  • Instruction Fuzzy Hash: C871CC70B403058FDB44AB76D95462E7BA2EF84748B408929E90ADB358EF34AC46CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3fcde257632a6eeac07ac387dd1e310be03001c9ae6229f430ad2354d1a5f44
                                  • Instruction ID: 3a24ffda91e7f0c1be405274e70dbca37aee20ffebf6278dd261e77e59c4fdeb
                                  • Opcode Fuzzy Hash: c3fcde257632a6eeac07ac387dd1e310be03001c9ae6229f430ad2354d1a5f44
                                  • Instruction Fuzzy Hash: 6441CF31B402508FDB05EB35C654A6D37F2AF8A704F2084A9D606EB3B5DB3ACC46CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e40749d9b5bd2d50cecce9d35a1400f3ea699b26329bafcc7fc7856460d9c99
                                  • Instruction ID: 9a516e7b85947107f1172cde102426e28bff5ce8e012d213341a6abaa90d6ed6
                                  • Opcode Fuzzy Hash: 1e40749d9b5bd2d50cecce9d35a1400f3ea699b26329bafcc7fc7856460d9c99
                                  • Instruction Fuzzy Hash: B2B17AB0E402098FDB50CFA8C9857DDBBF6BF88308F14D529DA25A7294EB349845CF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2ed9b5b5d1c370ce572250a35bcde20901dd0bf74cecaba21d948d1fa3a61997
                                  • Instruction ID: d544ee2d5c207410c2f1a9ab72e324f5a2e6be15dd97585a7a42dffde241ecf8
                                  • Opcode Fuzzy Hash: 2ed9b5b5d1c370ce572250a35bcde20901dd0bf74cecaba21d948d1fa3a61997
                                  • Instruction Fuzzy Hash: B6A18B71E40209CFDB50CFA9D9817DEBBF2AF48318F14E529E914E7294EB749885CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37133b6d49e4b4d93544e9fa297039527a5f676408b8d4f915c92a0b520a0d80
                                  • Instruction ID: e069a94b689eafd6fba0740248efd8ea25aadb761a88817022fb7a5153c73b7a
                                  • Opcode Fuzzy Hash: 37133b6d49e4b4d93544e9fa297039527a5f676408b8d4f915c92a0b520a0d80
                                  • Instruction Fuzzy Hash: A07109303142A18FCB4ADB66EB5065D77B2EBC4611B00A585ED019B3B9DB3C9D82C7E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96d0fcb037559f4b56833994a0ef1ecc18bc6474b9f5d19f2028dc2073fa2a7a
                                  • Instruction ID: 278922de0977cabb363b478034b529df5fa45dce287c290fa94ddb2558d676f1
                                  • Opcode Fuzzy Hash: 96d0fcb037559f4b56833994a0ef1ecc18bc6474b9f5d19f2028dc2073fa2a7a
                                  • Instruction Fuzzy Hash: E6412672A04358CFCB05DB69C9106AEBBF2EF49310F05D49AD509EB392DB389C45CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c8c43acd725166791e996fcfa3a0e6d520205c88499ca8920e58a58ee5294aa2
                                  • Instruction ID: 0af6b861f32308d80f3569503c418ac81af7c620346af197977f21730e11d4ba
                                  • Opcode Fuzzy Hash: c8c43acd725166791e996fcfa3a0e6d520205c88499ca8920e58a58ee5294aa2
                                  • Instruction Fuzzy Hash: 49418C30B406518FDB45EB35C654A6D37B2AF89704F2084A9DA06EB3A4DB3A9C42CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ff0c9751c809cf9a853ab96af3377587acd3d3afe70b8023ef59e276a5f7d3f
                                  • Instruction ID: 13ac3d8a7c7ceb6d62236e2ae1a94fe8d753c777e879c9a193f782c8fe4f7f4c
                                  • Opcode Fuzzy Hash: 8ff0c9751c809cf9a853ab96af3377587acd3d3afe70b8023ef59e276a5f7d3f
                                  • Instruction Fuzzy Hash: 1A4147B1D00349DFDB14DFA9C484ADEBFF1EF48318F24841AE619AB290DB349946CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34bc784cb0e0a3c3e91a0319a2d06ed59e5da6f58a5655f0cf49aa45ec795635
                                  • Instruction ID: 758c5660c5b1e8e7a2bb7e9d0cce0a2bce6c740bc43413c06a8a3601f35fe76e
                                  • Opcode Fuzzy Hash: 34bc784cb0e0a3c3e91a0319a2d06ed59e5da6f58a5655f0cf49aa45ec795635
                                  • Instruction Fuzzy Hash: FA41F0B0D00349DFDB14DFA9C584ADEBFF5EF48314F148029E519AB290DB75A945CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2be4d2350300da6bbbc953d76fed4ef6fd963965c789884e280132b8309f64ca
                                  • Instruction ID: 23c590d4040c5d9297ca3db58cade98adfd1839fadfc86d083140d37b5233884
                                  • Opcode Fuzzy Hash: 2be4d2350300da6bbbc953d76fed4ef6fd963965c789884e280132b8309f64ca
                                  • Instruction Fuzzy Hash: 60216B70780240CFEB55EB34D5547AD77B2AF49708F20C0A8D606AB3A1CB7A9C82CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ba4bbc47d7c9bad9d959bb5d8d974d7dd0a78e8022309bf436fe4a585023c91
                                  • Instruction ID: 1678c7a6fb380ae737bc26a6d830aeb9a257c977d1488d2337ceeea4523a0d81
                                  • Opcode Fuzzy Hash: 4ba4bbc47d7c9bad9d959bb5d8d974d7dd0a78e8022309bf436fe4a585023c91
                                  • Instruction Fuzzy Hash: 9A118E71E40228DFCB40DFA899443AEB7E5FF89304F049169D609EB350EB7899428BD2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0907c7d0a5436d1b9d216639a72120a2baa15ae0598651e8ffd20c0c85d7048
                                  • Instruction ID: 9d47bee9f5d1fa7c599e5917465341ec73d6598c5f9a47137c45d147de2e7255
                                  • Opcode Fuzzy Hash: b0907c7d0a5436d1b9d216639a72120a2baa15ae0598651e8ffd20c0c85d7048
                                  • Instruction Fuzzy Hash: 96012D71B802049BDB40EB24D6017DE7BF2AB88710F20C055EA01BB295DF3A4E02C7E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44c1e5175046f7deef2839704d6b9c6d4acb01605104a9c136933fabd5af10ab
                                  • Instruction ID: 3c224c712a58f60dec21d6641049b67f3888eeaba739db5317271ea89e1950ba
                                  • Opcode Fuzzy Hash: 44c1e5175046f7deef2839704d6b9c6d4acb01605104a9c136933fabd5af10ab
                                  • Instruction Fuzzy Hash: 130126313102049BDB44DB3AEE41B5F3BCAEBC92607548235E60ACB344EE78DC428B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3f9d8273d8d588a1e96602b9e1c399cb9e5662f2f798e76537aa9349043b3ee
                                  • Instruction ID: d4b70c26716b21080e52735966e3435843fe60899e3e954a38c632d6674b0f10
                                  • Opcode Fuzzy Hash: c3f9d8273d8d588a1e96602b9e1c399cb9e5662f2f798e76537aa9349043b3ee
                                  • Instruction Fuzzy Hash: 9601F770B802149BEB41EB64C5147AE7AF29B48700F20C058EA01BB2D5DF750E41CBD6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 99c8d733942eae962e40a5b712ecc2dbe107e36bbfd9c7e22e24d70bcbeea19e
                                  • Instruction ID: ce31f5b703cdecf62c175bea576a2cfc896f9c4eede94fd470f98cb0d81fe9c5
                                  • Opcode Fuzzy Hash: 99c8d733942eae962e40a5b712ecc2dbe107e36bbfd9c7e22e24d70bcbeea19e
                                  • Instruction Fuzzy Hash: A0E0D830945288AFCF51CBB4ED965ED7FB1DF4220470485E9D449D7212D9311E06DB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1836149728.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_2ef0000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca5c09f646c18fda935eaaf7236bdfa6845b9f741d6917857c9e2c9ac601d813
                                  • Instruction ID: 7c456dac6b22cb907fbd60cb3d4f84b5b70d118351d50df2868e570613d0133e
                                  • Opcode Fuzzy Hash: ca5c09f646c18fda935eaaf7236bdfa6845b9f741d6917857c9e2c9ac601d813
                                  • Instruction Fuzzy Hash: 9BD01770A4020CEF8F40DFA8EA0055DBBF9EB44309B5089A9D909D7204EA312E009B81
                                  Uniqueness

                                  Uniqueness Score: -1.00%